Assessment
Submission
AI Processing
& Analysis
Key Controls
Review
4
Final
Results

test calculaion

Job ID: test-calculaion-082225020046 2025-08-22 Completed
Generating your report with AI insights. This may take a moment...
Overall Alignment
91.1%
Excellent Coverage
Controls Aligned
400 / 439
400 out of 439 controls found
Frameworks
2
CIS NIST
Assessment frameworks applied
Key Controls
100 / 103
Critical controls identified
Overall Alignment
Framework Breakdown
Key Controls Status

Framework Compliance Overview
Framework Total Controls Aligned Gaps Compliance Progress
CIS 45 41 4
91.11%
Excellent
NIST 394 359 35
91.12%
Excellent
OVERALL 439 400 39
91.1%
Document Analysis Details
anonymized_6.0_IS_Data_Security_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 7
15.56%
NIST 394 81
20.56%
anonymized_7.0_IS_Asset_Management_Policy.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 9
20.0%
NIST 394 128
32.49%
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 7
15.56%
NIST 394 82
20.81%
anonymized_7.1_IS_Asset_Management_Standard.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 6
13.33%
NIST 394 40
10.15%
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 2
4.44%
NIST 394 66
16.75%
anonymized_6.1_IS_Data_Security_Standards.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 11
24.44%
NIST 394 75
19.04%
anonymized_11.0_IS_Operations_Security_Policy.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 12
26.67%
NIST 394 100
25.38%
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 7
15.56%
NIST 394 63
15.99%
anonymized_2.1_IS_Acceptable_Use_Standard.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 3
6.67%
NIST 394 61
15.48%
anonymized_2.0_IS_Acceptable_Use_Policy.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 2
4.44%
NIST 394 52
13.2%
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 9
20.0%
NIST 394 81
20.56%
anonymized_7.2_IS_End_User_Device_Standard.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 6
13.33%
NIST 394 56
14.21%
anonymized_3.0_IS_Information_Security_Policy_2.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 4
8.89%
NIST 394 94
23.86%
anonymized_9.1_IS_Cryptography_Standards.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 5
11.11%
NIST 394 63
15.99%
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 3
6.67%
NIST 394 92
23.35%
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 3
6.67%
NIST 394 33
8.38%
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 12
26.67%
NIST 394 150
38.07%
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 7
15.56%
NIST 394 74
18.78%
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 2
4.44%
NIST 394 46
11.68%
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 3
6.67%
NIST 394 37
9.39%
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 3
6.67%
NIST 394 65
16.5%
anonymized_9.0_IS_Cryptography_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 4
8.89%
NIST 394 77
19.54%
anonymized_15.0_IS_Incident_Management_Policy_1.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 1
2.22%
NIST 394 46
11.68%
anonymized_20.0_IS_Risk_Management_Policy_2.pdf 2 frameworks
Framework Total Aligned Coverage
CIS 45 0
0.0%
NIST 394 48
12.18%

45 Total Controls
Control ID Control Name Status Evidence Section Document Actions
1.1
Establish and Maintain Detailed Enterprise Asset Inventory
Key Control
Aligned Asset Management – Establishes controls for asset identifica...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
1.1
Establish and Maintain Detailed Enterprise Asset Inventory
Key Control
Aligned Assets should be classified in terms of business criticality...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
1.2
Address Unauthorized Assets
Aligned Asset Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
1.2
Address Unauthorized Assets
Aligned 1.2 REQUIREMENTS - Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
1.2
Address Unauthorized Assets
Aligned Access rights to the Test information resources should be re...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
1.3
Utilize an Active Discovery Tool
Gap Utilize an active discovery tool to identify assets connected to the enterprise’s network. Configure...
1.4
Use Dynamic Host Configuration Protocol (DHCP) Logging to Update Enterprise Asset Inventory
Aligned MAINTAINANCE...
anonymized_7.1_IS_Asset_Management_Standard.pdf
1.5
Use a Passive Asset Discovery Tool
Aligned Assets should be classified in terms of business criticality...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
2.1
Establish and Maintain a Software Inventory
Key Control
Aligned Inventory of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
2.1
Establish and Maintain a Software Inventory
Key Control
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
2.1
Establish and Maintain a Software Inventory
Key Control
Aligned Inventory and Control of Software Assets...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
2.2
Ensure Authorized Software is Currently Supported
Key Control
Aligned Section 1.7 - EXCEPTION...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
2.2
Ensure Authorized Software is Currently Supported
Key Control
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
2.3
Address Unauthorized Software
Aligned Software...
anonymized_6.1_IS_Data_Security_Standards.pdf
2.4
Utilize Automated Software Inventory Tools
Aligned Inventory of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
2.4
Utilize Automated Software Inventory Tools
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
2.7
Allowlist Authorized Scripts
Gap Use technical controls, such as digital signatures and version control, to ensure that only authoriz...
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned 1.8 DATA RETENTION and 1.9 ROLES & RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned User Access Authorization Process...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned Definition of data governance and data privacy...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
3.1
Establish and Maintain a Data Management Process
Key Control
Aligned Data Management Process...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
3.2
Establish and Maintain a Data Inventory
Aligned DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.3
Configure Data Access Control Lists
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
3.3
Configure Data Access Control Lists
Aligned Access Control Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
3.3
Configure Data Access Control Lists
Aligned b) Information owners should only grant privileged access to...
anonymized_11.0_IS_Operations_Security_Policy.pdf
3.3
Configure Data Access Control Lists
Aligned Access Limitation...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
3.3
Configure Data Access Control Lists
Aligned System and Application Access Control - Information Access R...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
3.3
Configure Data Access Control Lists
Aligned Define desktop and end-user device security access controls....
anonymized_7.2_IS_End_User_Device_Standard.pdf
3.3
Configure Data Access Control Lists
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.3
Configure Data Access Control Lists
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
3.3
Configure Data Access Control Lists
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
3.4
Enforce Data Retention
Aligned 1.8 DATA RETENTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
3.4
Enforce Data Retention
Aligned DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.4
Enforce Data Retention
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.4
Enforce Data Retention
Aligned Logging and Monitoring...
anonymized_11.0_IS_Operations_Security_Policy.pdf
3.4
Enforce Data Retention
Aligned Evidence of account and privilege reviews should document th...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
3.4
Enforce Data Retention
Aligned Data Retention and Disposal...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
3.4
Enforce Data Retention
Aligned Evidence Retention and Documentation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
3.5
Securely Dispose of Data
Key Control
Aligned DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.5
Securely Dispose of Data
Key Control
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Section discussing data protection and disposal methods....
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
3.5
Securely Dispose of Data
Key Control
Aligned V. Bring Your Own Device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Plan detailing disposal of Test data while contract off-boar...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Data Governance...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.5
Securely Dispose of Data
Key Control
Aligned Supplier Relationship Standard and Data Security Policy...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
3.6
Encrypt Data on End-User Devices
Aligned Encrypt data on end-user devices containing sensitive data...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.6
Encrypt Data on End-User Devices
Aligned Devices should be password-protected and encrypted....
anonymized_7.2_IS_End_User_Device_Standard.pdf
3.6
Encrypt Data on End-User Devices
Aligned Only USB sticks and other removable devices that have been a...
anonymized_7.2_IS_End_User_Device_Standard.pdf
3.6
Encrypt Data on End-User Devices
Aligned Confidential, Restricted information or applications that re...
anonymized_9.1_IS_Cryptography_Standards.pdf
3.6
Encrypt Data on End-User Devices
Aligned vi. Encryption is to be used to protect the confidentiality ...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
3.6
Encrypt Data on End-User Devices
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.6
Encrypt Data on End-User Devices
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.6
Encrypt Data on End-User Devices
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.6
Encrypt Data on End-User Devices
Aligned ix. Encryption algorithms, keys, and software solutions shou...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned 1.5 DATA CLASSIFICATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned DOCUMENT CLASSIFICATION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned Data Classification Policy...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned Incident Categorization...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
3.7
Establish and Maintain a Data Classification Scheme
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.8
Document Data Flows
Key Control
Gap Document data flows. Data flow documentation includes service provider data flows and should be base...
Critical Gap - Key Control Missing
3.9
Encrypt Data on Removable Media
Aligned Encrypt data on removable media...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.9
Encrypt Data on Removable Media
Aligned Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
3.9
Encrypt Data on Removable Media
Aligned 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
3.9
Encrypt Data on Removable Media
Aligned Removable Storage Devices...
anonymized_7.2_IS_End_User_Device_Standard.pdf
3.9
Encrypt Data on Removable Media
Aligned Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.9
Encrypt Data on Removable Media
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned Encrypt sensitive data at rest on servers, applications, and...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned a) All data provided by Test should be encrypted using AES-1...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned Devices should be password-protected and encrypted....
anonymized_7.2_IS_End_User_Device_Standard.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned Cryptography...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned Confidential, Restricted information or applications that re...
anonymized_9.1_IS_Cryptography_Standards.pdf
3.11
Encrypt Sensitive Data at Rest
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
3.12
Segment Data Processing and Storage Based on Sensitivity
Aligned Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.13
Deploy a Data Loss Prevention Solution
Aligned d) A data loss prevention (DLP) mechanism should be implemen...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
3.13
Deploy a Data Loss Prevention Solution
Aligned Inventory of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
3.13
Deploy a Data Loss Prevention Solution
Aligned DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.13
Deploy a Data Loss Prevention Solution
Aligned b) To protect data Integrity, data should be hashed using SH...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
3.13
Deploy a Data Loss Prevention Solution
Aligned DLP Data loss prevention (DLP) software detects potential da...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned 1.3 IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned e) Event logs can contain sensitive data and personally iden...
anonymized_11.0_IS_Operations_Security_Policy.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Control of sensitive data access and masking procedures....
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned 1.2 GOVERNANCE - Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Evidence Handling and Chain of Custody...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Access Control and Logging Policies...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
3.14
Log Sensitive Data Access
Key Control
Aligned Record Retention...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
4.1
Establish and Maintain a Secure Configuration Process
Key Control
Aligned Secure Configuration of Enterprise Assets & Software...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
4.1
Establish and Maintain a Secure Configuration Process
Key Control
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
4.1
Establish and Maintain a Secure Configuration Process
Key Control
Aligned Configuration management database should maintain the versio...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
4.2
Establish and Maintain a Secure Configuration Process for Network Infrastructure
Aligned 1.11 MAINTENANCE...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
4.2
Establish and Maintain a Secure Configuration Process for Network Infrastructure
Aligned Network Monitoring & Defense...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
4.3
Configure Automatic Session Locking on Enterprise Assets
Aligned Session Locking Policy...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
4.4
Implement and Manage a Firewall on Servers
Aligned Firewall Security...
anonymized_11.0_IS_Operations_Security_Policy.pdf
4.4
Implement and Manage a Firewall on Servers
Aligned Section 6: Personal Firewalls...
anonymized_7.2_IS_End_User_Device_Standard.pdf
4.5
Implement and Manage a Firewall on End-User Devices
Aligned Section 6: Personal firewalls software should be installed a...
anonymized_7.2_IS_End_User_Device_Standard.pdf
4.6
Securely Manage Enterprise Assets and Software
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
4.6
Securely Manage Enterprise Assets and Software
Aligned Management of program source code libraries and configuratio...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
4.6
Securely Manage Enterprise Assets and Software
Aligned Asset Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
4.7
Manage Default Accounts on Enterprise Assets and Software
Aligned Privileged Access Management...
anonymized_11.0_IS_Operations_Security_Policy.pdf
4.7
Manage Default Accounts on Enterprise Assets and Software
Aligned User ID Management and Default Account Handling...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
4.7
Manage Default Accounts on Enterprise Assets and Software
Aligned Service Accounts...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
4.9
Configure Trusted DNS Servers on Enterprise Assets
Gap Configure trusted DNS servers on network infrastructure. Example implementations include configuring...
4.11
Enforce Remote Wipe Capability on Portable End-User Devices
Key Control
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
4.11
Enforce Remote Wipe Capability on Portable End-User Devices
Key Control
Aligned Secure disposal of records...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
4.11
Enforce Remote Wipe Capability on Portable End-User Devices
Key Control
Aligned V. Bring Your Own Device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
4.12
Separate Enterprise Workspaces on Mobile End-User Devices
Aligned Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
5.1
Establish and Maintain an Inventory of Accounts
Key Control
Aligned Assets ownership and responsibilities...
anonymized_7.0_IS_Asset_Management_Policy.pdf
5.1
Establish and Maintain an Inventory of Accounts
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
5.1
Establish and Maintain an Inventory of Accounts
Key Control
Aligned Management of Privileged Access Rights...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
5.1
Establish and Maintain an Inventory of Accounts
Key Control
Aligned Service Accounts...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
5.1
Establish and Maintain an Inventory of Accounts
Key Control
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
5.2
Access Control Review
Aligned Assets ownership and responsibilities...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-2
Configuration Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Configuration Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Configuration Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PR.IP-1
Asset Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PR.IP-1
Asset Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CIS CSC 4
Secure Configuration of Enterprise Assets and Software
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Information Access Restriction
Aligned Information Access Restriction...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.4.1
Information Access Restriction
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
ID.AM-1
Asset Inventory
Aligned Assets should be classified in terms of business criticality...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-1
Asset Inventory
Aligned A complete inventory of business-critical assets located at ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-2
Asset Inventory
Aligned Assets should be classified in terms of business criticality...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-2
Asset Inventory
Aligned assigned ownership by defined roles and responsibilities....
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-5
Asset Inventory
Aligned Assets should be classified in terms of business criticality...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-5
Asset Inventory
Aligned their usage over time should be maintained and updated regul...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
1.2.3
Access to Networks, Network Services
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf

394 Total Controls
Control ID Control Name Status Evidence Section Document Actions
AC-1
Policy and Procedures
Aligned 1.9 ROLES & RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy and Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-1
Policy and Procedures
Aligned Control: AC-1: Access control policy and procedures address ...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Section 1.6 - Access Control Policy and Procedures...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy and Procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access control policy and procedures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy and Procedures...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned The purpose of this policy is to provide requirements contro...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Ensure that information access controls are implemented to m...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned g. Ensure that information access controls are implemented t...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned The purpose of this policy is to provide requirements contro...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned g. Ensure that information access controls are implemented t...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Information access controls...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-1
Policy and Procedures
Aligned Access Control Policy and Procedures...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned Access control should be supported by regular reviews to ens...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-1
Policy and Procedures
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned User Accounts should have the least amount of privilege requ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned User Accounts should have the least amount of privilege requ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-1
Policy and Procedures
Aligned Access control policy and procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-1
Policy and Procedures
Aligned Policies and procedures contribute to security and privacy a...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-1
Policy and Procedures
Aligned Cloud Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-1
Policy and Procedures
Aligned Cloud Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-1
Policy and Procedures
Aligned Cloud Policy - Establishes controls that define the requirem...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-1
Policy and Procedures
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-1
Policy and Procedures
Aligned Defining and periodically reviewing access restrictions and ...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-1
Policy and Procedures
Aligned Acceptable Use of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-1
Policy and Procedures
Aligned Listing of individuals or groups who are authorized to acces...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-1
Policy and Procedures
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2.1 Access Control...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AC-1
Policy and Procedures
Aligned 7. EXCEPTION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AC-1
Policy and Procedures
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-1
Policy and Procedures
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-1
Policy and Procedures
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-1
Policy and Procedures
Aligned organization’s information systems should be appropriately s...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-10
Concurrent Session Control
Aligned Simultaneous logins to a system by one User ID from differen...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-11
Device Lock
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AC-11
Device Lock
Key Control
Aligned Devices should be password-protected and encrypted....
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-11
Device Lock
Key Control
Aligned User accounts, including privileged user accounts, should be...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-11
Device Lock
Key Control
Aligned f) Ensure that screen lock is properly functioning on all ac...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-12
Session Termination
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-12
Session Termination
Aligned Human Resources Department controls employee terminations...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-12
Session Termination
Aligned k) Access control systems should ensure that session activit...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-14
Permitted Actions Without Identification or Authentication
Key Control
Aligned Access Control | Permitted Actions without Identification or...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-14
Permitted Actions Without Identification or Authentication
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-14
Permitted Actions Without Identification or Authentication
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-14
Permitted Actions Without Identification or Authentication
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-14
Permitted Actions Without Identification or Authentication
Key Control
Aligned Access Control | Permitted Actions without Identification or...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-16
Security and Privacy Attributes
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-16
Security and Privacy Attributes
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-16
Security and Privacy Attributes
Key Control
Aligned Access Control | Security and Privacy Attributes...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-17
Remote Access
Aligned Monitoring devices are typically employed at the managed int...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-17
Remote Access
Aligned 1.10 REMOTE ACCESS TO Test’s SYSTEMS...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-17
Remote Access
Aligned Data transmission should be encrypted....
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-17
Remote Access
Aligned 1.2 SYSTEM USE NOTIFICATION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-17
Remote Access
Aligned A.9.4.4 Access to Networks & Network Services...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-17
Remote Access
Aligned Control: AC-17: Remote access is access to organizational sy...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-17
Remote Access
Aligned Monitoring devices are typically employed at the managed int...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-17
Remote Access
Aligned 1.2 REQUIREMENT...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-17
Remote Access
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-17
Remote Access
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-17
Remote Access
Aligned Remote access should be configured to use a strong authentic...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-17
Remote Access
Aligned Test restricts remote access to many types of confidential i...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-17
Remote Access
Aligned All external connections to Test networks or Information Res...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-17
Remote Access
Aligned Cloud Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-17
Remote Access
Aligned End-user Device Security Policy - Establishes controls that ...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-17
Remote Access
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-17
Remote Access
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-17
Remote Access
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-18
Wireless Access
Aligned Service Set Identifier (SSID)...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-18
Wireless Access
Aligned Wireless technologies and access control mechanisms...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned 1.14 BRING YOUR OWN DEVICE (BYOD)...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned Control of mobile devices and their usage restrictions...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned Mobile Device Management and Reporting Procedures...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned implementation and operation of information security within ...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned business unit security officers to ensure that help desk and...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned Overview, Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned Section 4.6 - Access Control Measures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned Access Control for Portable and Mobile Devices...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-19
Access Control for Mobile Devices
Key Control
Aligned 1.2. Hardware, Software, Applications and Data - Inventory o...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-2
Account Management
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Account Management Requirements...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-2
Account Management
Key Control
Aligned 1.6 ENFORCEMENT/COMPLIANCE...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-2
Account Management
Key Control
Aligned Control: AC-2...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Account Management...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Section 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.2 REQUIREMENT...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-2
Account Management
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-2
Account Management
Key Control
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-2
Account Management
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Account Management and Local Administrative Rights...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-2
Account Management
Key Control
Aligned Information Access Controls...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Definition of User, Privileged User, User Account, Service A...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned General User Account...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned vi. Authorization process is developed and implemented to en...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access is based on an employee/contractor’s role and should ...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Term Definition...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access is based on an employee/contractor’s role and should ...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned i. Privileged users should understand their roles and respon...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned i. Privileged users should understand their roles and respon...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-2
Account Management
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-2
Account Management
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-2
Account Management
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-2
Account Management
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned Management of Privileged Access Rights...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned Management of Privileged Access Rights...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-2
Account Management
Key Control
Aligned Access Control...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned End-user Device Security Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned End-user Device Security Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-2
Account Management
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-2
Account Management
Key Control
Aligned Access Control | Account Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-2
Account Management
Key Control
Aligned Control: AC-2...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-2
Account Management
Key Control
Aligned User access policies and procedures should be established....
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-20
Use of External Systems
Aligned Adequate security for mobile devices...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-20
Use of External Systems
Aligned External systems used to access public interfaces to organiz...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-20
Use of External Systems
Aligned Mobile Device Management and Reporting Procedures...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-20
Use of External Systems
Aligned Access Control | Use of External Systems...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-20
Use of External Systems
Aligned Adequate security for mobile devices goes beyond the require...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-21
Information Sharing
Key Control
Aligned Restricted Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-21
Information Sharing
Key Control
Aligned Information Sharing and Data Security Classification Policy...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-21
Information Sharing
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-21
Information Sharing
Key Control
Aligned Classification of Information...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-21
Information Sharing
Key Control
Aligned Access Control Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-21
Information Sharing
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
AC-21
Information Sharing
Key Control
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-21
Information Sharing
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-21
Information Sharing
Key Control
Aligned User Access Authorization and Information Owner Responsibili...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-21
Information Sharing
Key Control
Aligned IS Risk Management Policy...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AC-21
Information Sharing
Key Control
Aligned Personnel Access Rights for BC/DR Events...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-21
Information Sharing
Key Control
Aligned data privacy governs how data is collected, shared, and used...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-22
Publicly Accessible Content
Aligned Public Data and Internal Use Only Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-22
Publicly Accessible Content
Aligned proprietary information, trade secrets or any other sensitiv...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-22
Publicly Accessible Content
Aligned Internet Use Restrictions...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-22
Publicly Accessible Content
Aligned 4.0 Organization of Information Security Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-22
Publicly Accessible Content
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-22
Publicly Accessible Content
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-22
Publicly Accessible Content
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-22
Publicly Accessible Content
Aligned 1.0 PURPOSE...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AC-22
Publicly Accessible Content
Aligned organization’s information systems should be appropriately s...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-23
Data Mining Protection
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-23
Data Mining Protection
Aligned Resource Administrators should regularly review the logs (au...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-23
Data Mining Protection
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-23
Data Mining Protection
Aligned Data Mining Protection...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-23
Data Mining Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-23
Data Mining Protection
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-23
Data Mining Protection
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AC-24
Access Control Decisions
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-24
Access Control Decisions
Aligned 1.6 ENFORCEMENT/COMPLIANCE...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-24
Access Control Decisions
Aligned Access Control Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-24
Access Control Decisions
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-24
Access Control Decisions
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-24
Access Control Decisions
Aligned 1.2.3 System and Application Access Control - Information Ac...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-24
Access Control Decisions
Aligned 1.2.3 System and Application Access Control - Information Ac...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-24
Access Control Decisions
Aligned 1.2.3 System and Application Access Control - Information Ac...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-24
Access Control Decisions
Aligned Access Control...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-24
Access Control Decisions
Aligned Defining and periodically reviewing access restrictions and ...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-24
Access Control Decisions
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-24
Access Control Decisions
Aligned Access Control | Access Control Decisions...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-24
Access Control Decisions
Aligned Definition of access control and authorization...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-25
Reference Monitor
Key Control
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-25
Reference Monitor
Key Control
Aligned 1.2 REQUIREMENT...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-25
Reference Monitor
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-25
Reference Monitor
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-25
Reference Monitor
Key Control
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-25
Reference Monitor
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-25
Reference Monitor
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-25
Reference Monitor
Key Control
Aligned Term Definition...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned d) Authorizing access to Information Assets....
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned e) Reviewing and approving all modifications to owned applic...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 GENERAL USER RESPONSIBILITIES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Should obtain approval from Data Owner prior to sending....
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control | Remote Access, Access Control | Access Cont...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.6 ENFORCEMENT/COMPLIANCE...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned A.9.4.4 Access to Networks & Network Services...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Control: AC-2...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned Enforcing access restrictions for remote access is addressed...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access privileges of employees should be removed from all sy...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Overview, Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.1.3 Laptops...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned ENFORCEMENT/COMPLIANCE...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
AC-3
Access Enforcement
Key Control
Aligned Physical Access Management...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Controls such as file access limitation, time limit for acce...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Control over User access to information services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned iv. Control over User access to information services is enfo...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access to Networks & Network Services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access to Information Resources should be controlled through...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control | Separation of Duties and Least Privilege...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control to Program Source Code...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control to Program Source Code...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AC-3
Access Enforcement
Key Control
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2.3 Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-3
Access Enforcement
Key Control
Aligned Role Functional Activities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned 1.5 CLOUD SECURITY MANAGEMENT...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AC-3
Access Enforcement
Key Control
Aligned 8. ENFORCEMENT/COMPLIANCE...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control | Access Enforcement...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned Definition of access control and access management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned access restricted to prevent inappropriate disclosure and ta...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned Access Control | Access Enforcement...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-3
Access Enforcement
Key Control
Aligned Definition of access control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Data Custodian...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Control baselines are predefined sets of controls specifical...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned NIST CSF Subcategory Control Reference Control Name...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned c. Internet Use Restrictions...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned A.9.4.1 - A.13.2.1...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Control: AC-4: Information flow control regulates where info...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Firewall Security...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Access Control | Information Flow Enforcement...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Access Control | Information Flow Enforcement...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned User access authorization forms and responsibilities of Info...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned 8. ENFORCEMENT/COMPLIANCE...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Access Control | Information Flow Enforcement...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Access Control | Information Flow Enforcement...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned organization’s information systems should be appropriately s...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-4
Information Flow Enforcement
Key Control
Aligned Data and objects containing data should be assigned a classi...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-5
Separation of Duties
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Account Management and User Responsibilities...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AC-5
Separation of Duties
Key Control
Aligned Data Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-5
Separation of Duties
Key Control
Aligned The selection of a control baseline is determined by the nee...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-5
Separation of Duties
Key Control
Aligned NIST CSF Subcategory Control Reference Control Name...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-5
Separation of Duties
Key Control
Aligned 1.3 SEGREGATION OF DUTIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Segregation of duties...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Scope & Applicability...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-5
Separation of Duties
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned General User Account...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Access Control | Separation of Duties...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-5
Separation of Duties
Key Control
Aligned Access Control | Separation of Duties...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-5
Separation of Duties
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-5
Separation of Duties
Key Control
Aligned Management of Privileged Access Rights...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-5
Separation of Duties
Key Control
Aligned Access Control | Separation of Duties...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-5
Separation of Duties
Key Control
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-5
Separation of Duties
Key Control
Aligned Access Control | Separation of Duties...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-6
Least Privilege
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AC-6
Least Privilege
Aligned Baselines represent a starting point for the protection of i...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-6
Least Privilege
Aligned NIST CSF Subcategory Control Reference Control Name...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-6
Least Privilege
Aligned Controls are selected and implemented in order to satisfy sy...
anonymized_6.1_IS_Data_Security_Standards.pdf
AC-6
Least Privilege
Aligned Control: AC-2...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AC-6
Least Privilege
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-6
Least Privilege
Aligned SCOPE & APPLICABILITY...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-6
Least Privilege
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-6
Least Privilege
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AC-6
Least Privilege
Aligned 1.1.3 Laptops...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AC-6
Least Privilege
Aligned Privileged (Application Administration) Account...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-6
Least Privilege
Aligned Users are provided access only to those services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-6
Least Privilege
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-6
Least Privilege
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-6
Least Privilege
Aligned Access is based on an employee/contractor’s role and should ...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-6
Least Privilege
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-6
Least Privilege
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-6
Least Privilege
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-6
Least Privilege
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AC-6
Least Privilege
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-6
Least Privilege
Aligned Access Control | Least Privilege...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-6
Least Privilege
Aligned Definition of access management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-7
Unsuccessful Logon Attempts
Aligned It also includes the periodic review of information system a...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-7
Unsuccessful Logon Attempts
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-7
Unsuccessful Logon Attempts
Aligned g) All systems should require at a minimum a username and pa...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-7
Unsuccessful Logon Attempts
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-8
System Use Notification
Aligned 1.2 SYSTEM USE NOTIFICATION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-8
System Use Notification
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AC-8
System Use Notification
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AC-8
System Use Notification
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-8
System Use Notification
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AC-8
System Use Notification
Aligned VII. Test adopts the NIST CSF and ISO 27001 standards as the...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AC-8
System Use Notification
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AC-9
Previous Logon Notification
Aligned 1.2 SYSTEM USE NOTIFICATION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-9
Previous Logon Notification
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned INFORMATION SECURITY AWARENESS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned Awareness and Training Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned Privileged users understanding roles and responsibilities...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-1
Policy and Procedures
Key Control
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AT-1
Policy and Procedures
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AT-1
Policy and Procedures
Key Control
Aligned Awareness and training policy and procedures address the con...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-1
Policy and Procedures
Key Control
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AT-1
Policy and Procedures
Key Control
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned Awareness & Training | Role-based Training...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned i. Privileged users should understand their roles and respon...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-2
Literacy Training and Awareness
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AT-2
Literacy Training and Awareness
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AT-2
Literacy Training and Awareness
Aligned System & Information Integrity | System Monitoring...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AT-2
Literacy Training and Awareness
Aligned Information Security Awareness, Education and Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-2
Literacy Training and Awareness
Aligned 1.6 CLOUD SECURITY TRAINING & AWARENESS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AT-2
Literacy Training and Awareness
Aligned Security Awareness & Skills Training...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AT-2
Literacy Training and Awareness
Aligned Security Awareness & Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Security Awareness & Skills Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Security Awareness & Skills Training...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned 1.3 ROLES AND RESPONSIBILITIES...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AT-3
Role-based Training
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Incident Response | Incident Response Training...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
AT-3
Role-based Training
Key Control
Aligned SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AT-3
Role-based Training
Key Control
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-3
Role-based Training
Key Control
Aligned Information Security Awareness, Education and Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-3
Role-based Training
Key Control
Aligned Awareness & Training | Role-based Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AT-3
Role-based Training
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-3
Role-based Training
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Scope...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AT-3
Role-based Training
Key Control
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AT-3
Role-based Training
Key Control
Aligned Security Awareness & Skills Training...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AT-3
Role-based Training
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AT-4
Training Records
Aligned 1.8 DATA RETENTION and 1.9 ROLES & RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AT-4
Training Records
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-6
Training Feedback
Aligned Training and testing shall include lessons learned from prev...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AU-1
Policy and Procedures
Key Control
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-1
Policy and Procedures
Key Control
Aligned 1.6 Exception...
anonymized_7.1_IS_Asset_Management_Standard.pdf
AU-1
Policy and Procedures
Key Control
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-1
Policy and Procedures
Key Control
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AU-1
Policy and Procedures
Key Control
Aligned Divisions & Functions are free to define and implement stron...
anonymized_9.1_IS_Cryptography_Standards.pdf
AU-1
Policy and Procedures
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned An audit log should be maintained of all access to program s...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned Ensuring the resolution of information security-related audi...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-1
Policy and Procedures
Key Control
Aligned Performance will be identified and measured by: ......
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
AU-1
Policy and Procedures
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-1
Policy and Procedures
Key Control
Aligned Cloud security audit plans, activities, and operational acti...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
AU-1
Policy and Procedures
Key Control
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AU-1
Policy and Procedures
Key Control
Aligned Audit and accountability policy and procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-10
Non-repudiation
Aligned Activity...
anonymized_6.1_IS_Data_Security_Standards.pdf
AU-10
Non-repudiation
Aligned iii. Non-repudiation services should be used to resolve a di...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AU-10
Non-repudiation
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
AU-11
Audit Record Retention
Key Control
Aligned 1.8 DATA RETENTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-11
Audit Record Retention
Key Control
Aligned Evidence of account and privilege reviews should document th...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-11
Audit Record Retention
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-11
Audit Record Retention
Key Control
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AU-12
Audit Record Generation
Gap Audit records can be generated from many different system components. The event types specified in A...
AU-13
Monitoring for Information Disclosure
Aligned Organizations monitor systems by observing audit activities ...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned Restricted Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned System monitoring is an integral part of organizational cont...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AU-13
Monitoring for Information Disclosure
Aligned Data Security classification policy...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AU-13
Monitoring for Information Disclosure
Aligned Term Definitions...
anonymized_6.1_IS_Data_Security_Standards.pdf
AU-13
Monitoring for Information Disclosure
Aligned Documentation provides user and administrator guidance for t...
anonymized_6.1_IS_Data_Security_Standards.pdf
AU-13
Monitoring for Information Disclosure
Aligned 2.1 Acceptable Use Standard...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-13
Monitoring for Information Disclosure
Aligned Monitoring of User’s device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-13
Monitoring for Information Disclosure
Aligned DOCUMENT CLASSIFICATION...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned Organizations monitor systems by observing audit activities ...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned DOCUMENT CLASSIFICATION and restrictions on information use...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned Detailed analysis of these logs should be used to update and...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-13
Monitoring for Information Disclosure
Aligned Section e) Event logs can contain sensitive data and persona...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-13
Monitoring for Information Disclosure
Aligned IS Cryptography Policy...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned DOCUMENT CLASSIFICATION...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
AU-13
Monitoring for Information Disclosure
Aligned DOCUMENT CLASSIFICATION...
anonymized_9.1_IS_Cryptography_Standards.pdf
AU-13
Monitoring for Information Disclosure
Aligned DOCUMENT CLASSIFICATION...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
AU-13
Monitoring for Information Disclosure
Aligned Definition of Confidentiality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AU-13
Monitoring for Information Disclosure
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-13
Monitoring for Information Disclosure
Aligned 16.0 Maintaining Security during BC/DR Policy...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
AU-13
Monitoring for Information Disclosure
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-14
Session Audit
Key Control
Aligned Monitoring Internet usage and employee privacy expectations...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AU-14
Session Audit
Key Control
Aligned Monitoring of User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-14
Session Audit
Key Control
Aligned Section d) Resource Administrators should regularly review t...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-14
Session Audit
Key Control
Aligned Audit & Accountability | Cross-Organizational Audit Logging...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-14
Session Audit
Key Control
Aligned Definition of Information Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
AU-14
Session Audit
Key Control
Aligned Audit & Accountability | Session Audit...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-16
Cross-organizational Audit Logging
Key Control
Aligned 1.7 PROTECTION OF LOG INFORMATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-16
Cross-organizational Audit Logging
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-16
Cross-organizational Audit Logging
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-16
Cross-organizational Audit Logging
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-16
Cross-organizational Audit Logging
Key Control
Aligned Audit & Accountability | Session Audit...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-2
Event Logging
Key Control
Aligned 1.7 PROTECTION OF LOG INFORMATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-2
Event Logging
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-2
Event Logging
Key Control
Aligned Section d) Resource Administrators should regularly review t...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-2
Event Logging
Key Control
Aligned The privileged account holders should be prevented from mani...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AU-2
Event Logging
Key Control
Aligned An audit log should be maintained of all access to program s...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-2
Event Logging
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-2
Event Logging
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-2
Event Logging
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-2
Event Logging
Key Control
Aligned Event Logging...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-2
Event Logging
Key Control
Aligned Higher levels of assurance are required for protection, rete...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-3
Content of Audit Records
Key Control
Aligned Section d) Resource Administrators should regularly review t...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-3
Content of Audit Records
Key Control
Aligned Section e) Event logs can contain sensitive data and persona...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-3
Content of Audit Records
Key Control
Aligned Section e) Event logs can contain sensitive data and persona...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-3
Content of Audit Records
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-3
Content of Audit Records
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-3
Content of Audit Records
Key Control
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AU-4
Audit Log Storage Capacity
Key Control
Aligned 1.7 PROTECTION OF LOG INFORMATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-4
Audit Log Storage Capacity
Key Control
Aligned Automated tools (e.g., security information and event manage...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-4
Audit Log Storage Capacity
Key Control
Aligned Section d) Resource Administrators should regularly review t...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-4
Audit Log Storage Capacity
Key Control
Aligned e) An audit log should be maintained of all access to progra...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-5
Response to Audit Logging Process Failures
Key Control
Aligned 1.7 PROTECTION OF LOG INFORMATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-5
Response to Audit Logging Process Failures
Key Control
Aligned This includes security related events, capacity or performan...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-5
Response to Audit Logging Process Failures
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-5
Response to Audit Logging Process Failures
Key Control
Aligned Section d) Resource Administrators should regularly review t...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Monitoring of User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Voice Communications Equipment protection measures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Evidence Collection and Preservation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Ensuring the resolution of information security-related audi...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Audit & Accountability | Audit Review, Analysis, And Reporti...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-6
Audit Record Review, Analysis, and Reporting
Key Control
Aligned Audit & Accountability | Session Audit...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
AU-7
Audit Record Reduction and Report Generation
Key Control
Aligned Audit & Accountability | Session Audit...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-8
Time Stamps
Aligned External and internal requirements for time representation, ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-8
Time Stamps
Aligned Test’s approach to obtaining a reference time from external ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-9
Protection of Audit Information
Key Control
Aligned 1.7 PROTECTION OF LOG INFORMATION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
AU-9
Protection of Audit Information
Key Control
Aligned Audit & Accountability | Session Audit...
anonymized_11.0_IS_Operations_Security_Policy.pdf
AU-9
Protection of Audit Information
Key Control
Aligned Audit and Accountability...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
AU-9
Protection of Audit Information
Key Control
Aligned Management of User Authentication...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
AU-9
Protection of Audit Information
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned Section 1.6 - EXCEPTION...
anonymized_7.1_IS_Asset_Management_Standard.pdf
CA-1
Policy and Procedures
Key Control
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CA-1
Policy and Procedures
Key Control
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CA-1
Policy and Procedures
Key Control
Aligned Assessment, authorization, and monitoring policy and procedu...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned Assessment, authorization, and monitoring policy and procedu...
anonymized_9.1_IS_Cryptography_Standards.pdf
CA-1
Policy and Procedures
Key Control
Aligned Assessment, authorization, and monitoring policy and procedu...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CA-1
Policy and Procedures
Key Control
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.1 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-1
Policy and Procedures
Key Control
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CA-1
Policy and Procedures
Key Control
Aligned Audit plans should be developed and maintained...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CA-1
Policy and Procedures
Key Control
Aligned Control Assessment...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CA-2
Control Assessments
Key Control
Aligned DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CA-2
Control Assessments
Key Control
Aligned Assessment, Authorization, and Monitoring | Control Assessme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CA-2
Control Assessments
Key Control
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
CA-2
Control Assessments
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-2
Control Assessments
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-2
Control Assessments
Key Control
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CA-2
Control Assessments
Key Control
Aligned Assessment of & Decision on Information Security Events...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CA-2
Control Assessments
Key Control
Aligned Control Assessment...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CA-3
Information Exchange
Key Control
Aligned Data transmission...
anonymized_6.1_IS_Data_Security_Standards.pdf
CA-3
Information Exchange
Key Control
Aligned A.9.4.1 - A.13.2.1...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CA-3
Information Exchange
Key Control
Aligned External connections to Test networks or Information Resourc...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CA-3
Information Exchange
Key Control
Aligned Encryption is to be used to protect the confidentiality of r...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CA-3
Information Exchange
Key Control
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-3
Information Exchange
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-5
Plan of Action and Milestones
Aligned Eradication Plan and Approval Process...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CA-5
Plan of Action and Milestones
Aligned Account Remediation Project Plans...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CA-6
Authorization
Key Control
Aligned Authorization levels should be defined and documented....
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CA-6
Authorization
Key Control
Aligned Roles and Responsibilities...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CA-6
Authorization
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CA-6
Authorization
Key Control
Aligned Authorization and Approval Procedures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CA-6
Authorization
Key Control
Aligned Access Authorization Process...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CA-6
Authorization
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Monitoring of User’s device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Continuous Monitoring of Systems...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Overview and Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CA-7
Continuous Monitoring
Key Control
Aligned SUSPECTED AND ACTUAL DATA BREACH AND NOTIFICATION...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Continuous monitoring requirements...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Network Monitoring & Defense...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Assessment, Authorization, and Monitoring | Continuous Monit...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Assessment, Authorization, and Monitoring | Continuous Monit...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Performance will be identified and measured by...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
CA-7
Continuous Monitoring
Key Control
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-7
Continuous Monitoring
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Assessment of & Decision on Information Security Events...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CA-7
Continuous Monitoring
Key Control
Aligned Assessment of & Decision on Information Security Events...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CA-7
Continuous Monitoring
Key Control
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CA-7
Continuous Monitoring
Key Control
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CA-8
Penetration Testing
Aligned Assessment, Authorization, and Monitoring | Penetration Test...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CA-8
Penetration Testing
Aligned The Information Security Team should utilize specialized sof...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CA-9
Internal System Connections
Key Control
Aligned 1.2. Hardware, Software, Applications and Data - Inventory o...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-9
Internal System Connections
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
CM-1
Policy and Procedures
Aligned Configuration Management Policy and Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
CM-1
Policy and Procedures
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CM-1
Policy and Procedures
Aligned Section 1.6 - Configuration Management Policy and Procedures...
anonymized_7.1_IS_Asset_Management_Standard.pdf
CM-1
Policy and Procedures
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
CM-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-1
Policy and Procedures
Aligned CM-1...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-1
Policy and Procedures
Aligned 1.1 PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CM-1
Policy and Procedures
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CM-1
Policy and Procedures
Aligned Exceptions...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CM-1
Policy and Procedures
Aligned Configuration Management Policy and Procedures...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CM-1
Policy and Procedures
Aligned Configuration Management Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
CM-1
Policy and Procedures
Aligned Configuration management database should maintain the versio...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-1
Policy and Procedures
Aligned Configuration Management | Configuration Settings...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-1
Policy and Procedures
Aligned Security and privacy documentation requirements...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-1
Policy and Procedures
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
CM-1
Policy and Procedures
Aligned Configuration Management Policy and Procedures...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-1
Policy and Procedures
Aligned Configuration Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-10
Software Usage Restrictions
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-11
User-installed Software
Aligned Installation of Software on User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CM-11
User-installed Software
Aligned Restrictions on software installations...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-11
User-installed Software
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-12
Information Location
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CM-12
Information Location
Aligned Scope...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
CM-12
Information Location
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
CM-12
Information Location
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CM-12
Information Location
Aligned Perimeter security and restrictions on access to sensitive a...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
CM-12
Information Location
Aligned User Access Authorization and Responsibilities...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-12
Information Location
Aligned Cloud Service Provider physical locations, including data ce...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-13
Data Action Mapping
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CM-13
Data Action Mapping
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
CM-13
Data Action Mapping
Aligned V. Bring Your Own Device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CM-13
Data Action Mapping
Aligned Section d) and e)...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-13
Data Action Mapping
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-13
Data Action Mapping
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-13
Data Action Mapping
Aligned Data Governance and Data Privacy...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-14
Signed Components
Aligned Certificate...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CM-14
Signed Components
Aligned Restrictions on software installations...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-14
Signed Components
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned CM-2...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Configuration Settings...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | System Component Inventory...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-2
Baseline Configuration
Aligned Deviations from baseline configuration...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-2
Baseline Configuration
Aligned Configuration Management | Configuration Change Control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-2
Baseline Configuration
Aligned Configuration Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management | Access Restrictions for Change...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-3
Configuration Change Control
Key Control
Aligned CM-3...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-3
Configuration Change Control
Key Control
Aligned NIST CSF Subcategory Control Reference Control Name...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-3
Configuration Change Control
Key Control
Aligned Internal Change Management implementation....
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CM-3
Configuration Change Control
Key Control
Aligned strict change control procedures need to be followed for any...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration management database should maintain the versio...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management | Configuration Settings...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-3
Configuration Change Control
Key Control
Aligned Controls can include technical, administrative, and physical...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-3
Configuration Change Control
Key Control
Aligned 1.14 POLICY CHANGE, REVIEW & UPDATE CHANGE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-3
Configuration Change Control
Key Control
Aligned 1.15 POLICY COMPLIANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-3
Configuration Change Control
Key Control
Aligned 1.16 MAINTAINENCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Change Control...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management | Configuration Change Control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management | Configuration Change Control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-3
Configuration Change Control
Key Control
Aligned Configuration Management | Configuration Change Control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-4
Impact Analyses
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CM-4
Impact Analyses
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CM-4
Impact Analyses
Aligned An analysis of the general information security practices ap...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-4
Impact Analyses
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-4
Impact Analyses
Aligned Role Functional Activities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-4
Impact Analyses
Aligned Impact Assessment...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CM-4
Impact Analyses
Aligned Configuration Management | Impact Analyses...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-4
Impact Analyses
Aligned Configuration Management | Impact Analyses...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-4
Impact Analyses
Aligned Configuration Management | Impact Analyses...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned Access groupings will be developed and tested prior to the i...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned Refer to the Access Control Policy for additional details....
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned Section 9: Equipment and media containing confidential infor...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned Change Management implementation....
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-5
Access Restrictions for Change
Key Control
Aligned 1.2.3 Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CM-6
Configuration Settings
Aligned IV. Maintaining Security while using Organizationally Owned ...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CM-6
Configuration Settings
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-6
Configuration Settings
Aligned Section 4.6 - Configuration Settings...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CM-6
Configuration Settings
Aligned Logical access controls and vendor-supplied defaults...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-6
Configuration Settings
Aligned End-user Device Security Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-6
Configuration Settings
Aligned Configuration Management | Configuration Settings...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-6
Configuration Settings
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-6
Configuration Settings
Aligned Deviations from baseline configuration defined by the IT Inf...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
CM-7
Least Functionality
Aligned f) Logical access controls should be applied to isolate sens...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-7
Least Functionality
Aligned Configuration Management | Configuration Settings...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-7
Least Functionality
Aligned Configuration Management | Least Functionality...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-8
System Component Inventory
Key Control
Aligned System Component Inventory...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CM-8
System Component Inventory
Key Control
Aligned 1.3 SUPPLIER INVENTORY...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CM-8
System Component Inventory
Key Control
Aligned Asset Management – Establishes controls for asset identifica...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-8
System Component Inventory
Key Control
Aligned 1.2. Hardware, Software, Applications and Data - Inventory o...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-8
System Component Inventory
Key Control
Aligned Configuration Management | System Component Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-8
System Component Inventory
Key Control
Aligned Configuration Management | System Component Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CM-9
Configuration Management Plan
Aligned Configuration management database should maintain the versio...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CM-9
Configuration Management Plan
Aligned Configuration Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CM-9
Configuration Management Plan
Aligned Control ID Security Control Name Requirements...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-1
Policy and Procedures
Aligned Contingency Planning Policy and Procedures...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CP-1
Policy and Procedures
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
CP-1
Policy and Procedures
Aligned Contingency planning policy and procedures...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
CP-1
Policy and Procedures
Aligned Contingency planning policy and procedures...
anonymized_7.1_IS_Asset_Management_Standard.pdf
CP-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-1
Policy and Procedures
Aligned Contingency planning policy and procedures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CP-1
Policy and Procedures
Aligned Contingency planning policy and procedures...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
CP-1
Policy and Procedures
Aligned Contingency Planning Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
CP-1
Policy and Procedures
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
CP-1
Policy and Procedures
Aligned Contingency Planning Policy and Procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-1
Policy and Procedures
Aligned Information Security Aspects of Business Continuity Manageme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CP-1
Policy and Procedures
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CP-1
Policy and Procedures
Aligned Contingency Planning Policy and Procedures...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-1
Policy and Procedures
Aligned Contingency planning policy and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CP-1
Policy and Procedures
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-1
Policy and Procedures
Aligned Business Continuity Management & Operational Resilience...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-1
Policy and Procedures
Aligned Contingency Planning Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-1
Policy and Procedures
Aligned A consistent unified framework for business continuity plann...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-10
System Recovery and Reconstitution
Aligned Contingency Planning and Recovery Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-10
System Recovery and Reconstitution
Aligned Recovery...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-10
System Recovery and Reconstitution
Aligned Contingency Planning | System Recovery and Reconstitution...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-10
System Recovery and Reconstitution
Aligned Contingency Planning | Alternate Processing Site, Contingenc...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-11
Alternate Communications Protocols
Aligned Contingency Planning | Contingency Plan...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-11
Alternate Communications Protocols
Aligned Contingency Planning | Alternate Communications Protocols...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-11
Alternate Communications Protocols
Aligned Contingency Planning | Alternate Communications Protocols...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-11
Alternate Communications Protocols
Aligned Contingency Planning | Alternate Communications Protocols...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-12
Safe Mode
Gap For systems that support critical mission and business functions—including military operations...
CP-13
Alternative Security Mechanisms
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CP-13
Alternative Security Mechanisms
Aligned Recovery...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-13
Alternative Security Mechanisms
Aligned Information Security Aspects of Business Continuity Manageme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-13
Alternative Security Mechanisms
Aligned 1.2 GOVERNANCE - Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-13
Alternative Security Mechanisms
Aligned 1.2 GOVERNANCE - Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-13
Alternative Security Mechanisms
Aligned Contingency Planning | Alternative Security Mechanisms...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-2
Contingency Plan
Aligned Contingency Planning Policy and Procedures...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CP-2
Contingency Plan
Aligned Contingency Planning...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-2
Contingency Plan
Aligned Contingency planning for systems is part of an overall progr...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-2
Contingency Plan
Aligned Information Security Aspects of Business Continuity Manageme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-2
Contingency Plan
Aligned Contingency Planning Policy and Procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-2
Contingency Plan
Aligned Information Security Aspects of Business Continuity Manageme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-2
Contingency Plan
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-2
Contingency Plan
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-2
Contingency Plan
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-2
Contingency Plan
Aligned Contingency planning for systems is part of an overall progr...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CP-2
Contingency Plan
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-2
Contingency Plan
Aligned Contingency Planning | Contingency Plan...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-2
Contingency Plan
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-2
Contingency Plan
Aligned Contingency Planning | Contingency Plan...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-2
Contingency Plan
Aligned Business Continuity Management & Operational Resilience...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-2
Contingency Plan
Aligned Contingency Planning | Contingency Plan...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-2
Contingency Plan
Aligned A consistent unified framework for business continuity plann...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-3
Contingency Training
Key Control
Aligned 1.3 ROLES AND RESPONSIBILITIES...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-3
Contingency Training
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CP-3
Contingency Training
Key Control
Aligned Preparation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-3
Contingency Training
Key Control
Aligned Contingency Planning | Contingency Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
CP-3
Contingency Training
Key Control
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
CP-3
Contingency Training
Key Control
Aligned Contingency Planning Policy and Procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
CP-3
Contingency Training
Key Control
Aligned 1.1 SCOPE & APPLICABILITY and 1.2 REQUIREMENTS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CP-3
Contingency Training
Key Control
Aligned Contingency training and incident management training...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
CP-3
Contingency Training
Key Control
Aligned Business Continuity Management & Operational Resilience...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-3
Contingency Training
Key Control
Aligned Contingency training provided by organizations is linked to ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-4
Contingency Plan Testing
Aligned Contingency Planning | Contingency Plan Testing...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-4
Contingency Plan Testing
Aligned Contingency Planning | Contingency Plan Testing...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-4
Contingency Plan Testing
Aligned Contingency Planning | Contingency Plan Testing...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-4
Contingency Plan Testing
Aligned Preparation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
CP-4
Contingency Plan Testing
Aligned Business Continuity and Disaster Recovery Planning and Testi...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
CP-4
Contingency Plan Testing
Aligned Business Continuity Planning and Plan Development...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-4
Contingency Plan Testing
Aligned System change control procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-6
Alternate Storage Site
Key Control
Aligned Contingency Planning | Alternate Storage Site...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-6
Alternate Storage Site
Key Control
Aligned Contingency Planning | Alternate Storage Site...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-6
Alternate Storage Site
Key Control
Aligned Contingency Planning | Alternate Storage Site...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-6
Alternate Storage Site
Key Control
Aligned Contingency Planning | Alternate Storage Site...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-6
Alternate Storage Site
Key Control
Aligned Restrictions on software installation and System change cont...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-7
Alternate Processing Site
Key Control
Aligned Cloud Service Provider physical locations, including data ce...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
CP-7
Alternate Processing Site
Key Control
Aligned Contingency Planning | Alternate Processing Site...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-7
Alternate Processing Site
Key Control
Aligned Contingency Planning | Alternate Processing Site...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-7
Alternate Processing Site
Key Control
Aligned Contingency Planning | Alternate Processing Site...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-8
Telecommunications Services
Key Control
Aligned Contingency Planning | Telecommunications Services...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-8
Telecommunications Services
Key Control
Aligned Contingency Planning | Telecommunications Services...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
CP-9
System Backup
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
CP-9
System Backup
Key Control
Aligned Protection of system backup information while in transit is ...
anonymized_6.1_IS_Data_Security_Standards.pdf
CP-9
System Backup
Key Control
Aligned Contingency Planning | System Backup...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-9
System Backup
Key Control
Aligned Contingency Planning | System Backup...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-9
System Backup
Key Control
Aligned Contingency Planning | System Backup...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-9
System Backup
Key Control
Aligned Data Backup...
anonymized_11.0_IS_Operations_Security_Policy.pdf
CP-9
System Backup
Key Control
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
CP-9
System Backup
Key Control
Aligned Data on laptops should be backed up to a server rather than ...
anonymized_7.2_IS_End_User_Device_Standard.pdf
CP-9
System Backup
Key Control
Aligned 1.2.1 Backup...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CP-9
System Backup
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-9
System Backup
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-9
System Backup
Key Control
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IA-1
Policy and Procedures
Key Control
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IA-1
Policy and Procedures
Key Control
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-1
Policy and Procedures
Key Control
Aligned Chunk: 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-1
Policy and Procedures
Key Control
Aligned Identification and Authentication Policy and Procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-1
Policy and Procedures
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IA-1
Policy and Procedures
Key Control
Aligned Identification and authentication policy and procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
IA-1
Policy and Procedures
Key Control
Aligned Supplier and/or contractor is required to assess the nature ...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-1
Policy and Procedures
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-1
Policy and Procedures
Key Control
Aligned Identification and authentication policy and procedures addr...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IA-1
Policy and Procedures
Key Control
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
IA-1
Policy and Procedures
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IA-1
Policy and Procedures
Key Control
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IA-1
Policy and Procedures
Key Control
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IA-1
Policy and Procedures
Key Control
Aligned Identification and authentication policy and procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IA-10
Adaptive Authentication
Aligned Section 7.j, 7.k, and 7.l...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-10
Adaptive Authentication
Aligned 1.5 ESTABLISHING TRUST RELATIONSHIPS...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-10
Adaptive Authentication
Aligned Identification & Authentication | Adaptive Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-10
Adaptive Authentication
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-10
Adaptive Authentication
Aligned User Credential Management and Security Practices...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-11
Re-authentication
Key Control
Aligned Section 7, Sub-section j...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-11
Re-authentication
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-11
Re-authentication
Key Control
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-11
Re-authentication
Key Control
Aligned Laptops...
anonymized_7.2_IS_End_User_Device_Standard.pdf
IA-11
Re-authentication
Key Control
Aligned Identification & Authentication | Re-Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-11
Re-authentication
Key Control
Aligned Identification & Authentication | Adaptive Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-11
Re-authentication
Key Control
Aligned Identification & Authentication | Adaptive Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-11
Re-authentication
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-11
Re-authentication
Key Control
Aligned User Credential Management...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-12
Identity Proofing
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
IA-12
Identity Proofing
Key Control
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-12
Identity Proofing
Key Control
Aligned Identification & Authentication | Identity Proofing...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-12
Identity Proofing
Key Control
Aligned Identification & Authentication | Identity Proofing...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-12
Identity Proofing
Key Control
Aligned Identification & Authentication | Re-Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-12
Identity Proofing
Key Control
Aligned Identification & Authentication | Re-Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned 1.6 DATA HANDLING...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned 1.10 REMOTE ACCESS TO Test’s SYSTEMS and 1.11 USER ID & PASS...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Access Control | Remote Access...
anonymized_6.1_IS_Data_Security_Standards.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Identification and Authentication Requirements...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Identification and Authentication Requirements...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned ESTABLISHING TRUST RELATIONSHIPS...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Appropriate authentication mechanisms are applied...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned User access to networks and network services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned administering the network-level permissions granted to each ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned g) All systems should require at a minimum a username and pa...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned Access to Networks, Network Services...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
IA-2
Identification and Authentication (Organizational Users)
Key Control
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IA-3
Device Identification and Authentication
Key Control
Aligned Service Set Identifier (SSID)...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
IA-3
Device Identification and Authentication
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-3
Device Identification and Authentication
Key Control
Aligned 9. Equipment and media containing confidential information s...
anonymized_7.2_IS_End_User_Device_Standard.pdf
IA-3
Device Identification and Authentication
Key Control
Aligned Identifier (SSID)...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-3
Device Identification and Authentication
Key Control
Aligned Relevant functions that ordinary users are not authorized to...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-4
Identifier Management
Key Control
Aligned Service Set Identifier (SSID)...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
IA-4
Identifier Management
Key Control
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-4
Identifier Management
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-4
Identifier Management
Key Control
Aligned Term Definition...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-4
Identifier Management
Key Control
Aligned Identification & Authentication | Identifier Management...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-5
Authenticator Management
Aligned Account Management and Password Protection...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IA-5
Authenticator Management
Aligned Section 7, Sub-section l...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-5
Authenticator Management
Aligned Section 7: Password Management and Multi-Factor Authenticati...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-5
Authenticator Management
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IA-5
Authenticator Management
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-5
Authenticator Management
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IA-5
Authenticator Management
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-5
Authenticator Management
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-5
Authenticator Management
Aligned 1.1.3 Laptops...
anonymized_7.2_IS_End_User_Device_Standard.pdf
IA-5
Authenticator Management
Aligned Identification & Authentication | Adaptive Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-5
Authenticator Management
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-5
Authenticator Management
Aligned h) The maximum number of sequential failed password attempts...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-5
Authenticator Management
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IA-5
Authenticator Management
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IA-5
Authenticator Management
Aligned 1.5 CLOUD SECURITY MANAGEMENT...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IA-5
Authenticator Management
Aligned Definition of authentication...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IA-6
Authentication Feedback
Aligned a) The display and printing of passwords and account numbers...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned Section 7, Sub-section j, k, and l...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned SCOPE & APPLICABILITY...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned Authentication Factors...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
IA-7
Cryptographic Module Authentication
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned 1.10 REMOTE ACCESS TO Test’s SYSTEMS and 1.11 USER ID & PASS...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned User Responsibilities and Password Protection...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned Access Control | Remote Access...
anonymized_6.1_IS_Data_Security_Standards.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned Password Requirements and Multi-Factor Authentication...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned Identification and Authentication Requirements for Non-Organ...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned 1.5 ROLES & RESPONSIBILITIES...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned 1.4 NEW HIRE IDS & PASSWORDS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IA-8
Identification and Authentication (Non-organizational Users)
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IA-9
Service Identification and Authentication
Key Control
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-9
Service Identification and Authentication
Key Control
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-9
Service Identification and Authentication
Key Control
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IA-9
Service Identification and Authentication
Key Control
Aligned Identification & Authentication | Adaptive Authentication...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
IA-9
Service Identification and Authentication
Key Control
Aligned FIM Federated Identity Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-1
Policy and Procedures
Aligned Detailed explanation of why the exception is necessary and D...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IR-1
Policy and Procedures
Aligned Detailed explanation of why the exception is necessary....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_7.1_IS_Asset_Management_Standard.pdf
IR-1
Policy and Procedures
Aligned Detailed explanation of why the exception is necessary....
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-1
Policy and Procedures
Aligned Detailed explanation of why the exception is necessary....
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
IR-1
Policy and Procedures
Aligned Policy statement requiring the exception....
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
IR-1
Policy and Procedures
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-1
Policy and Procedures
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-1
Policy and Procedures
Aligned Divisions & Functions Policy Implementation...
anonymized_7.0_IS_Asset_Management_Policy.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
IR-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
IR-1
Policy and Procedures
Aligned Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-1
Policy and Procedures
Aligned 1. PURPOSE...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-1
Policy and Procedures
Aligned Incident Response Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-2
Incident Response Training
Aligned Incident Response | Incident Response Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-2
Incident Response Training
Aligned Incident Response | Incident Response Training...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
IR-2
Incident Response Training
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IR-2
Incident Response Training
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
IR-2
Incident Response Training
Aligned Incident Verification...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-2
Incident Response Training
Aligned Incident Response | Incident Response Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
IR-2
Incident Response Training
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
IR-2
Incident Response Training
Aligned Incident response training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-2
Incident Response Training
Aligned 5. Changes to cloud security systems and procedures should b...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-2
Incident Response Training
Aligned Incident Handling Team (IHT)...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-2
Incident Response Training
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-3
Incident Response Testing
Aligned Test Cyber Security Incident Response Framework...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-3
Incident Response Testing
Aligned Events that may precipitate an update to incident response t...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-3
Incident Response Testing
Aligned Evaluation of Policies Effectiveness...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-3
Incident Response Testing
Aligned Business Continuity and Disaster Recovery planning, testing,...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
IR-3
Incident Response Testing
Aligned Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-3
Incident Response Testing
Aligned Incident Handling Team (IHT)...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-3
Incident Response Testing
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Role Responsibility Information Technology Department and CI...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
IR-4
Incident Handling
Aligned 1.4 CONTACT WITH AUTHORITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-4
Incident Handling
Aligned Incident Response Management...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Handling...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Handling...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IR-4
Incident Handling
Aligned Incident Verification and Classification...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-4
Incident Handling
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-4
Incident Handling
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-4
Incident Handling
Aligned Supplier Relationship and Legal Department Responsibilities...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IR-4
Incident Handling
Aligned Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-4
Incident Handling
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Handling...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-4
Incident Handling
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-4
Incident Handling
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Handling...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-4
Incident Handling
Aligned Incident Handling...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Monitoring...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-4
Incident Handling
Aligned Incident Response | Incident Handling...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-5
Incident Monitoring
Aligned Incident Response Management...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-5
Incident Monitoring
Aligned Response to Information Security Incidents...
anonymized_11.0_IS_Operations_Security_Policy.pdf
IR-5
Incident Monitoring
Aligned Post-mortem analysis of the way an incident was handled...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-5
Incident Monitoring
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-5
Incident Monitoring
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IR-5
Incident Monitoring
Aligned Section 9: Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-5
Incident Monitoring
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-5
Incident Monitoring
Aligned Incident Response | Incident Handling...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-6
Incident Reporting
Aligned 1.4 CONTACT WITH AUTHORITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
IR-6
Incident Reporting
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-6
Incident Reporting
Aligned Performance will be identified and measured by: Compliance w...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
IR-6
Incident Reporting
Aligned Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-6
Incident Reporting
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-7
Incident Response Assistance
Aligned Incident Tracking System (ITS) documentation requirements...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-7
Incident Response Assistance
Aligned Incident Response | Incident Handling...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-7
Incident Response Assistance
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident Response Capabilities...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident response training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-8
Incident Response Plan
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-8
Incident Response Plan
Aligned Supplier Relationship Management and Responsibilities...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
IR-8
Incident Response Plan
Aligned 5. Changes to cloud security systems and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
IR-8
Incident Response Plan
Aligned Response to Information Security Incidents...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-8
Incident Response Plan
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
IR-8
Incident Response Plan
Aligned Incident Response Plan...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident Response | Incident Response Plan...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-8
Incident Response Plan
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
IR-9
Information Spillage Response
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
IR-9
Information Spillage Response
Aligned Containment Plan of Action...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
IR-9
Information Spillage Response
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
IR-9
Information Spillage Response
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
MA-1
Policy and Procedures
Aligned 1.11 MAINTENANCE and 1.12 EXCEPTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MA-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MA-1
Policy and Procedures
Aligned Chunk: 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
MA-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MA-1
Policy and Procedures
Aligned Chunk: 1.9...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MA-1
Policy and Procedures
Aligned Exception duration and detailed explanation of why the excep...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
MA-1
Policy and Procedures
Aligned Maintenance policy and procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
MA-1
Policy and Procedures
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
MA-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
MA-1
Policy and Procedures
Aligned Maintenance policy and procedures...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
MA-1
Policy and Procedures
Aligned Maintenance policy and procedures...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
MA-2
Controlled Maintenance
Key Control
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
MA-3
Maintenance Tools
Aligned 1.6 MAINTENANCE...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
MA-4
Nonlocal Maintenance
Aligned 1.6 DATA HANDLING...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MA-4
Nonlocal Maintenance
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
MA-5
Maintenance Personnel
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MA-5
Maintenance Personnel
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
MA-5
Maintenance Personnel
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MA-5
Maintenance Personnel
Key Control
Aligned Supplier and/or contractor is required to assess the nature ...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MA-5
Maintenance Personnel
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
MA-5
Maintenance Personnel
Key Control
Aligned Identification and Authentication | Identity Proofing...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MA-6
Timely Maintenance
Key Control
Gap Organizations specify the system components that result in increased risk to organizational operatio...
Critical Gap - Key Control Missing
MA-7
Field Maintenance
Gap Field maintenance is the type of maintenance conducted on a system or system component after the sys...
MP-1
Policy and Procedures
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-1
Policy and Procedures
Aligned Media Protection | Media Marking, Media Storage, Media Trans...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MP-1
Policy and Procedures
Aligned 1.6 EXCEPTION...
anonymized_7.1_IS_Asset_Management_Standard.pdf
MP-1
Policy and Procedures
Aligned Media protection policy and procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
MP-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-1
Policy and Procedures
Aligned Media Protection | Policy & Procedure...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-1
Policy and Procedures
Aligned Media Protection | Policy & Procedure...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-1
Policy and Procedures
Aligned Media protection policy and procedures...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
MP-1
Policy and Procedures
Aligned Control References...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-1
Policy and Procedures
Aligned Media protection policy and procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
MP-1
Policy and Procedures
Aligned Acceptable Use of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
MP-1
Policy and Procedures
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
MP-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
MP-2
Media Access
Aligned 1.12 REMOVEABLE STORAGE DEVICES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
MP-2
Media Access
Aligned Media Protection | Media Marking, Media Protection | Media S...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-2
Media Access
Aligned 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MP-2
Media Access
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-2
Media Access
Aligned Media Protection | Media Access...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-2
Media Access
Aligned Media Protection | Media Access...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-2
Media Access
Aligned Media Protection | Media Access...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-2
Media Access
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
MP-2
Media Access
Aligned Control References...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-2
Media Access
Aligned Section IV. Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MP-2
Media Access
Aligned Media Protection | Policy & Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-3
Media Marking
Aligned Media Protection | Media Marking...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-3
Media Marking
Aligned Audit & Accountability | Session Audit...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-3
Media Marking
Aligned Media Protection | Media Marking...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-3
Media Marking
Aligned Media Protection | Media Marking...
anonymized_11.0_IS_Operations_Security_Policy.pdf
MP-3
Media Marking
Aligned 1.13 CONTROL REFERENCES...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-3
Media Marking
Aligned Media Protection | Media Marking...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-3
Media Marking
Aligned Control References...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-3
Media Marking
Aligned DOCUMENT CLASSIFICATION...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
MP-3
Media Marking
Aligned Media Protection | Media Marking...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-4
Media Storage
Aligned 1.12 REMOVEABLE STORAGE DEVICES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
MP-4
Media Storage
Aligned Media Protection | Media Storage...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-4
Media Storage
Aligned 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MP-4
Media Storage
Aligned 1.13 CONTROL REFERENCES...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-4
Media Storage
Aligned Media Protection | Media Storage...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-4
Media Storage
Aligned Control References...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-4
Media Storage
Aligned Media Protection...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-4
Media Storage
Aligned Media Protection and Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MP-4
Media Storage
Aligned Asset Management and Access Control...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
MP-4
Media Storage
Aligned Media Protection | Media Storage...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-5
Media Transport
Key Control
Aligned Disposal of Media, Physical Media Transfer...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-5
Media Transport
Key Control
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-5
Media Transport
Key Control
Aligned Required - Encrypt PII/NPI data element under regulatory, le...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-5
Media Transport
Key Control
Aligned 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MP-5
Media Transport
Key Control
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-5
Media Transport
Key Control
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-5
Media Transport
Key Control
Aligned Only USB sticks and other removable devices that have been a...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-5
Media Transport
Key Control
Aligned Media Protection | Media Transport...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-5
Media Transport
Key Control
Aligned Media Protection...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-5
Media Transport
Key Control
Aligned IV. Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MP-5
Media Transport
Key Control
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
MP-5
Media Transport
Key Control
Aligned Media Protection | Media Transport...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-6
Media Sanitization
Aligned Continuous Vulnerability Management...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-6
Media Sanitization
Aligned Secure Disposal or Re-Use of Equipment...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-6
Media Sanitization
Aligned Media Protection | Media Sanitization...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-6
Media Sanitization
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-6
Media Sanitization
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
MP-6
Media Sanitization
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
MP-6
Media Sanitization
Aligned Media Protection | Media Sanitization...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-6
Media Sanitization
Aligned Media Protection | Media Sanitization...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-6
Media Sanitization
Aligned Media Protection...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-6
Media Sanitization
Aligned Secure disposal of records...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MP-6
Media Sanitization
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
MP-6
Media Sanitization
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
MP-6
Media Sanitization
Aligned Media Protection | Policy & Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-7
Media Use
Key Control
Aligned Disposal of Media, Physical Media Transfer...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
MP-7
Media Use
Key Control
Aligned 1.12 REMOVEABLE STORAGE DEVICES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
MP-7
Media Use
Key Control
Aligned Media use protections also apply to mobile devices with info...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-7
Media Use
Key Control
Aligned 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
MP-7
Media Use
Key Control
Aligned 1.13 CONTROL REFERENCES...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
MP-7
Media Use
Key Control
Aligned Media Protection | Media Use...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-7
Media Use
Key Control
Aligned Media Protection | Media Use...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-7
Media Use
Key Control
Aligned Media Protection | Media Use...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
MP-8
Media Downgrading
Aligned Media Protection | Media Downgrading...
anonymized_6.1_IS_Data_Security_Standards.pdf
MP-8
Media Downgrading
Aligned Media Protection | Media Downgrading...
anonymized_7.2_IS_End_User_Device_Standard.pdf
MP-8
Media Downgrading
Aligned Media Protection | Media Downgrading...
anonymized_9.1_IS_Cryptography_Standards.pdf
MP-8
Media Downgrading
Aligned Secure disposal of records...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
MP-8
Media Downgrading
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
MP-8
Media Downgrading
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
MP-8
Media Downgrading
Aligned Media Protection | Media Downgrading...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-1
Policy and Procedures
Aligned 1.11 MAINTENANCE and 1.12 EXCEPTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PE-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PE-1
Policy and Procedures
Aligned Policy Exception Process...
anonymized_6.1_IS_Data_Security_Standards.pdf
PE-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
PE-1
Policy and Procedures
Aligned 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PE-1
Policy and Procedures
Aligned Section 1.12 - EXCEPTION...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PE-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PE-1
Policy and Procedures
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PE-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PE-1
Policy and Procedures
Aligned Ensure that physical access to assets is managed and protect...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned Physical and Environmental Security Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned h. Should ensure that physical access to assets is managed a...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned h. Should ensure that physical access to assets is managed a...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned h. Should ensure that physical access to assets is managed a...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned Physical access to assets...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-1
Policy and Procedures
Aligned Physical and Environmental Protection Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
PE-1
Policy and Procedures
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-1
Policy and Procedures
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-1
Policy and Procedures
Aligned 1.6 EXCEPTION...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PE-1
Policy and Procedures
Aligned Physical and Environmental Protection Policy and Procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PE-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PE-1
Policy and Procedures
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PE-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PE-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PE-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PE-10
Emergency Shutoff
Gap Emergency power shutoff primarily applies to organizational facilities that contain concentrations o...
PE-11
Emergency Power
Gap An uninterruptible power supply (UPS) is an electrical system or mechanism that provides emergency p...
PE-12
Emergency Lighting
Aligned Contingency Planning | Alternate Processing Site...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-13
Fire Protection
Gap The provision of fire detection and suppression systems applies primarily to organizational faciliti...
PE-14
Environmental Controls
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-14
Environmental Controls
Aligned Physical & Environmental Protection...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PE-15
Water Damage Protection
Gap The provision of water damage protection primarily applies to organizational facilities that contain...
PE-16
Delivery and Removal
Key Control
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PE-16
Delivery and Removal
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PE-16
Delivery and Removal
Key Control
Aligned User access to networks and network services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-16
Delivery and Removal
Key Control
Aligned Perimeter security and restrictions on access to sensitive a...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-16
Delivery and Removal
Key Control
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PE-16
Delivery and Removal
Key Control
Aligned Physical and Environmental Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PE-16
Delivery and Removal
Key Control
Aligned Restricted Area Access Procedures...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-17
Alternate Work Site
Key Control
Aligned Contingency Planning | Alternate Processing Site...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-18
Location of System Components
Key Control
Aligned Protecting Against External & Environmental Threats...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-18
Location of System Components
Key Control
Aligned Perimeter security and access restrictions...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-19
Information Leakage
Aligned Confidential Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PE-19
Information Leakage
Aligned Perimeter security and Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Physical and Environmental Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Physical Access Authorizations for Restricted Areas...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Physical & Environmental Protection | Physical Access Author...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-2
Physical Access Authorizations
Key Control
Aligned Identification and Authentication | Identity Proofing...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-20
Asset Monitoring and Tracking
Key Control
Aligned Section f, g, and h regarding physical access and security c...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-21
Electromagnetic Pulse Protection
Gap An electromagnetic pulse (EMP) is a short burst of electromagnetic energy that is spread over a rang...
PE-22
Component Marking
Key Control
Aligned Scope and Applicability...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PE-22
Component Marking
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PE-22
Component Marking
Key Control
Aligned Overview and Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PE-23
Facility Location
Gap Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terror...
PE-3
Physical Access Control
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PE-3
Physical Access Control
Key Control
Aligned h. Should ensure that physical access to assets is managed a...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned Securing Offices, Rooms & Facilities...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned Access Control | Separation of Duties and Access Control | L...
anonymized_9.1_IS_Cryptography_Standards.pdf
PE-3
Physical Access Control
Key Control
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-3
Physical Access Control
Key Control
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-3
Physical Access Control
Key Control
Aligned Physical and Environmental Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PE-3
Physical Access Control
Key Control
Aligned Physical and Environmental Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PE-3
Physical Access Control
Key Control
Aligned a. The facilities where BC/DR related activities are taking ...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned b. In the event that the badge entry system is not functiona...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned c. All personnel wishing to enter the restricted area should...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned d. Only personnel participating the in BC/DR event will be a...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned e. All personnel entering the facility should swipe their ba...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned f. Test issued ID badges should be worn and visible at all t...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned g. No furniture should be removed from restricted areas with...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-3
Physical Access Control
Key Control
Aligned h. No computing assets should be removed from restricted are...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-4
Access Control for Transmission
Aligned Perimeter security and restrictions on access to sensitive a...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-4
Access Control for Transmission
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PE-5
Access Control for Output Devices
Key Control
Aligned a) Perimeter security, b) Restrictions on access to sensitiv...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-6
Monitoring Physical Access
Key Control
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PE-6
Monitoring Physical Access
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PE-6
Monitoring Physical Access
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PE-6
Monitoring Physical Access
Key Control
Aligned Application Software Security...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PE-8
Visitor Access Records
Gap Visitor access records include the names and organizations of individuals visiting, visitor signatur...
PE-9
Power Equipment and Cabling
Aligned NIST CSF...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PE-9
Power Equipment and Cabling
Aligned Securing Offices, Rooms & Facilities...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PE-9
Power Equipment and Cabling
Aligned Physical & Environmental Protection | Power Equipment & Cabl...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PE-9
Power Equipment and Cabling
Aligned Physical & Environmental Protection | Power Equipment & Cabl...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PL-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PL-1
Policy and Procedures
Aligned Policy Exception Process...
anonymized_6.1_IS_Data_Security_Standards.pdf
PL-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
PL-1
Policy and Procedures
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PL-1
Policy and Procedures
Aligned 1.6 EXCEPTION...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PL-1
Policy and Procedures
Aligned Chunk: 1.12...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PL-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PL-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PL-1
Policy and Procedures
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PL-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PL-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_9.1_IS_Cryptography_Standards.pdf
PL-1
Policy and Procedures
Aligned Risk Policy, Cloud Policy, End-user Device Security Policy, ...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PL-1
Policy and Procedures
Aligned Compliance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PL-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PL-1
Policy and Procedures
Aligned 1.1 Applicability...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PL-1
Policy and Procedures
Aligned SCOPE & APPLICABILITY...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PL-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PL-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PL-10
Baseline Selection
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PL-10
Baseline Selection
Aligned Control baselines are predefined sets of controls specifical...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PL-10
Baseline Selection
Aligned Control References...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PL-10
Baseline Selection
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-10
Baseline Selection
Aligned Baseline security control requirements should be established...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PL-11
Baseline Tailoring
Aligned Control: PL-11...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PL-11
Baseline Tailoring
Aligned Control: PL-11...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PL-11
Baseline Tailoring
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PL-11
Baseline Tailoring
Aligned Control: PL-11...
anonymized_9.1_IS_Cryptography_Standards.pdf
PL-11
Baseline Tailoring
Aligned Tailoring Actions and Control Baselines...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PL-11
Baseline Tailoring
Aligned Control: PL-11...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PL-2
System Security and Privacy Plans
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PL-2
System Security and Privacy Plans
Aligned Section 1.4 - REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PL-2
System Security and Privacy Plans
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-4
Rules of Behavior
Key Control
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PL-4
Rules of Behavior
Key Control
Aligned Rules of behavior for organizational users...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PL-4
Rules of Behavior
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PL-4
Rules of Behavior
Key Control
Aligned 1.1.3 Laptops...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PL-4
Rules of Behavior
Key Control
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PL-4
Rules of Behavior
Key Control
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PL-4
Rules of Behavior
Key Control
Aligned SCOPE & APPLICABILITY...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PL-4
Rules of Behavior
Key Control
Aligned VII. Test adopts the NIST CSF and ISO 27001 standards as the...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PL-4
Rules of Behavior
Key Control
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PL-7
Concept of Operations
Gap The CONOPS may be included in the security or privacy plans for the system or in other system develo...
PL-8
Security and Privacy Architectures
Aligned 1.2.3 System and Application Access Control...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PL-8
Security and Privacy Architectures
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PL-8
Security and Privacy Architectures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-8
Security and Privacy Architectures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-8
Security and Privacy Architectures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-8
Security and Privacy Architectures
Aligned 1.12 GOVERNANCE...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PL-9
Central Management
Key Control
Aligned Central management refers to organization-wide management an...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PL-9
Central Management
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PL-9
Central Management
Key Control
Aligned Control ID Security Control Name Requirements...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-1
Information Security Program Plan
Aligned Program Management | Information Security Program Plan...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-1
Information Security Program Plan
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-1
Information Security Program Plan
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PM-1
Information Security Program Plan
Aligned Control: PM-1...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-1
Information Security Program Plan
Aligned Information Security Program Plan...
anonymized_9.1_IS_Cryptography_Standards.pdf
PM-1
Information Security Program Plan
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PM-1
Information Security Program Plan
Aligned Security and privacy programs collaborate on the development...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-1
Information Security Program Plan
Aligned Information Security Program Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-1
Information Security Program Plan
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-1
Information Security Program Plan
Aligned Role Functional Activities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-1
Information Security Program Plan
Aligned Control ID Security Control Name Requirements...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-1
Information Security Program Plan
Aligned Program Management | Information Security Program Plan...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-10
Authorization Process
Key Control
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-10
Authorization Process
Key Control
Aligned Role Responsibility Information Technology...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PM-10
Authorization Process
Key Control
Aligned User access authorization processes...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PM-10
Authorization Process
Key Control
Aligned 1.5 ROLES & RESPONSIBILITIES...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-10
Authorization Process
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PM-10
Authorization Process
Key Control
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.0 PURPOSE...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned User Access Authorization and Information Security Responsib...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned Definition of Protection Needs...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PM-11
Mission and Business Process Definition
Key Control
Aligned Functional Activities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-12
Insider Threat Program
Aligned Program Management | Information Security Program Leadership...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-12
Insider Threat Program
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-12
Insider Threat Program
Aligned System & Information Integrity | System Monitoring...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PM-12
Insider Threat Program
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PM-12
Insider Threat Program
Aligned Incident Monitoring and Incident Detection...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PM-12
Insider Threat Program
Aligned Security Awareness and Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security Awareness & Skills Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned i) Company personnel should be trained in the proper procedu...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PM-13
Security and Privacy Workforce
Aligned Information Security Awareness, Education and Training...
anonymized_9.1_IS_Cryptography_Standards.pdf
PM-13
Security and Privacy Workforce
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PM-13
Security and Privacy Workforce
Aligned Program Management | Security & Privacy Workforce...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PM-13
Security and Privacy Workforce
Aligned Information Security Awareness, Education and Training...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-13
Security and Privacy Workforce
Aligned 1.6 CLOUD SECURITY TRAINING & AWARENESS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-14
Testing, Training, and Monitoring
Aligned 1.2 GENERAL USER RESPONSIBILITIES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PM-14
Testing, Training, and Monitoring
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PM-14
Testing, Training, and Monitoring
Aligned h) Business unit security officers and IT team are responsib...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-14
Testing, Training, and Monitoring
Aligned i) Company personnel should be trained in the proper procedu...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-14
Testing, Training, and Monitoring
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-14
Testing, Training, and Monitoring
Aligned Overview, Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PM-14
Testing, Training, and Monitoring
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.1_IS_Cryptography_Standards.pdf
PM-14
Testing, Training, and Monitoring
Aligned Information Security & Privacy Awareness for contractor/cons...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PM-14
Testing, Training, and Monitoring
Aligned 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-14
Testing, Training, and Monitoring
Aligned Requirements for maintaining Test’s cybersecurity posture du...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PM-14
Testing, Training, and Monitoring
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-14
Testing, Training, and Monitoring
Aligned 1.5 CLOUD SECURITY MANAGEMENT...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-14
Testing, Training, and Monitoring
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PM-15
Security and Privacy Groups and Associations
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-15
Security and Privacy Groups and Associations
Aligned Security Awareness and Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-15
Security and Privacy Groups and Associations
Aligned Security Awareness and Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-16
Threat Awareness Program
Aligned Security Awareness and Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-17
Protecting Controlled Unclassified Information on External Systems
Aligned 1.0 PURPOSE...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PM-17
Protecting Controlled Unclassified Information on External Systems
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PM-18
Privacy Program Plan
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-18
Privacy Program Plan
Aligned Privacy Program Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-19
Privacy Program Leadership Role
Gap The privacy officer is an organizational official. For federal agencies—as defined by applicab...
PM-2
Information Security Program Leadership Role
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PM-2
Information Security Program Leadership Role
Aligned Program Management | Information Security Program Leadership...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-2
Information Security Program Leadership Role
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-2
Information Security Program Leadership Role
Aligned Roles and Responsibilities of Cybersecurity Leadership...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
PM-2
Information Security Program Leadership Role
Aligned Scope and Applicability...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PM-2
Information Security Program Leadership Role
Aligned 1.5 ROLES & RESPONSIBILITIES...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-2
Information Security Program Leadership Role
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-2
Information Security Program Leadership Role
Aligned Personnel Security | External Personnel Security...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-20
Dissemination of Privacy Program Information
Gap For federal agencies, the webpage is located at www.[agency].gov/privacy. Federal agencies include p...
PM-21
Accounting of Disclosures
Key Control
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-21
Accounting of Disclosures
Key Control
Aligned e) Event logs can contain sensitive data and personally iden...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-22
Personally Identifiable Information Quality Management
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PM-22
Personally Identifiable Information Quality Management
Aligned Section 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PM-22
Personally Identifiable Information Quality Management
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-23
Data Governance Body
Key Control
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PM-23
Data Governance Body
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PM-23
Data Governance Body
Key Control
Aligned 1.12 GOVERNANCE...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-23
Data Governance Body
Key Control
Aligned Data Governance...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-24
Data Integrity Board
Gap A Data Integrity Board is the board of senior officials designated by the head of a federal agency a...
PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research
Aligned Confidential Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PM-25
Minimization of Personally Identifiable Information Used in Testing, Training, and Research
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PM-26
Complaint Management
Gap Complaints, concerns, and questions from individuals can serve as valuable sources of input to organ...
PM-27
Privacy Reporting
Aligned 1.4 CONTACT WITH AUTHORITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-27
Privacy Reporting
Aligned Documentation of personal data breaches and post-incident an...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
PM-27
Privacy Reporting
Aligned Performance will be identified and measured by...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-28
Risk Framing
Aligned Program Management | Risk Framing...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-29
Risk Management Program Leadership Roles
Aligned Risk Management Activities...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-29
Risk Management Program Leadership Roles
Aligned Role Responsibility...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-3
Information Security and Privacy Resources
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-3
Information Security and Privacy Resources
Aligned 1.5 ROLES & RESPONSIBILITIES...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-3
Information Security and Privacy Resources
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-3
Information Security and Privacy Resources
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-3
Information Security and Privacy Resources
Aligned Program Management | Information Security and Privacy Resour...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned diligence questionnaire, or a subset of the full worksheet f...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned Risk Management Performance...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned 1.4 SUPPLIER RISK MANAGEMENT PROGRAM...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-30
Supply Chain Risk Management Strategy
Aligned Risk Assessment | System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-31
Continuous Monitoring Strategy
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PM-31
Continuous Monitoring Strategy
Aligned Continuous monitoring at the organization level...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-31
Continuous Monitoring Strategy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PM-31
Continuous Monitoring Strategy
Aligned Performance will be identified and measured by...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-31
Continuous Monitoring Strategy
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-31
Continuous Monitoring Strategy
Aligned Assessment of & Decision on Information Security Events...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PM-31
Continuous Monitoring Strategy
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-32
Purposing
Aligned 1.0 PURPOSE...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
PM-4
Plan of Action and Milestones Process
Aligned diligence questionnaire, or a subset of the full worksheet f...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-4
Plan of Action and Milestones Process
Aligned Control: PM-4...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-4
Plan of Action and Milestones Process
Aligned Assessment, Authorization & Monitoring | Plan of Action & Pr...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-5
System Inventory
Aligned Record maintenance requirements...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PM-5
System Inventory
Aligned 1.2. Hardware, Software, Applications and Data - Inventory o...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PM-5
System Inventory
Aligned Program Management | System Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-5
System Inventory
Aligned Program Management | System Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PM-6
Measures of Performance
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PM-6
Measures of Performance
Aligned Performance will be identified and measured by...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-6
Measures of Performance
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-7
Enterprise Architecture
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-7
Enterprise Architecture
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-7
Enterprise Architecture
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-7
Enterprise Architecture
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PM-8
Critical Infrastructure Plan
Aligned NIST CSF...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PM-8
Critical Infrastructure Plan
Aligned Risk Assessment Policy/Plan...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-9
Risk Management Strategy
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PM-9
Risk Management Strategy
Aligned Risk Management Strategy and Supplier Risk Assessment...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PM-9
Risk Management Strategy
Aligned Risk Policy - Establishes controls to ensure identification,...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-9
Risk Management Strategy
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PM-9
Risk Management Strategy
Aligned Performance will be identified and measured by...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PM-9
Risk Management Strategy
Aligned 1.11 ROLES & RESPONSIBILITIES...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PM-9
Risk Management Strategy
Aligned Program Management | Risk Management Strategy...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PS-1
Policy and Procedures
Key Control
Aligned Policy Exception Process...
anonymized_6.1_IS_Data_Security_Standards.pdf
PS-1
Policy and Procedures
Key Control
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PS-1
Policy and Procedures
Key Control
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-1
Policy and Procedures
Key Control
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PS-1
Policy and Procedures
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PS-1
Policy and Procedures
Key Control
Aligned Exceptions...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PS-1
Policy and Procedures
Key Control
Aligned Divisions & Functions are free to define and implement stron...
anonymized_9.1_IS_Cryptography_Standards.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PS-1
Policy and Procedures
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.2 APPLICABILITY...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.17 EXCEPTION...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PS-1
Policy and Procedures
Key Control
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PS-1
Policy and Procedures
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-2
Position Risk Designation
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PS-2
Position Risk Designation
Key Control
Aligned Personnel Security | Position Risk Designation...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-2
Position Risk Designation
Key Control
Aligned Personnel Security | Position Risk Designation...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PS-2
Position Risk Designation
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-2
Position Risk Designation
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-3
Personnel Screening
Key Control
Aligned 1.2 SCOPE & APPLICABILITY...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-3
Personnel Screening
Key Control
Aligned 1.3 BACKGROUND CHECKS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-3
Personnel Screening
Key Control
Aligned 1.2 SCOPE & APPLICABILITY...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-3
Personnel Screening
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PS-3
Personnel Screening
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PS-3
Personnel Screening
Key Control
Aligned Personnel Security | Personnel Screening...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PS-3
Personnel Screening
Key Control
Aligned Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-3
Personnel Screening
Key Control
Aligned Physical & Environmental Protection | Personnel Screening...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-3
Personnel Screening
Key Control
Aligned Physical & Environmental Protection | Personnel Screening...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-4
Personnel Termination
Key Control
Aligned 1.5 ENFORCEMENT/COMPLIANCE...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PS-4
Personnel Termination
Key Control
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-4
Personnel Termination
Key Control
Aligned User accounts management upon employment status changes...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-4
Personnel Termination
Key Control
Aligned Immediate locking of user accounts upon termination...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-4
Personnel Termination
Key Control
Aligned Timely execution of user account management after terminatio...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-4
Personnel Termination
Key Control
Aligned Human Resource Security Policy and Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PS-4
Personnel Termination
Key Control
Aligned Return of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-4
Personnel Termination
Key Control
Aligned Return of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-4
Personnel Termination
Key Control
Aligned Termination of workforce personnel and/or expiration of exte...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-5
Personnel Transfer
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-5
Personnel Transfer
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PS-5
Personnel Transfer
Aligned User accounts, including privileged user accounts, entitleme...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-5
Personnel Transfer
Aligned Employee/Contractor’s managers should immediately notify the...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PS-5
Personnel Transfer
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-5
Personnel Transfer
Aligned Upon termination of workforce personnel and/or expiration of...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PS-6
Access Agreements
Aligned Personnel Security | Monitoring Physical Access...
anonymized_9.1_IS_Cryptography_Standards.pdf
PS-6
Access Agreements
Aligned Access Control & Identity Management policy...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PS-7
External Personnel Security
Key Control
Aligned Data transmission should be encrypted....
anonymized_6.1_IS_Data_Security_Standards.pdf
PS-7
External Personnel Security
Key Control
Aligned Coordination and oversight of third-party relationships...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PS-7
External Personnel Security
Key Control
Aligned Change Management implementation....
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
PS-7
External Personnel Security
Key Control
Aligned Term Definitions and Related Documents...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PS-7
External Personnel Security
Key Control
Aligned Personnel Security | Personnel Sanctions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-7
External Personnel Security
Key Control
Aligned Personnel Security | Personnel Sanctions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-7
External Personnel Security
Key Control
Aligned Personnel Security | External Personnel Security...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-7
External Personnel Security
Key Control
Aligned Supplier Relationship Management...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PS-7
External Personnel Security
Key Control
Aligned Cloud Service Provider...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PS-7
External Personnel Security
Key Control
Aligned Organization Protocols...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PS-8
Personnel Sanctions
Aligned 1.10 ENFORCEMENT...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PS-8
Personnel Sanctions
Aligned 1.6 ENFORCEMENT/COMPLIANCE...
anonymized_6.1_IS_Data_Security_Standards.pdf
PS-8
Personnel Sanctions
Aligned 1.6 ENFORCEMENT/COMPLIANCE...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
PS-8
Personnel Sanctions
Aligned ENFORCEMENT/COMPLIANCE...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PS-8
Personnel Sanctions
Aligned 1.8 DISCIPLINARY PROCESS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PS-8
Personnel Sanctions
Aligned ENFORCEMENT/COMPLIANCE...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PS-8
Personnel Sanctions
Aligned 1.8 ENFORCEMENT/COMPLIANCE...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PS-8
Personnel Sanctions
Aligned Section XI and XII regarding disciplinary actions and except...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PS-8
Personnel Sanctions
Aligned Personnel Security | Position Descriptions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-8
Personnel Sanctions
Aligned Personnel Security | Personnel Sanctions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-8
Personnel Sanctions
Aligned ENFORCEMENT/COMPLIANCE...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-8
Personnel Sanctions
Aligned 1.13 ENFORCEMENT/COMPLIANCE...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PS-8
Personnel Sanctions
Aligned 8. ENFORCEMENT/COMPLIANCE...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
PS-9
Position Descriptions
Key Control
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PS-9
Position Descriptions
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PS-9
Position Descriptions
Key Control
Aligned 1.3 ROLES AND RESPONSIBILITIES...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PS-9
Position Descriptions
Key Control
Aligned Role Responsibility...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PS-9
Position Descriptions
Key Control
Aligned SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
PS-9
Position Descriptions
Key Control
Aligned System & Information Integrity | System Monitoring...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PS-9
Position Descriptions
Key Control
Aligned Information Security Roles & Responsibilities...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PS-9
Position Descriptions
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-9
Position Descriptions
Key Control
Aligned Personnel Security | Position Descriptions...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PS-9
Position Descriptions
Key Control
Aligned Role Responsibility...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PS-9
Position Descriptions
Key Control
Aligned Scope...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PS-9
Position Descriptions
Key Control
Aligned Role Functional Activities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
PT-1
Policy and Procedures
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PT-1
Policy and Procedures
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PT-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
PT-1
Policy and Procedures
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
PT-1
Policy and Procedures
Aligned 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
PT-1
Policy and Procedures
Aligned 1.0 PURPOSE...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
PT-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PT-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PT-1
Policy and Procedures
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
PT-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
PT-1
Policy and Procedures
Aligned Control: PT-1...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
PT-1
Policy and Procedures
Aligned Access Authorization Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PT-1
Policy and Procedures
Aligned Acceptable Use of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
PT-1
Policy and Procedures
Aligned 1.4.1 RISK REGISTER...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
PT-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
PT-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PT-2
Authority to Process Personally Identifiable Information
Key Control
Aligned 1.3 DATA OWNER RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PT-2
Authority to Process Personally Identifiable Information
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PT-2
Authority to Process Personally Identifiable Information
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PT-2
Authority to Process Personally Identifiable Information
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PT-3
Personally Identifiable Information Processing Purposes
Key Control
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
PT-4
Consent
Aligned 1.2 GENERAL USER RESPONSIBILITIES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
PT-5
Privacy Notice
Gap Privacy notices help inform individuals about how their personally identifiable information is being...
PT-6
System of Records Notice
Gap The PRIVACT requires that federal agencies publish a system of records notice in the Federal Registe...
PT-7
Specific Categories of Personally Identifiable Information
Key Control
Aligned Restricted Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
PT-7
Specific Categories of Personally Identifiable Information
Key Control
Aligned Term Definitions...
anonymized_6.1_IS_Data_Security_Standards.pdf
PT-8
Computer Matching Requirements
Gap The PRIVACT establishes requirements for federal and non-federal agencies if they engage in a matchi...
RA-1
Policy and Procedures
Aligned 1.1 SCOPE & APPLICABILITY...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
RA-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-1
Policy and Procedures
Aligned Policy Exception Process...
anonymized_6.1_IS_Data_Security_Standards.pdf
RA-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-1
Policy and Procedures
Aligned Risk Assessment Policy and Procedures...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-1
Policy and Procedures
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-1
Policy and Procedures
Aligned Chunk: 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
RA-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
RA-1
Policy and Procedures
Aligned Chunk: 1.4...
anonymized_7.2_IS_End_User_Device_Standard.pdf
RA-1
Policy and Procedures
Aligned Risk assessment policy and procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
RA-1
Policy and Procedures
Aligned 1.6 EXCEPTION...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
RA-1
Policy and Procedures
Aligned Risk Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-1
Policy and Procedures
Aligned Risk Policy - Establishes controls to ensure identification,...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-1
Policy and Procedures
Aligned Risk Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-1
Policy and Procedures
Aligned Risk Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-1
Policy and Procedures
Aligned Risk Policy - Establishes controls to ensure identification,...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
RA-1
Policy and Procedures
Aligned 1.4.1 RISK REGISTER...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-1
Policy and Procedures
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-1
Policy and Procedures
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
RA-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
RA-1
Policy and Procedures
Aligned Risk assessment policy and procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-10
Threat Hunting
Aligned Threat Hunting...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
RA-10
Threat Hunting
Aligned Threat Hunting...
anonymized_11.0_IS_Operations_Security_Policy.pdf
RA-10
Threat Hunting
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
RA-10
Threat Hunting
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-2
Security Categorization
Aligned 1.0 PURPOSE...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
RA-2
Security Categorization
Aligned Security categorization process as an organization-wide acti...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-2
Security Categorization
Aligned Risk assessments can also be conducted at various steps in t...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-2
Security Categorization
Aligned Security Categorization...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-2
Security Categorization
Aligned Security Categorization...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-2
Security Categorization
Aligned Risk Assessment | Security Categorization...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-2
Security Categorization
Aligned Risk Assessment | Security Categorization...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-2
Security Categorization
Aligned Security Categorization...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-2
Security Categorization
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-2
Security Categorization
Aligned Criticality analysis of information....
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-2
Security Categorization
Aligned Incident Categorization...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
RA-2
Security Categorization
Aligned 1.11 CONTROL REFERENCES...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
RA-2
Security Categorization
Aligned Security Categorization Process...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
RA-2
Security Categorization
Aligned Security Categorization Process...
anonymized_9.1_IS_Cryptography_Standards.pdf
RA-2
Security Categorization
Aligned VII. Test adopts the NIST CSF and ISO 27001 standards as the...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-2
Security Categorization
Aligned Such analysis is conducted as part of security categorizatio...
anonymized_7.0_IS_Asset_Management_Policy.pdf
RA-2
Security Categorization
Aligned Control References...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-2
Security Categorization
Aligned Security categorization processes facilitate the development...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-3
Risk Assessment
Key Control
Aligned Risk assessments consider threats, vulnerabilities, likeliho...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-3
Risk Assessment
Key Control
Aligned Risk assessments consider threats, vulnerabilities, likeliho...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
RA-3
Risk Assessment
Key Control
Aligned 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-3
Risk Assessment
Key Control
Aligned PURPOSE and SCOPE & APPLICABILITY...
anonymized_7.0_IS_Asset_Management_Policy.pdf
RA-3
Risk Assessment
Key Control
Aligned Control References...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-3
Risk Assessment
Key Control
Aligned 1.4.1 RISK REGISTER...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-3
Risk Assessment
Key Control
Aligned Risk assessments should be revisited as part of a contract r...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
RA-3
Risk Assessment
Key Control
Aligned Risk Assessment | System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Vulnerability Monitoring and Analysis...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Risk Assessment | Security Categorization...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Vulnerability Monitoring and Analysis...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Continuous Vulnerability Management...
anonymized_7.2_IS_End_User_Device_Standard.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Vulnerability Monitoring & Analysis...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Continuous Vulnerability Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Continuous Vulnerability Management...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned The Information Security Team should periodically conduct a ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned The Information Security Team should periodically conduct a ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Vulnerability Monitoring & Scanning...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned Events that may precipitate an update to risk assessment pol...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-5
Vulnerability Monitoring and Scanning
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-6
Technical Surveillance Countermeasures Survey
Gap A technical surveillance countermeasures survey is a service provided by qualified personnel to dete...
RA-7
Risk Response
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-7
Risk Response
Aligned Preparation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
RA-7
Risk Response
Aligned Risk Assessment and Response...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
RA-7
Risk Response
Aligned Risk Management Performance...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-7
Risk Response
Aligned Risk assessments should be revisited as part of a contract r...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
RA-7
Risk Response
Aligned Risk Assessment | Risk Response...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
RA-8
Privacy Impact Assessments
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
RA-8
Privacy Impact Assessments
Aligned Privacy Impact Assessment...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-8
Privacy Impact Assessments
Aligned Privacy Impact Assessment...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-8
Privacy Impact Assessments
Aligned Privacy Impact Assessment...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
RA-8
Privacy Impact Assessments
Aligned Privacy Impact Assessment...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
RA-9
Criticality Analysis
Key Control
Aligned Risk assessment is an ongoing activity carried out throughou...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-9
Criticality Analysis
Key Control
Aligned Criticality Analysis...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
RA-9
Criticality Analysis
Key Control
Aligned Risk Assessment | Security Categorization...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-9
Criticality Analysis
Key Control
Aligned Criticality Analysis...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
RA-9
Criticality Analysis
Key Control
Aligned Criticality analysis and its importance in risk management....
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
RA-9
Criticality Analysis
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
RA-9
Criticality Analysis
Key Control
Aligned 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
RA-9
Criticality Analysis
Key Control
Aligned Criticality analysis is performed when an architecture or de...
anonymized_7.0_IS_Asset_Management_Policy.pdf
RA-9
Criticality Analysis
Key Control
Aligned Risk Assessment Policy/Plan...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-9
Criticality Analysis
Key Control
Aligned Risk Assessment | Criticality Analysis...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
RA-9
Criticality Analysis
Key Control
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-1
Policy and Procedures
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SA-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SA-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SA-1
Policy and Procedures
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SA-1
Policy and Procedures
Aligned 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SA-1
Policy and Procedures
Aligned Section 1.12 - Policy Exceptions...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SA-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-1
Policy and Procedures
Aligned 1.9 Exception...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-1
Policy and Procedures
Aligned 1.4...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SA-1
Policy and Procedures
Aligned System and services acquisition policy and procedures...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_9.1_IS_Cryptography_Standards.pdf
SA-1
Policy and Procedures
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SA-1
Policy and Procedures
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SA-1
Policy and Procedures
Aligned 1.1 - Policy Overview...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SA-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
SA-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SA-1
Policy and Procedures
Aligned Control: SA-1: System and services acquisition policy and pr...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-10
Developer Configuration Management
Aligned System & Services Acquisition | Developer Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-10
Developer Configuration Management
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-10
Developer Configuration Management
Aligned NIST CSF Subcategory Control Reference Control Name...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-10
Developer Configuration Management
Aligned Access Control to Program Source Code...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SA-10
Developer Configuration Management
Aligned System & Services Acquisition | Developer Configuration Mana...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-10
Developer Configuration Management
Aligned Configuration Management | Configuration Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-10
Developer Configuration Management
Aligned Deviations from baseline configuration and authorization pro...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-10
Developer Configuration Management
Aligned System & Services Acquisition | Developer Configuration...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-10
Developer Configuration Management
Aligned Configuration Management | Configuration Change Control...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-11
Developer Testing and Evaluation
Aligned SCOPE & APPLICABILITY...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-11
Developer Testing and Evaluation
Aligned 1.1 SUPPLIER PROVISIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-11
Developer Testing and Evaluation
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-11
Developer Testing and Evaluation
Aligned Security Team should establish or amend a Test policy for ac...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-11
Developer Testing and Evaluation
Aligned The Information Security Team should periodically conduct a ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-11
Developer Testing and Evaluation
Aligned The Information Security Team should utilize specialized sof...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-11
Developer Testing and Evaluation
Aligned Developmental Testing and Evaluation...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-15
Development Process, Standards, and Tools
Aligned Configuration Management | Configuration Settings, Configura...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-15
Development Process, Standards, and Tools
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-15
Development Process, Standards, and Tools
Aligned Risk Assessment | System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-15
Development Process, Standards, and Tools
Aligned Risk Assessment | System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-16
Developer-provided Training
Aligned 1.7 INFORMATION SECURITY EDUCATION & TRAINING...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SA-16
Developer-provided Training
Aligned Section i) Company personnel should be trained in the proper...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-16
Developer-provided Training
Aligned SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SA-16
Developer-provided Training
Aligned 1.6 CLOUD SECURITY TRAINING & AWARENESS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-17
Developer Security and Privacy Architecture and Design
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-2
Allocation of Resources
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-2
Allocation of Resources
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-2
Allocation of Resources
Aligned Section 4: Procedures should be established, and supporting ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-20
Customized Development of Critical Components
Aligned Supply Chain Risk Management Plans...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SA-20
Customized Development of Critical Components
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SA-20
Customized Development of Critical Components
Aligned Access Control to Program Source Code...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SA-20
Customized Development of Critical Components
Aligned Supply Chain Risk Management...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SA-21
Developer Screening
Key Control
Aligned 1.2 SCOPE & APPLICABILITY...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SA-21
Developer Screening
Key Control
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-21
Developer Screening
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-21
Developer Screening
Key Control
Aligned System & Services Acquisition | Developer Screening...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SA-22
Unsupported System Components
Key Control
Aligned Technical Vulnerability Management...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-22
Unsupported System Components
Key Control
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-23
Specialization
Key Control
Aligned iii. Non-repudiation services should be used to resolve a di...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-23
Specialization
Key Control
Aligned All external connections to Test networks or Information Res...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SA-23
Specialization
Key Control
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SA-23
Specialization
Key Control
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SA-3
System Development Life Cycle
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-3
System Development Life Cycle
Aligned Security Team should establish or amend a Test policy for ac...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-3
System Development Life Cycle
Aligned System Interconnections...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-3
System Development Life Cycle
Aligned System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-4
Acquisition Process
Aligned Security and privacy functional requirements are typically d...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SA-4
Acquisition Process
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SA-4
Acquisition Process
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SA-4
Acquisition Process
Aligned 1.6...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SA-4
Acquisition Process
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-4
Acquisition Process
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SA-4
Acquisition Process
Aligned Exceptions...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-4
Acquisition Process
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SA-4
Acquisition Process
Aligned Security and privacy functional requirements...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-4
Acquisition Process
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SA-4
Acquisition Process
Aligned Exceptions...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
SA-4
Acquisition Process
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-4
Acquisition Process
Aligned Section 3: A consistent unified framework for cloud-based se...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-4
Acquisition Process
Aligned System & Services Acquisition | Acquisition Process...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-4
Acquisition Process
Aligned Control ID Security Control Name Requirements...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-5
System Documentation
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SA-5
System Documentation
Aligned Key Lifecycle Management Procedures...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-5
System Documentation
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-5
System Documentation
Aligned Section 5: Baseline security control requirements should be ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-5
System Documentation
Aligned 1.12 GOVERNANCE...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Systems security and privacy engineering principles are clos...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Systems security and privacy engineering principles are clos...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SA-8
Security and Privacy Engineering Principles
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SA-8
Security and Privacy Engineering Principles
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Control: SA-8: Systems security and privacy engineering prin...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Control: SA-8...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SA-8
Security and Privacy Engineering Principles
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-8
Security and Privacy Engineering Principles
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SA-8
Security and Privacy Engineering Principles
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-8
Security and Privacy Engineering Principles
Aligned 1.2 GOVERNANCE Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Test System and Application Owners should prepare and record...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Security Team should establish or amend a Test policy for ac...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-8
Security and Privacy Engineering Principles
Aligned Security Engineering Principles...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-8
Security and Privacy Engineering Principles
Aligned System & Services Acquisition | Security Engineering Princip...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SA-9
External System Services
Key Control
Aligned Coordination and oversight of third-party relationships...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SA-9
External System Services
Key Control
Aligned 1.5 ESTABLISHING TRUST RELATIONSHIPS...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-9
External System Services
Key Control
Aligned Change Management implementation....
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SA-9
External System Services
Key Control
Aligned System and services acquisition policy and procedures...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-9
External System Services
Key Control
Aligned System security engineering principles can also be used to p...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-9
External System Services
Key Control
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SA-9
External System Services
Key Control
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SA-9
External System Services
Key Control
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-9
External System Services
Key Control
Aligned System Acquisition, Development and Maintenance; Vendor Risk...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SA-9
External System Services
Key Control
Aligned Supplier Relationship Owner and Legal Department Responsibil...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SA-9
External System Services
Key Control
Aligned Cloud security procedures should address all Test cloud serv...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SA-9
External System Services
Key Control
Aligned Organization Protocols...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SA-9
External System Services
Key Control
Aligned Governance and Enterprise Risk Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-1
Policy and Procedures
Aligned 1.11 MAINTENANCE and 1.12 EXCEPTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-1
Policy and Procedures
Aligned 1.17 EXCEPTION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SC-1
Policy and Procedures
Aligned Policy Exception Process...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SC-1
Policy and Procedures
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SC-1
Policy and Procedures
Aligned 1.6 EXCEPTION...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SC-1
Policy and Procedures
Aligned Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-1
Policy and Procedures
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-1
Policy and Procedures
Aligned Initial Analysis Meeting and Containment Plan of Action...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SC-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SC-1
Policy and Procedures
Aligned System and communications protection policy and procedures...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-1
Policy and Procedures
Aligned System and communications protection policy and procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-1
Policy and Procedures
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SC-1
Policy and Procedures
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-1
Policy and Procedures
Aligned Divisions & Functions are free to define and implement stron...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-1
Policy and Procedures
Aligned Exceptions to this policy can be requested by submitting a p...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-1
Policy and Procedures
Aligned 1.1 Applicability...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SC-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
SC-1
Policy and Procedures
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SC-10
Network Disconnect
Gap Network disconnect applies to internal and external networks. Terminating network connections associ...
SC-11
Trusted Path
Aligned NIST SP 800-53 Rev 5...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned 9.0 Cryptographic Policy...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned 1.4 KEY MANAGEMENT...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned 1.4 KEY MANAGEMENT...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned Cryptography...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-12
Cryptographic Key Establishment and Management
Aligned Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-13
Cryptographic Protection
Aligned 9.0 Cryptographic Policy...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned ix. Encryption algorithms, keys, and software solutions shou...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned x. Legal and Compliance team should handle all legal request...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned Encryption is to be used to protect the confidentiality of r...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-13
Cryptographic Protection
Aligned 1.1 APPLICABILITY and 1.2 SUPPORTED CRYPTOGRAPHIC ALGORITHMS...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-13
Cryptographic Protection
Aligned Data Protection and Security Measures...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SC-13
Cryptographic Protection
Aligned Cryptography...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-13
Cryptographic Protection
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-13
Cryptographic Protection
Aligned Management of keys and key management policies...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-15
Collaborative Computing Devices and Applications
Aligned System & Communications Protection | Collaborative Computing...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned Restricted Data...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned proprietary information, trade secrets or any other sensitiv...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned Term Definitions...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned Confidentiality or Non-Disclosure Agreements...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned b) Information owners should only grant privileged access to...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned 1.2.1 Access Control...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned Assets ownership and responsibilities...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-16
Transmission of Security and Privacy Attributes
Aligned Term Definition...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-17
Public Key Infrastructure Certificates
Aligned 9.0 Cryptography Policy...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-17
Public Key Infrastructure Certificates
Aligned Definition of Certificate...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-18
Mobile Code
Aligned 1.4 SECURITY & PROPRIETARY INFORMATION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SC-18
Mobile Code
Aligned Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SC-18
Mobile Code
Aligned Section g...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-18
Mobile Code
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-18
Mobile Code
Aligned Access Control for Portable and Mobile Devices...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-18
Mobile Code
Aligned Mobile Code Policy and Procedures...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-18
Mobile Code
Aligned Implementation of security measures on endpoint devices and ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-18
Mobile Code
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-2
Separation of System and User Functionality
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-2
Separation of System and User Functionality
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-2
Separation of System and User Functionality
Aligned User access to networks and network services...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-2
Separation of System and User Functionality
Aligned Access Control for Cloud Systems and Services...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-2
Separation of System and User Functionality
Aligned Segregation of information systems and access restrictions...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned System & Communications Protection | Secure Name/Address Res...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned System & Communications Protection| Secure Name/address Reso...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned System & Communications Protection| Secure Name/address Reso...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned System & Communications Protection | Secure Name/address Res...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned Control SC-20...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-20
Secure Name/Address Resolution Service (Authoritative Source)
Key Control
Aligned Provisioning for Name/Address Resolution Service...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned System & Communications Protection | Secure Name/Address Res...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned System & Communications Protection| Secure Name/address Reso...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned System & Communications Protection| Secure Name/address Reso...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned System & Communications Protection| Architecture and Provisi...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-21
Secure Name/Address Resolution Service (Recursive or Caching Resolver)
Aligned Provisioning for Name/Address Resolution Service...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-22
Architecture and Provisioning for Name/Address Resolution Service
Aligned Secure Name/Address Resolution (Authoritative Source)...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-22
Architecture and Provisioning for Name/Address Resolution Service
Aligned System & Communications Protection| Secure Name/address Reso...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-23
Session Authenticity
Aligned System & Communications Protection| Session Authenticity...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-23
Session Authenticity
Aligned System & Communications Protection| Session Authenticity...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-23
Session Authenticity
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-23
Session Authenticity
Aligned All external connections to Test networks or Information Res...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-23
Session Authenticity
Aligned Confidential, Restricted information or applications that re...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-23
Session Authenticity
Aligned Secure Log-on Procedures...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-23
Session Authenticity
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-24
Fail in Known State
Aligned Recovery...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SC-24
Fail in Known State
Aligned Information Security Aspects of Business Continuity Manageme...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-25
Thin Nodes
Aligned Limitation of the use of utility programs and ensuring only ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-26
Decoys
Gap Decoys (i.e., honeypots, honeynets, or deception nets) are established to attract adversaries and de...
SC-27
Platform-independent Applications
Aligned Discussion on multi-cloud and application portability...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned 1.4 DATA CUSTODIAN RESPONSIBILITIES...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Controls can be viewed as descriptions of the safeguards and...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Encryption of PII/NPI data under regulatory, legal or contra...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Required - Encrypt PII/NPI data element under regulatory, le...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Devices should be password-protected and encrypted....
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Only USB sticks and other removable devices that have been a...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Devices should be password-protected and encrypted....
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Encryption is to be used to protect the confidentiality of r...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned System and Communications Protection...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Asset Management, Access Control, Cryptography...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-28
Protection of Information at Rest
Key Control
Aligned Segregation and access restriction of information systems...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-29
Heterogeneity
Gap Increasing the diversity of information technologies within organizational systems reduces the impac...
SC-3
Security Function Isolation
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-30
Concealment and Misdirection
Gap Concealment and misdirection techniques can significantly reduce the targeting capabilities of adver...
SC-31
Covert Channel Analysis
Gap Developers are in the best position to identify potential areas within systems that might lead to co...
SC-32
System Partitioning
Gap System partitioning is part of a defense-in-depth protection strategy. Organizations determine the d...
SC-34
Non-modifiable Executable Programs
Aligned Access Control to Program Source Code...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-34
Non-modifiable Executable Programs
Aligned Section 8: Information Security Team Responsibilities...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-35
External Malicious Code Identification
Aligned Section 6: Unacceptable Uses of Test's Systems...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SC-35
External Malicious Code Identification
Aligned Software Monitoring and Cyber Security Incident Response Pla...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-35
External Malicious Code Identification
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-36
Distributed Processing and Storage
Aligned Multi-cloud involves using multiple cloud services from diff...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-36
Distributed Processing and Storage
Aligned Data Redundancy and Performance Improvement...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-37
Out-of-band Channels
Key Control
Aligned System & Communications Protection| Out-of-Band Channels...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-37
Out-of-band Channels
Key Control
Aligned System & Communications Protection| Out-of-Band Channels...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-37
Out-of-band Channels
Key Control
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-37
Out-of-band Channels
Key Control
Aligned Provisioning for Name/Address Resolution Service...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-38
Operations Security
Aligned Scope and Applicability...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-38
Operations Security
Aligned Critical/High (inherent) risk and Medium (inherent) risk sec...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SC-38
Operations Security
Aligned Operations Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-38
Operations Security
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-39
Process Isolation
Gap Systems can maintain separate execution domains for each executing process by assigning each process...
SC-4
Information in Shared System Resources
Aligned Leaving Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SC-4
Information in Shared System Resources
Aligned Access Authorization and Information Security Responsibiliti...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-4
Information in Shared System Resources
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-4
Information in Shared System Resources
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-40
Wireless Link Protection
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-40
Wireless Link Protection
Aligned Section 10 and 11 regarding approved end-user devices and th...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-41
Port and I/O Device Access
Aligned 1.12 REMOVEABLE STORAGE DEVICES...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SC-42
Sensor Capability and Data
Key Control
Aligned b. Monitoring of User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SC-42
Sensor Capability and Data
Key Control
Aligned c. Installation of Software on User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SC-42
Sensor Capability and Data
Key Control
Aligned f. Ensure that the security controls are in place while usin...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-43
Usage Restrictions
Aligned Usage Restrictions and Compliance...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SC-43
Usage Restrictions
Aligned 1.2 Endpoint Security Device Management...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SC-43
Usage Restrictions
Aligned REQUIREMENT - Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-43
Usage Restrictions
Aligned Overview, Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-43
Usage Restrictions
Aligned Limitation of the use of utility programs and authorization ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-43
Usage Restrictions
Aligned Acceptable Use of Assets...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-43
Usage Restrictions
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-43
Usage Restrictions
Aligned Control of mobile code and its execution...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-43
Usage Restrictions
Aligned The Information Security Team should enforce and comply with...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-44
Detonation Chambers
Aligned Monitoring for Malicious Code...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-44
Detonation Chambers
Aligned Implementation of malware prevention on endpoint devices and...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-44
Detonation Chambers
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-45
System Time Synchronization
Aligned External and internal requirements for time representation, ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-45
System Time Synchronization
Aligned A network time protocol should be used to keep all the serve...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-46
Cross Domain Policy Enforcement
Aligned Physical & Environmental Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SC-46
Cross Domain Policy Enforcement
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-47
Alternate Communications Paths
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SC-47
Alternate Communications Paths
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-47
Alternate Communications Paths
Aligned 3. GENERAL PROVISIONS...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SC-47
Alternate Communications Paths
Aligned Incident Response Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-48
Sensor Relocation
Aligned Network Administration and its designees will centrally moni...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-49
Hardware-enforced Separation and Policy Enforcement
Gap System owners may require additional strength of mechanism and robustness to ensure domain separatio...
SC-5
Denial-of-service Protection
Aligned System & Communications Protection| Denial-of-Service Protec...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-5
Denial-of-service Protection
Aligned System & Communications Protection| Denial-of-Service Protec...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-5
Denial-of-service Protection
Aligned Containment strategies vary based on the type of incident....
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SC-5
Denial-of-service Protection
Aligned System & Communications Protection | Denial-of-Service Prote...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-50
Software-enforced Separation and Policy Enforcement
Key Control
Aligned 1.4 MAINTAINANCE and 1.5 EXCEPTIONS...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-50
Software-enforced Separation and Policy Enforcement
Key Control
Aligned Exceptions to the policy...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SC-50
Software-enforced Separation and Policy Enforcement
Key Control
Aligned 1.4 EXCEPTION...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-50
Software-enforced Separation and Policy Enforcement
Key Control
Aligned Exceptions...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
SC-50
Software-enforced Separation and Policy Enforcement
Key Control
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-51
Hardware-based Protection
Gap None....
SC-6
Resource Availability
Gap Priority protection prevents lower-priority processes from delaying or interfering with the system t...
SC-7
Boundary Protection
Aligned System & Communications Protection| Boundary Protection...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-7
Boundary Protection
Aligned System & Communications Protection | Secure Name/Address Res...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-7
Boundary Protection
Aligned System monitoring capabilities are achieved through a variet...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-7
Boundary Protection
Aligned NIST CSF Subcategory Control Reference...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-7
Boundary Protection
Aligned System & Communications Protection| Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-7
Boundary Protection
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SC-7
Boundary Protection
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-7
Boundary Protection
Aligned Control: SC-7...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SC-7
Boundary Protection
Aligned a. Appropriate controls for User access to networks and netw...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-7
Boundary Protection
Aligned Boundary protection may be implemented as a common control f...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SC-7
Boundary Protection
Aligned Network and Firewall Security Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Securing Application Services on Public Networks...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-7
Boundary Protection
Aligned 1.2 GOVERNANCE - Implementation...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-7
Boundary Protection
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-7
Boundary Protection
Aligned Implementation of controls to prevent malware execution...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SC-7
Boundary Protection
Aligned Access Control | Access Control Policy and Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Controls can include technical, administrative, and physical...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Examples of system security engineering principles include: ...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Protecting the confidentiality and integrity of transmitted ...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Control: SC-8: Protecting the confidentiality and integrity ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned viii. Authentication and network/transport layer encryption ...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned ix. Encryption algorithms, keys, and software solutions shou...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned NIST SP 800-53 Rev 5...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Voice Communications Equipment Protection...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned All external connections to Test networks or Information Res...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned IV. Communications Security...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SC-8
Transmission Confidentiality and Integrity
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-1
Policy and Procedures
Aligned 1.11 MAINTENANCE and 1.12 EXCEPTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-1
Policy and Procedures
Aligned Role Responsibility Information Technology Department...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SI-1
Policy and Procedures
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-1
Policy and Procedures
Aligned 1.5 EXCEPTION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-1
Policy and Procedures
Aligned 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SI-1
Policy and Procedures
Aligned Section 1.6 - EXCEPTION...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SI-1
Policy and Procedures
Aligned 1.12 EXCEPTION...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-1
Policy and Procedures
Aligned 1.2 REQUIREMENT Documented Operating Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-1
Policy and Procedures
Aligned PURPOSE...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SI-1
Policy and Procedures
Aligned 1.4...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SI-1
Policy and Procedures
Aligned Test Cyber Security Incident Response Framework...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SI-1
Policy and Procedures
Aligned 1.7 EXCEPTIONS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SI-1
Policy and Procedures
Aligned 1.7 WORDING and 1.8 GLOSSARY...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-1
Policy and Procedures
Aligned System and Information Integrity Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
SI-1
Policy and Procedures
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-1
Policy and Procedures
Aligned Internet Security & Usage Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-1
Policy and Procedures
Aligned Internet Security & Usage Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-1
Policy and Procedures
Aligned Internet Security & Usage Policy – Establishes controls that...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-1
Policy and Procedures
Aligned Policy Exception Process...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-1
Policy and Procedures
Aligned 1.4 REQUIREMENT...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SI-1
Policy and Procedures
Aligned 1.6 EXCEPTIONS...
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf
SI-1
Policy and Procedures
Aligned Control: SI-1: System and information integrity policy and p...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-1
Policy and Procedures
Aligned 1.15 EXCEPTION...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-1
Policy and Procedures
Aligned 4. IMPLEMENTATION...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SI-10
Information Input Validation
Aligned Checks into a system or report to ensure the logical consist...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-10
Information Input Validation
Aligned Testing Approaches...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-11
Error Handling
Aligned d) Resource Administrators should regularly review the logs ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-11
Error Handling
Aligned e) Event logs can contain sensitive data and personally iden...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-11
Error Handling
Aligned Section g) to l) regarding login attempts and session manage...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SI-12
Information Management and Retention
Aligned 1.8 DATA RETENTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-12
Information Management and Retention
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-12
Information Management and Retention
Aligned IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SI-12
Information Management and Retention
Aligned Information management and retention regarding terminated em...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-12
Information Management and Retention
Aligned Protection of log information...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-12
Information Management and Retention
Aligned 7.2 End User Device Standard...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SI-12
Information Management and Retention
Aligned Evidence Gathering and Chain of Custody Documentation...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SI-12
Information Management and Retention
Aligned Information management and retention requirements cover the ...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-12
Information Management and Retention
Aligned Access Control | Separation of Duties...
anonymized_9.1_IS_Cryptography_Standards.pdf
SI-12
Information Management and Retention
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-12
Information Management and Retention
Aligned Information management and retention requirements cover the ...
anonymized_20.0_IS_Risk_Management_Policy_2.pdf
SI-12
Information Management and Retention
Aligned Information management and retention requirements cover the ...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-13
Predictable Failure Prevention
Gap While MTTF is primarily a reliability issue, predictable failure prevention is intended to address p...
SI-14
Non-persistence
Aligned Implementation of non-persistent components and services...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-14
Non-persistence
Aligned Implementation of non-persistent components and services...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-15
Information Output Filtering
Gap Certain types of attacks, including SQL injections, produce output results that are unexpected or in...
SI-16
Memory Protection
Aligned The Information Security Team should enforce and comply with...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-16
Memory Protection
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-17
Fail-safe Procedures
Aligned Disaster Recovery Plans and Backup Procedures...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-18
Personally Identifiable Information Quality Operations
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-18
Personally Identifiable Information Quality Operations
Aligned Section d) and e)...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-18
Personally Identifiable Information Quality Operations
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-19
De-identification
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-19
De-identification
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-19
De-identification
Aligned The section discusses the handling of sensitive data, includ...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SI-19
De-identification
Aligned 1.9 DATA PROTECTION REQUIREMENTS...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-2
Flaw Remediation
Aligned 1.5 ORGANIZATIONALY OWNED & MANAGED INFO SYSTEMS & ASSETS...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SI-2
Flaw Remediation
Aligned IV. Maintaining Security while using Organizationally Owned ...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-2
Flaw Remediation
Aligned Technical Vulnerability Management...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-2
Flaw Remediation
Aligned Information Security Incident Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-2
Flaw Remediation
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-2
Flaw Remediation
Aligned Management of technical vulnerabilities...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-20
Tainting
Aligned Requirements for handling suspicious emails...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SI-20
Tainting
Aligned 1.8 DISCIPLINARY PROCESS...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-20
Tainting
Aligned Access Control for Portable and Mobile Devices...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SI-20
Tainting
Aligned Changes to cloud security systems and procedures should be f...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-20
Tainting
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-21
Information Refresh
Aligned 1.8 DATA RETENTION...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-21
Information Refresh
Aligned Retention of documentation...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SI-21
Information Refresh
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-21
Information Refresh
Aligned Retention and Disposal of Test Data...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-22
Information Diversity
Key Control
Aligned Checks into a system or report to ensure the logical consist...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-22
Information Diversity
Key Control
Aligned SUPPLIER RISK CATEGORY...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-23
Information Fragmentation
Aligned 1.1 Data Handling Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-23
Information Fragmentation
Aligned A.9.4.1 - A.13.2.1...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SI-23
Information Fragmentation
Aligned organization’s information systems should be appropriately s...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-3
Malicious Code Protection
Aligned System & Information Integrity | Malicious Code Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-3
Malicious Code Protection
Aligned Section 4: Posting Test information on public Internet sites...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-3
Malicious Code Protection
Aligned Anti-Virus, Hostile, and Malicious Code Security...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-3
Malicious Code Protection
Aligned Section 4: All PCs and laptops should be equipped with up-to...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SI-3
Malicious Code Protection
Aligned Containment Plan of Action...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SI-3
Malicious Code Protection
Aligned Information Resources which are necessary for their work, an...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-3
Malicious Code Protection
Aligned Encryption is to be used to protect the confidentiality of r...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-3
Malicious Code Protection
Aligned Secure technologies supporting pre-approved accounts and mon...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-3
Malicious Code Protection
Aligned Access Control for Portable and Mobile Devices...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SI-3
Malicious Code Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-3
Malicious Code Protection
Aligned Malicious code protection mechanisms include both signature-...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-3
Malicious Code Protection
Aligned business processes and technical measures implemented to pre...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-4
System Monitoring
Aligned System monitoring includes external and internal monitoring....
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-4
System Monitoring
Aligned 1.2 SYSTEM USE NOTIFICATION...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-4
System Monitoring
Aligned System monitoring includes external and internal monitoring....
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-4
System Monitoring
Aligned requirements for maintaining evidence...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-4
System Monitoring
Aligned Overview, Scope & Applicability...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SI-4
System Monitoring
Aligned Cyber Security Incident Response Framework...
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf
SI-4
System Monitoring
Aligned Network Monitoring & Defense...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
SI-4
System Monitoring
Aligned Management of User Authentication...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
SI-4
System Monitoring
Aligned Internet Security & Usage Policy...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SI-4
System Monitoring
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-4
System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-4
System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-4
System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-4
System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-4
System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-4
System Monitoring
Aligned Assessment of & Decision on Information Security Events...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SI-4
System Monitoring
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-5
Security Alerts, Advisories, and Directives
Key Control
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SI-5
Security Alerts, Advisories, and Directives
Key Control
Aligned Security Awareness and Skills Training...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-6
Security and Privacy Function Verification
Aligned 1.9 LEAVING Test...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Integrity Checks...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Monitoring of User’s device and Installation of Software on ...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Monitoring and Response to Malicious Activity...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned vi. Cryptographic technology implementations should be revie...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned vii. Digital signature certificates should be used to verify...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned ix. Encryption algorithms, keys, and software solutions shou...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned PURPOSE...
anonymized_9.1_IS_Cryptography_Standards.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Implementation of measures to prevent malware execution...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-7
Software, Firmware, and Information Integrity
Key Control
Aligned Information Integrity...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SI-8
Spam Protection
Aligned 1.4 SECURITY & PROPRIETARY INFORMATION...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SI-8
Spam Protection
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
SI-8
Spam Protection
Aligned Section 6: Unacceptable Uses of Test’s Systems...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SI-8
Spam Protection
Aligned h) Business unit security officers and IT team are responsib...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-8
Spam Protection
Aligned j) Test should assure that SPAM protection as part of its em...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SI-8
Spam Protection
Aligned Section 4: System Entry and Exit Points...
anonymized_7.2_IS_End_User_Device_Standard.pdf
SI-8
Spam Protection
Aligned Network Controls...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-8
Spam Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-8
Spam Protection
Aligned Section discussing malware execution prevention on endpoint ...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SI-8
Spam Protection
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-1
Policy and Procedures
Aligned Policy Exceptions and Procedures...
anonymized_6.1_IS_Data_Security_Standards.pdf
SR-1
Policy and Procedures
Aligned Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SR-1
Policy and Procedures
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-1
Policy and Procedures
Aligned Policy and Procedures for Supply Chain Risk Management...
anonymized_9.1_IS_Cryptography_Standards.pdf
SR-1
Policy and Procedures
Aligned 1.0 SCOPE & APPLICABILITY...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SR-1
Policy and Procedures
Aligned Supply chain risk management policy and procedures...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-1
Policy and Procedures
Aligned Divisions & Functions Policy Implementation...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SR-1
Policy and Procedures
Aligned Supplier Relationship Management Responsibilities...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-1
Policy and Procedures
Aligned Supply Chain Risk Management | Supply Chain Controls & Proce...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-1
Policy and Procedures
Aligned Managing changes to supplier services...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-10
Inspection of Systems or Components
Gap The inspection of systems or systems components for tamper resistance and detection addresses physic...
SR-11
Component Authenticity
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-12
Component Disposal
Aligned Continuous Vulnerability Management...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SR-12
Component Disposal
Aligned Disposal (in accordance with Retention Policy)...
anonymized_6.1_IS_Data_Security_Standards.pdf
SR-12
Component Disposal
Aligned V. Bring Your Own Device...
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
SR-12
Component Disposal
Aligned 1.3 IT Asset (NEW) and other assets Retirement and Disposal...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SR-12
Component Disposal
Aligned Data Protection and Disposal Procedures...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SR-12
Component Disposal
Aligned 1.2.2 Asset Disposal & Re-Use...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SR-12
Component Disposal
Aligned 1.13 END OF SERVICE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-12
Component Disposal
Aligned 1.10 CLOUD EXIT STRATEGY...
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management Overview...
anonymized_2.0_IS_Acceptable_Use_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Scope and Applicability...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management Plan...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Information Security Risk – Supplier Risk Matrix...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Controls & Proce...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Risk Assessment | System Development Life Cycle...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-2
Supply Chain Risk Management Plan
Aligned Supply Chain Risk Management | Supply Chain Risk Management ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned 1.3 SUPPLIER INVENTORY...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned Supply Chain Risk Management | Supply Chain Risk Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned Address security within supplier agreements and Information ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-3
Supply Chain Controls and Processes
Key Control
Aligned Supply Chain Risk Management | Supplier Assessments & Review...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-4
Provenance
Key Control
Gap Every system and system component has a point of origin and may be changed throughout its existence....
Critical Gap - Key Control Missing
SR-5
Acquisition Strategies, Tools, and Methods
Aligned IT Asset Procurement...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SR-5
Acquisition Strategies, Tools, and Methods
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-5
Acquisition Strategies, Tools, and Methods
Aligned System Acquisition, Development and Maintenance...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-5
Acquisition Strategies, Tools, and Methods
Aligned SUPPLIER RISK...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-5
Acquisition Strategies, Tools, and Methods
Aligned Supply Chain Risk Management | Supply Chain Controls & Proce...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-6
Supplier Assessments and Reviews
Key Control
Aligned Coordination and oversight of third-party relationships...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SR-6
Supplier Assessments and Reviews
Key Control
Aligned Scope and Applicability...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SR-6
Supplier Assessments and Reviews
Key Control
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-6
Supplier Assessments and Reviews
Key Control
Aligned Supplier Relationship Owner and Legal Department responsibil...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-6
Supplier Assessments and Reviews
Key Control
Aligned Supply Chain Risk Management | Supplier Assessments & Review...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-7
Supply Chain Operations Security
Aligned Data Identification...
anonymized_6.0_IS_Data_Security_Policy_1.pdf
SR-7
Supply Chain Operations Security
Aligned Coordination and oversight of third-party relationships...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
SR-7
Supply Chain Operations Security
Aligned 1.3 SUPPLIER INVENTORY...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SR-7
Supply Chain Operations Security
Aligned Scope...
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf
SR-7
Supply Chain Operations Security
Aligned Operations Security...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-7
Supply Chain Operations Security
Aligned Supply Chain Risk Management | Supply Chain Controls & Proce...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-8
Notification Agreements
Key Control
Aligned IT Asset Procurement...
anonymized_7.1_IS_Asset_Management_Standard.pdf
SR-8
Notification Agreements
Key Control
Aligned System & Services Acquisition | Customized Development of Cr...
anonymized_11.0_IS_Operations_Security_Policy.pdf
SR-8
Notification Agreements
Key Control
Aligned Supplier contracts and performance monitoring...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
SR-8
Notification Agreements
Key Control
Aligned Vendor Risk Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
SR-8
Notification Agreements
Key Control
Aligned Supplier Relationship Owner, Legal Department, Supplier Rela...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
SR-8
Notification Agreements
Key Control
Aligned Organization Protocols and Impact Assessment...
anonymized_15.0_IS_Incident_Management_Policy_1.pdf
SR-8
Notification Agreements
Key Control
Aligned Supply Chain Risk Management | Policy & Procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
SR-9
Tamper Resistance and Detection
Gap Anti-tamper technologies, tools, and techniques provide a level of protection for systems, system co...
PR.IP-6
Protection of Information Process
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
PR.IP-6
Protection of Information Process
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
PR.IP-6
Protection of Information Process
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
PR.IP-6
Protection of Information Process
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
PR.IP-6
Protection of Information Process
Aligned System & Communications Protection | Boundary Protection...
anonymized_6.1_IS_Data_Security_Standards.pdf
PR.IP-6
Protection of Information Process
Aligned System & Information Integrity | System Monitoring...
anonymized_6.1_IS_Data_Security_Standards.pdf
A.9.4.4
Use of Privileged Utility Programs
Aligned Controls can be viewed as descriptions of the safeguards and...
anonymized_6.1_IS_Data_Security_Standards.pdf
A.9.4.4
Use of Privileged Utility Programs
Aligned Control: SC-2...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-17(1)
Remote Access
Aligned Monitoring of User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AC-17(1)
Remote Access
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-17(1)
Remote Access
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-17(1)
Remote Access
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AU-6(1)
Audit Review, Analysis, and Reporting
Aligned Monitoring of User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
AU-6(1)
Audit Review, Analysis, and Reporting
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6(1)
Audit Review, Analysis, and Reporting
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CM-2(2)
Configuration Change Control
Aligned Installation of Software on User’s device....
anonymized_2.1_IS_Acceptable_Use_Standard.pdf
CM-2(2)
Configuration Change Control
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
ID.AM-6
Security Awareness & Skills Training
Aligned 1.11 CONTROL REFERENCES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
ID.AM-6
Security Awareness & Skills Training
Aligned 1.11 CONTROL REFERENCES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
ID.AM-6
Security Awareness & Skills Training
Aligned 1.11 CONTROL REFERENCES...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.7.1.2
Terms & Conditions of Employment
Aligned Information Security Awareness, Education and Training...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Policy...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Information Access Restriction...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.4.1
Access Control Policy
Aligned Information Access Restriction...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.4.1
Access Control Policy
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.4.1
Access Control Policy
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.4.1
Access Control Policy
Aligned Identification and Authentication Requirements...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.10.1.1
Access to Networks & Network Services
Aligned Access to Networks & Network Services...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.10.1.1
Access to Networks & Network Services
Aligned Access to Networks & Network Services...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.10.1.1
Access to Networks & Network Services
Aligned Policy on the Utilization of Cryptographic Controls...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.10.1.1
Access to Networks & Network Services
Aligned The use of encrypted VPNs provides sufficient assurance to t...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.10.1.1
Access to Networks & Network Services
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.1.4
Management of Privileged Access Rights
Aligned Management of Privileged Access Rights...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.11.1.4
Management of Privileged Access Rights
Aligned Threat actions that may increase security or privacy risks i...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.11.1.4
Management of Privileged Access Rights
Aligned Physical & Environmental Protection...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.1.4
Management of Privileged Access Rights
Aligned Physical & Environmental Protection...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.13.1.1
Network Controls
Aligned Network Controls...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.13.1.1
Network Controls
Aligned Policy on the Utilization of Cryptographic Controls...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.13.1.1
Network Controls
Aligned Network Monitoring & Defense...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.13.1.1
Network Controls
Aligned Boundary protection may be implemented as a common control f...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.13.2.1
Segregation in Networks
Aligned Segregation in Networks...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.13.2.1
Segregation in Networks
Aligned Information Transfer Policies & Procedures...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.13.2.1
Segregation in Networks
Aligned Policy on the Utilization of Cryptographic Controls...
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf
A.13.2.1
Segregation in Networks
Aligned Organizations commonly employ information flow control polic...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy and Procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Organizations commonly employ information flow control polic...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned System and communications protection policy and procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Control Name: Access Control Policy...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy and Procedures...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Remote access controls apply to systems other than public we...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Control: AC-4: Information flow control...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Control: SC-2...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Identification and Authentication Requirements...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Control baselines and stakeholder needs...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Rules of behavior represent a type of access agreement for o...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Access Control Policy...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Controls can be viewed as descriptions of the safeguards and...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.1
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.9.1.1
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Network Monitoring & Defense...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.2
Access to Networks & Network Services
Aligned NIST CSF...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Network Monitoring & Defense...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Access to Networks & Network Services...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Organizations use encrypted virtual private networks (VPNs) ...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Control: SC-7: Managed interfaces include gateways, routers,...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.1.2
Access to Networks & Network Services
Aligned Access Types...
anonymized_9.1_IS_Cryptography_Standards.pdf
AC-6(9)
Access Control Policy
Aligned Access Control Policy and employee termination procedures...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-6(9)
Access Control Policy
Aligned Access privileges and account reviews...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
15
Service Provider Management
Aligned Supply chain risk management (SCRM) activities include ident...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
15
Service Provider Management
Aligned Service Provider Management...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned Labeling of Information...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned Labeling of Information...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned Access Control Management...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.8.2.2
Labeling of Information
Aligned Requirements can include mandated configuration settings tha...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.8.2.3
Handling of Assets
Aligned Handling of Assets...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AC-2g
Account Management
Aligned Managers...
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf
AU-3(1)
Content of Audit Records
Aligned e) Event logs can contain sensitive data and personally iden...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PR.IP-1
Information Protection Processes and Procedures
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PR.IP-1
Information Protection Processes and Procedures
Aligned Configuration Management | Baseline Configuration...
anonymized_11.0_IS_Operations_Security_Policy.pdf
PR.DS-2
Data Protection
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
PR.AT-5
Security Awareness & Skills Training
Aligned Incident Response | Incident Response Training...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.7.1.1
Screening
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.7.1.1
Screening
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.7.1.1
Screening
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
A.7.1.1
Screening
Aligned Personnel screening and rescreening activities...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.7.3.1
Termination or Change of Employment Responsibilities
Aligned Program Management | Security & Privacy Workforce...
anonymized_9.0_IS_Cryptography_Policy_1.pdf
SA-12
External Information System Services | Supply Chain Protection
Aligned System and services acquisition policy and procedures...
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf
16
Application Software Security
Aligned Application Software Security...
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf
A.9.2.3
Management of Privileged Access Rights
Aligned Management of Privileged Access Rights...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.2.3
Management of Privileged Access Rights
Aligned Control: SC-2...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.9.2.3
Management of Privileged Access Rights
Aligned Organizations consider rules of behavior based on individual...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.13.2.4
Confidentiality or Non-Disclosure Agreements
Aligned NIST CSF Subcategory Control Reference...
anonymized_9.1_IS_Cryptography_Standards.pdf
A.13.1.3
Segregation in Networks
Aligned Subnetworks that are physically or logically separated from ...
anonymized_9.1_IS_Cryptography_Standards.pdf
SI-4n
Information System Monitoring
Aligned System & Information Integrity | System Monitoring...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
PR.IP-11n
Risk Management Strategy
Aligned System & Information Integrity | System Monitoring...
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf
3.1
Access Control Policy
Key Control
Aligned Access Control...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
3.2
Asset Management
Aligned Asset Management...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
ID.GV-1
Governance
Aligned Governance and Documentation...
anonymized_3.0_IS_Information_Security_Policy_2.pdf
PR.DS-5
Data Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.2.1
Equipment Siting & Protection
Aligned Physical & Environmental Protection...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.2.1
Equipment Siting & Protection
Aligned Physical & Environmental Protection...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.2.1
Equipment Siting & Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.2.1
Equipment Siting & Protection
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
A.11.1.5
Working in Secure Areas
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-2(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-2(1)
Access Control Policy
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
AC-2(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-2(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-2(4)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-4(all)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-17(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-17(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-17(9)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-18(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-18(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-18(4)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-18(5)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AC-19(4)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-2(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-2(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-3(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-3(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AT-3(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6(5)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6(6)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-6(9)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-7(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
AU-7(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-2(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-2(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-2(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-3(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-3(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-3(3)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CA-7(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-3(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-3(4)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-6(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-7(2)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-7(4)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-7(5)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-8(all)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CM-9(1)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CP-7(all)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
CP-7(all)
Access Control Policy
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
CP-8(all)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-4(all)
Access Control Policy
Aligned Physical & Environmental Protection | Asset Monitoring & Tra...
anonymized_7.0_IS_Asset_Management_Policy.pdf
SI-4(22)
Information System Monitoring
Aligned 1.2 GOVERNANCE...
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf
PR.AC-1
Identity and Access Management Policy
Aligned User access policies and procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-1
Identity and Access Management Policy
Aligned User access policies and procedures...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-1
Identity and Access Management Policy
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-1
Identity and Access Management Policy
Aligned User access policies and procedures should be established, a...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-4
Information Access Enforcement
Aligned Access restrictions to prevent inappropriate disclosure...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-4
Information Access Enforcement
Aligned organization’s information systems should be appropriately s...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.IP-3
Malicious Code Protection
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
DE.CM-1
Asset Inventory
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
DE.CM-4
Malware Protection
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.RA-1
Risk Assessment
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.RA-6
Threat Intelligence
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.IP-
Information Protection Processes and Procedures
Aligned business processes and technical measures implemented...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.SC-3
Supply Chain Risk Management
Aligned Supply Chain Risk Management | Supply Chain Controls & Proce...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.SC-3
Supply Chain Risk Management
Aligned Supply Chain Risk Management | Supply Chain Risk Management...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.SC-4
Monitoring and Review of Supplier Services
Aligned Monitoring and Review of Supplier Services...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-2
Inventory of Assets
Aligned Configuration Management | System Component Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.AM-4
Ownership of Assets
Aligned Configuration Management | System Component Inventory...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.IP-7
Information Security Continuous Monitoring
Aligned Events that may precipitate an update to identification and ...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
PR.AC-7
Remote Access
Aligned Physical & Environmental Protection | Personnel Screening...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf
ID.RA-2
Incident Response
Aligned System & Information Integrity | Security Alerts, Advisories...
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf

anonymized_6.0_IS_Data_Security_Policy_1.pdf CIS
7 matches found

Document Content
Matched Section
Section: 1.8 DATA RETENTION and 1.9 ROLES & RESPONSIBILITIES
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements. Role Responsibility Chief Information Security Officer l Periodic update and distribution of this policy. Data Owner l Assigning appropriate classification to the data. l Monitoring and reviewing data and its classification periodically. l Approving access to the data in accordance with Access control policy. l Ensuring that appropriate data labelling and handling requirements are followed.
AI Justification
The section discusses the responsibilities of the Data Owner in relation to data retention, classification, and handling, which aligns with the need for a documented data management process.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data. Terminated personnel and changes to access privileges should be identified and the information forwarded to the Data Custodian for updating.
AI Justification
The responsibilities outlined for Data Owners include reviewing and verifying user access privileges, which aligns with the need to configure data access control lists based on a user’s need to know.

Document Content
Matched Section
Section: 1.8 DATA RETENTION
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements.
AI Justification
The section discusses the importance of data retention policies driven by legal and regulatory requirements, aligning with the need to retain data according to documented processes.

Document Content
Matched Section
Section: 1.5 DATA CLASSIFICATION
Content: a) The confidentiality, integrity, and availability of all data created or retained by Test should be appropriately protected. b) Data classification should consider any relevant legal or regulatory requirements. c) Data Owners should be accountable for their classification. A Data Owner should be in a Managerial level in the respective Test Line of Business (or Division or Function) for which an application that houses the data was originally developed or purchased. d) The default classification is Confidential in the absence of any classification. e) Data should not be downgraded to a lower classification without formal authorization from the Data Owner. It is the Data Owner¢s responsibility to monitor information assets and continuously review the data¢s classification. f) Data Owners should periodically review the risk classifications of the resources for which
AI Justification
The section discusses the importance of data classification, accountability of Data Owners, and the need for periodic review, which aligns with establishing and maintaining a data classification scheme.

Document Content
Matched Section
Section: d) A data loss prevention (DLP) mechanism should be implemented.
Content: A data loss prevention (DLP) mechanism should be implemented. This mechanism helps prevent sensitive information from being leaked. It can do this by monitoring and blocking certain types of data from being sent out.
AI Justification
The text discusses the implementation of a data loss prevention (DLP) mechanism, which aligns with the requirement to identify and protect sensitive data.

Document Content
Matched Section
Section: Secure Configuration of Enterprise Assets & Software
Content: Secure Configuration of Enterprise Assets & Software
AI Justification
The chunk discusses the need for secure configuration of enterprise assets and software, which aligns with the requirement to establish and maintain a documented secure configuration process.

Document Content
Matched Section
Section: 1.11 MAINTENANCE
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval.
AI Justification
The text discusses the need for a periodical review of standards and associated documents, which aligns with the requirement to maintain a documented secure configuration process and review it annually.
anonymized_7.0_IS_Asset_Management_Policy.pdf CIS
9 matches found

Document Content
Matched Section
Section: Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The chunk discusses maintaining an inventory of assets, including software, which aligns with the requirement to establish and maintain a detailed inventory of licensed software.

Document Content
Matched Section
Section: Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The section discusses maintaining an inventory of software applications used within the organization, which aligns with the control's focus on utilizing software inventory tools for documentation.

Document Content
Matched Section
Section: Asset Disposal & Re-Use
Content: All Test information should be classified to ensure that the information receives an appropriate level of protection in accordance with its importance to Test. The classification scheme should be consistent across the whole organization so that all information Assets are consistently classified and controlled. Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse. Assets reuse and destruction practices should be tracked, documented, and evidenced.
AI Justification
The section discusses the classification and secure disposal of assets, which aligns with the need to establish a documented data management process that includes handling and disposal requirements.

Document Content
Matched Section
Section: Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy.
AI Justification
The section outlines the procedures for securely disposing of assets containing sensitive data, which aligns with the control's requirement for secure data disposal.

Document Content
Matched Section
Section: Asset Disposal & Re-Use
Content: All Test information should be classified to ensure that the information receives an appropriate level of protection in accordance with its importance to Test. The classification scheme should be consistent across the whole organization so that all information Assets are consistently classified and controlled.
AI Justification
The section discusses the need for classifying information assets to ensure appropriate protection, which aligns with establishing a data classification scheme.

Document Content
Matched Section
Section: Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction.
AI Justification
The section discusses maintaining an inventory of assets, which aligns with the need to identify sensitive data and update the data inventory.

Document Content
Matched Section
Section: Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse. Assets reuse and destruction practices should be tracked, documented, and evidenced.
AI Justification
The section discusses the secure disposal of assets containing sensitive data and emphasizes the need for tracking and documenting these practices, which aligns with logging access and modifications to sensitive data.

Document Content
Matched Section
Section: Assets ownership and responsibilities
Content: Ownership should be assigned for all assets maintained in the inventory. An Asset Owner should be assigned whenever Assets are acquired by or transferred by the organization.
AI Justification
The section discusses the need for an inventory of assets, which aligns with maintaining an inventory of accounts, including details about ownership and responsibilities.

Document Content
Matched Section
Section: Assets ownership and responsibilities
Content: Authorizing and periodically reviewing access entitlements.
AI Justification
The mention of authorizing and periodically reviewing access entitlements aligns with the need to validate that all active accounts are authorized.
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf CIS
7 matches found

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the classification, protection, retention, and destruction of data, which aligns with establishing a documented data management process.

Document Content
Matched Section
Section: DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies.
AI Justification
The chunk discusses the classification, protection, and retention of data, which aligns with the need to establish and maintain a data inventory.

Document Content
Matched Section
Section: DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The section discusses the retention and destruction of data in accordance with policies, which aligns with the requirement to retain data according to documented processes.

Document Content
Matched Section
Section: DATA PROTECTION REQUIREMENTS
Content: Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The text discusses the need for data destruction procedures and the requirement to destroy data that is no longer needed, aligning with the control's focus on securely disposing of data.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: DOCUMENT CLASSIFICATION Confidential
AI Justification
The document explicitly states a classification of 'Confidential' and outlines the ownership and distribution of the document, indicating an established data classification scheme.

Document Content
Matched Section
Section: DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle.
AI Justification
The section discusses the classification, protection, and destruction of data, which aligns with the need for a DLP tool to identify and manage sensitive data.

Document Content
Matched Section
Section: DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification. Cloud providers should provide a method for Test authorized personnel to directly destroy or to request destruction of data. Cloud providers should provide evidence of destruction to Test upon request.
AI Justification
The section discusses the importance of data destruction procedures and the need for evidence of destruction, which aligns with logging access and modifications to sensitive data.
anonymized_7.1_IS_Asset_Management_Standard.pdf CIS
6 matches found

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: a) Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting. b) Establish data security procedures to protect sensitive (classification internal, confidential, restricted) data when assets are planned to be retired.
AI Justification
The chunk discusses the establishment of procedures for asset disposal and data security, which aligns with the need for a documented data management process that includes handling of data and disposal requirements.

Document Content
Matched Section
Section: MAINTAINANCE
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval.
AI Justification
The chunk mentions the need for a periodical review of standards and associated documents, which aligns with the requirement to review and update documentation annually.

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: a) Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting. b) Establish data security procedures to protect sensitive (classification internal, confidential, restricted) data when assets are planned to be retired.
AI Justification
The section outlines procedures for asset disposal, including the protection of sensitive data during the retirement of assets, which aligns with the need for secure data disposal as per the control.

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: b) Establish data security procedures to protect sensitive (classification internal, confidential, restricted) data when assets are planned to be retired.
AI Justification
The chunk discusses the classification of data as sensitive, internal, confidential, and restricted, which aligns with the establishment of a data classification scheme.

Document Content
Matched Section
Section: 1.3 IT Asset (NEW) and other assets Retirement and Disposal
Content: b) Establish data security procedures to protect sensitive (classification internal, confidential, restricted) data when assets are planned to be retired.
AI Justification
The section discusses the establishment of data security procedures to protect sensitive data during asset retirement, which aligns with logging access to sensitive data.

Document Content
Matched Section
Section: Endpoint Security Device Management
Content: a) Test should follow its mobile device security standards as outlined in the Test IS 7.2 End User Device Standard.
AI Justification
The chunk discusses the need for mobile device security standards and ensuring that endpoint devices are secured before access, which aligns with the requirement for separate enterprise workspaces on mobile devices.
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf CIS
2 matches found

Document Content
Matched Section
Section: Section 1.7 - EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The chunk discusses the process for requesting exceptions to policy, which aligns with the need to document exceptions for unsupported software as outlined in control 2.2.

Document Content
Matched Section
Section: Access Control Policy
Content: Access Control Policy
AI Justification
The control focuses on configuring data access control lists based on user needs, which aligns with the Access Control Policy mentioned in the chunk.
anonymized_6.1_IS_Data_Security_Standards.pdf CIS
11 matches found

Document Content
Matched Section
Section: Software
Content: Use of software for Test work or development should be properly licensed for Test and used only under the terms and conditions of the licenses. Never disable, uninstall, or stop the execution of firm applications and software.
AI Justification
The section emphasizes the importance of using properly licensed software and not disabling or uninstalling firm applications, which aligns with ensuring unauthorized software is removed or documented.

Document Content
Matched Section
Section: Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs.
AI Justification
The section outlines the handling requirements for data based on its classification, which aligns with the need for a documented data management process that includes data sensitivity and handling procedures.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Disposal (in accordance with Retention Policy) Paper Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well.
AI Justification
The text discusses the disposal of documents and the retention policy, which aligns with the requirement to retain data according to documented processes.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well. Erase, degauss, or destroy (using a CD shredder) all electronic media in a manner that will render the information irretrievable.
AI Justification
The section outlines the procedures for securely disposing of both paper and electronic data, which aligns with the requirement to dispose of data according to its sensitivity.

Document Content
Matched Section
Section: Encrypt data on end-user devices containing sensitive data
Content: PII/NPI data element under regulatory, legal or contractual requirements (e.g., PCI PAN, SSN, Account Numbers) when stored on High-risk Technology assets and where technology permits.
AI Justification
The text explicitly mentions the need to encrypt PII/NPI data when stored on High-risk Technology assets, which aligns with the control's focus on encryption of sensitive data.

Document Content
Matched Section
Section: Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs. n n n n Verify and validate, with the information source, that the information being collected is reliable and relevant. n n n n Provide a description of the reason for collecting the information to the information source. If this changes, details of the change should be communicated to the information source. - n n n - n n n - - n n - - n n - n Labelling All Label information with 'Internal', 'Confidential' or 'Restricted'. Applications should notify users during login that they are handling Confidential or
AI Justification
The chunk describes the implementation of an information classification scheme, including labeling data as 'Public', 'Internal', 'Confidential', and 'Restricted', which aligns with the requirement to establish and maintain a data classification scheme.

Document Content
Matched Section
Section: Encrypt data on removable media
Content: PII/NPI data element under regulatory, legal or contractual requirements (e.g., PCI PAN, SSN, Account Numbers) when stored on High-risk Technology assets and where technology permits.
AI Justification
The section discusses the requirement to encrypt PII/NPI data when stored on high-risk technology assets, specifically mentioning portable media such as USB drives.

Document Content
Matched Section
Section: Encrypt sensitive data at rest on servers, applications, and databases.
Content: Required - Encrypt PII/NPI data element under regulatory, legal or contractual requirements (e.g., PCI PAN, SSN, Account Numbers) when stored on High-risk Technology assets and where technology permits.
AI Justification
The chunk discusses the requirement to encrypt PII/NPI data elements when stored on high-risk technology assets, which aligns with the control's focus on encrypting sensitive data at rest.

Document Content
Matched Section
Section: Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test.
AI Justification
The chunk discusses handling requirements based on information classification, which aligns with segmenting data processing and storage based on sensitivity.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well.
AI Justification
The section discusses the disposal of sensitive information, including paper documents and electronic media, which aligns with the control's focus on logging access and disposal of sensitive data.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Delete files from all devices (e.g., laptops, mobile devices, USB drives, etc.) after no longer required to be retained, and place unnecessary paper documents in a shredding bin.
AI Justification
The section discusses the procedures for securely wiping electronic media and deleting files from devices, which aligns with the control's focus on wiping enterprise data from devices.
anonymized_11.0_IS_Operations_Security_Policy.pdf CIS
16 matches found

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Inventory and Control of Software Assets
AI Justification
The control requires maintaining a detailed inventory of licensed software, which aligns with the section on Inventory and Control of Software Assets.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration Management | Baseline Configuration
AI Justification
This control relates to maintaining an inventory of software as part of configuration management practices.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Inventory and Control of Software Assets
AI Justification
The chunk discusses the importance of inventory and control of software assets, which aligns with the use of software inventory tools.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Inventory and Control of Enterprise Assets
AI Justification
The mention of inventory and control indicates a focus on managing enterprise assets, which is aligned with CM-2.

Document Content
Matched Section
Section: b) Information owners should only grant privileged access to developers on a need-to-use basis.
Content: b) Information owners should only grant privileged access to developers on a need-to-use basis. Privileged access should only be used to support specific incidents or problems and those accounts should be limited, monitored and disabled upon termination of the requested tasks.
AI Justification
The text discusses granting privileged access based on a need-to-use basis, which aligns with the principle of configuring data access control lists based on user needs.

Document Content
Matched Section
Section: Logging and Monitoring
Content: c) Logs should be retained at least 180 days
AI Justification
The text discusses the importance of maintaining backup logs and retaining logs for a specified period, which aligns with the requirement to retain data according to documented processes.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing logs that may contain sensitive data and the need for appropriate privacy protection measures, which aligns with logging sensitive data access.

Document Content
Matched Section
Section: e) Event logs can contain sensitive data and personally identifiable information.
Content: e) Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The mention of event logs containing sensitive data and personally identifiable information indicates the need to log access to such data.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration Management | Baseline Configuration
AI Justification
The chunk discusses the need for secure configuration management and related processes for enterprise assets and software.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration Management | Baseline Configuration
AI Justification
CM-2 relates to the establishment of a configuration management plan which aligns with maintaining documented secure configuration processes.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration Management | Baseline Configuration
AI Justification
PR.IP-1 emphasizes the importance of managing configurations of enterprise assets, which aligns with the control's focus.

Document Content
Matched Section
Section: Firewall Security
Content: Firewalls should be established to protect internal/external network connections, and the information that traverses them, from vulnerabilities and exposures to unauthorized access.
AI Justification
The section discusses the establishment of firewalls to protect network connections, which aligns with the requirement to implement and manage firewalls.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: CM-2
AI Justification
The chunk discusses managing configuration and securing administrative interfaces, which aligns with the control's focus on secure management of assets and software.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Inventory and Control of Enterprise Assets
AI Justification
The mention of inventory and control aligns with the need to manage enterprise assets securely.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Secure Configuration of Enterprise Assets and Software
AI Justification
The focus on secure configuration directly relates to the control's intent to manage configurations securely.

Document Content
Matched Section
Section: Privileged Access Management
Content: b) Information owners should only grant privileged access to developers on a need-to-use basis. Privileged access should only be used to support specific incidents or problems and those accounts should be limited, monitored and disabled upon termination of the requested tasks.
AI Justification
The text discusses the management of privileged access, which includes limiting and monitoring accounts, aligning with the control's focus on managing default accounts.
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf CIS
7 matches found

Document Content
Matched Section
Section: Access Limitation
Content: Supplier and/or contractor has a duty to limit access to Test data on a 'need to know' basis.
AI Justification
The text specifies that access to Test data should be limited based on a 'need to know' basis, which aligns with configuring data access control lists.

Document Content
Matched Section
Section: Section discussing data protection and disposal methods.
Content: All Confidential hard copy data that is no longer required should be shredded by use of a crosscut shredder.
AI Justification
The section discusses the disposal of confidential hard copy data, specifically mentioning shredding, which aligns with the control's requirement for secure data disposal.

Document Content
Matched Section
Section: Communications Security
Content: a) Supplier and/or contractor should secure all backup media during transportation and in storage.
AI Justification
The section discusses the secure handling and disposal of data, which aligns with the need to encrypt data on removable media to protect sensitive information.

Document Content
Matched Section
Section: a) All data provided by Test should be encrypted using AES-128 or stronger
Content: a) All data provided by Test should be encrypted using AES-128 or stronger
AI Justification
The chunk specifies that all data provided by Test should be encrypted using AES-128 or stronger, which aligns with the requirement to encrypt sensitive data at rest.

Document Content
Matched Section
Section: b) To protect data Integrity, data should be hashed using SHA-256 or stronger
Content: b) To protect data Integrity, data should be hashed using SHA-256 or stronger
AI Justification
The chunk mentions that data should be hashed using SHA-256 or stronger to protect data integrity, which aligns with the control for ensuring data integrity.

Document Content
Matched Section
Section: Secure disposal of records
Content: secure disposal of records (effective 'wiping' of data stored electronically, secure disposal of paper records).
AI Justification
The section discusses secure disposal of records, which aligns with the need to wipe data from devices to protect sensitive information.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the need for individual access to be justified and the prevention of shared credentials, which aligns with maintaining an inventory of accounts and ensuring authorized access.
anonymized_2.1_IS_Acceptable_Use_Standard.pdf CIS
3 matches found

Document Content
Matched Section
Section: V. Bring Your Own Device
Content: Mandatory security controls and safeguards have been identified by Test for managing security for personally owned devices registered, provisioned, and authorized to connect to Test’s network. By participating in Test’s BYOD program, the User agrees to the following: a. Wiping or removal of data of User’s device. 1. User agrees that designated staff can, under certain circumstances, remotely copy, wipe, or otherwise remove all data from his or her personal device. This includes all personal data such as contact information, photos, and personal emails if the personal data is stored or processed by a Test managed application.
AI Justification
The section outlines the process of wiping or removing data from personal devices, which aligns with the requirement for securely disposing of data as per the documented data management process.

Document Content
Matched Section
Section: 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use
Content: Data processing using Test-authorized encrypted removable media (USB drives, external hard drives).
AI Justification
The section explicitly mentions the use of Test-authorized encrypted removable media for data processing.

Document Content
Matched Section
Section: V. Bring Your Own Device
Content: 1. User agrees that designated staff can, under certain circumstances, remotely copy, wipe, or otherwise remove all data from his or her personal device.
AI Justification
The section explicitly mentions the ability to remotely wipe data from personal devices under certain circumstances, which aligns with the control's requirement for enterprise-owned devices.
anonymized_2.0_IS_Acceptable_Use_Policy.pdf CIS
2 matches found

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The chunk discusses the process of requesting exceptions to policies, which aligns with the management of software that may not be currently supported but is necessary for the enterprise's mission.

Document Content
Matched Section
Section: Data Classification Policy
Content: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy. This includes but is not limited to blogging and social media usage.
AI Justification
The text discusses sensitive material and mentions a Data Security classification policy, which aligns with establishing and maintaining a data classification scheme.
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf CIS
9 matches found

Document Content
Matched Section
Section: User Access Authorization Process
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The chunk discusses the process of user access authorization, retention of access forms, and responsibilities of information owners, which aligns with establishing a documented data management process.

Document Content
Matched Section
Section: System and Application Access Control - Information Access Restriction
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know. E.g., read, write, delete, and execute rights should be granted as per business need.
AI Justification
The section discusses restricting access based on the need to know, which aligns with configuring data access control lists.

Document Content
Matched Section
Section: Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken.
Content: Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken. Records should be maintained for a minimum period of twelve (12) months.
AI Justification
The section discusses the maintenance of records related to account and privilege reviews, which aligns with data retention practices.

Document Content
Matched Section
Section: Control of sensitive data access and masking procedures.
Content: This includes both masking within applications such as replacing sensitive data with ‘#’ or other character and masking within data storage using approved encryption methods.
AI Justification
The section discusses the importance of masking sensitive data and ensuring that it is not displayed in clear text, which aligns with logging access to sensitive data.

Document Content
Matched Section
Section: Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
Content: f) Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The section discusses maintaining a configuration management database and strict change control procedures for program source libraries, which aligns with establishing and maintaining a documented secure configuration process.

Document Content
Matched Section
Section: Session Locking Policy
Content: Administrators are responsible to ensure that the screen lock is always functional after an idle period of 15 minutes.
AI Justification
The text specifies that administrators are responsible for ensuring that the screen lock is functional after an idle period of 15 minutes, which aligns with the requirement for automatic session locking.

Document Content
Matched Section
Section: Management of program source code libraries and configuration management
Content: b) Where possible, program source code libraries should not be held on production systems. c) All updates or issues of the program sources to developers should be carried out through an authorized request. d) User Accounts should have the least amount of privilege required to perform their business processes, thereby limiting access to source code. e) An audit log should be maintained of all access to program source libraries. f) Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The chunk discusses the management of program source code libraries, version control, and access control, which aligns with securely managing enterprise assets and software.

Document Content
Matched Section
Section: User ID Management and Default Account Handling
Content: User IDs should be unique across all systems and uniquely associated with that single person to whom it has been assigned. User IDs should not be utilized by anyone except the individual to whom the IDs have been issued. Shared IDs should only be permitted where they are necessary for business or operational reasons and the use should be approved and documented. All Users with access to Test¢s Information Resources should use the User ID that has been specifically assigned to them. The only exception being preauthorized shared accounts. Default parameters, such as password length, composition, change schedules and other controls based on the account management standards, should be set when creating new User accounts. All default, pre-set, or temporary passwords and accounts assigned internally should be set to a unique value per User and changed immediately after first use.
AI Justification
The section discusses the management of user IDs, including the handling of default and shared accounts, which aligns with the control's focus on managing default accounts.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: All Users that require privileged access should also be provided their own personal accounts for normal business use. Privileged access accounts are to be stringently monitored through an approved Privileged Session Manager which allow recording of sessions and have logging/security agents which deliver information to a global SIEM.
AI Justification
The text discusses the management of accounts, including the need for personal accounts for normal business use and monitoring of privileged access accounts, which aligns with maintaining an inventory of accounts.
anonymized_7.2_IS_End_User_Device_Standard.pdf CIS
7 matches found

Document Content
Matched Section
Section: Define desktop and end-user device security access controls.
Content: ii. Define desktop and end-user device security access controls.
AI Justification
The section defines access controls related to desktop and end-user devices, which aligns with the need to configure data access control lists based on user needs.

Document Content
Matched Section
Section: Devices should be password-protected and encrypted.
Content: Devices should be password-protected and encrypted.
AI Justification
The text discusses the need for devices to be password-protected and encrypted, which aligns with the requirement to encrypt sensitive data on end-user devices.

Document Content
Matched Section
Section: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
Content: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
AI Justification
The mention of approved removable devices that support password-protection and encryption further supports the control's requirement for encryption.

Document Content
Matched Section
Section: Removable Storage Devices
Content: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
AI Justification
The text discusses the requirement for removable devices to be password-protected and encrypted, which aligns with the control's focus on encryption of data on such media.

Document Content
Matched Section
Section: Devices should be password-protected and encrypted.
Content: Devices should be password-protected and encrypted.
AI Justification
The chunk discusses the importance of encryption for devices and specifically mentions encrypted USB devices, aligning with the control's focus on encrypting sensitive data at rest.

Document Content
Matched Section
Section: Section 6: Personal Firewalls
Content: Personal firewalls software should be installed and subject to update from a central policy server; users should not be able to disable or change the configuration of this firewall.
AI Justification
The text discusses the installation and management of personal firewall software, which aligns with the control's focus on implementing and managing firewalls.

Document Content
Matched Section
Section: Section 6: Personal firewalls software should be installed and subject to update from a central policy server.
Content: Personal firewalls software should be installed and subject to update from a central policy server; users should not be able to disable or change the configuration of this firewall.
AI Justification
The text specifies that personal firewall software should be installed and managed centrally, aligning with the requirement to implement and manage a host-based firewall.
anonymized_3.0_IS_Information_Security_Policy_2.pdf CIS
4 matches found

Document Content
Matched Section
Section: Asset Management – Establishes controls for asset identification, inventory, ownership and handling.
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets.
AI Justification
The chunk discusses the establishment of controls for asset identification and inventory, which aligns with the requirement to maintain an accurate inventory of enterprise assets.

Document Content
Matched Section
Section: Asset Management
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets.
AI Justification
The section discusses establishing controls for asset identification and handling, which aligns with ensuring processes for unauthorized assets.

Document Content
Matched Section
Section: Cryptography
Content: Cryptography – Establishes controls for proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information.
AI Justification
The chunk discusses the establishment of controls for the protection of information assets, which aligns with the requirement to encrypt sensitive data at rest to protect confidentiality and integrity.

Document Content
Matched Section
Section: Asset Management
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets.
AI Justification
The section discusses asset management and the need for appropriate protection requirements for information assets, which aligns with securely managing enterprise assets.
anonymized_9.1_IS_Cryptography_Standards.pdf CIS
5 matches found

Document Content
Matched Section
Section: Access Control Policy
Content: A.9.1.1 Access Control Policy
AI Justification
The control requires the establishment of an access control policy that aligns with the need to configure data access control lists based on user requirements.

Document Content
Matched Section
Section: Information Access Restriction
Content: A.9.4.1 Information Access Restriction
AI Justification
This control emphasizes the need to restrict access to information based on user roles and responsibilities, which aligns with the concept of applying data access control lists.

Document Content
Matched Section
Section: Confidential, Restricted information or applications that require transactional integrity
Content: Confidential, Restricted information or applications that require transactional integrity such as, but not exclusive to, trading and client-identifying information should leverage cryptographic protection.
AI Justification
The text discusses the need for cryptographic protection for sensitive information, indicating a requirement for encryption.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.8.2.2 Labeling of Information
AI Justification
The control aligns with the need to establish a data classification scheme, which includes labeling data as 'Sensitive,' 'Confidential,' or 'Public.'

Document Content
Matched Section
Section: Confidential, Restricted information or applications that require transactional integrity
Content: Confidential, Restricted information or applications that require transactional integrity such as, but not exclusive to, trading and client-identifying information should leverage cryptographic protection. In the absence of application layer encryption, new applications which store, process, or exchange Test Confidential, Restricted information or applications that require transactional integrity such as trading applications should apply cryptographic protection to the infrastructure and data layer, e.g. VM, database, file, etc. where suitable solutions exist in accordance with Test Data Security and Cryptography policy.
AI Justification
The text discusses leveraging cryptographic protection for confidential and restricted information, which aligns with the requirement to encrypt sensitive data at rest.
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf CIS
3 matches found

Document Content
Matched Section
Section: Data Retention and Disposal
Content: Supplier and/or contractor should acknowledge that Test Data retention and replication should always be assessed against business needs and minimizes, either by not collecting unnecessary data or by deleting data as soon as the need for it has passed and that holding any data presents security risks.
AI Justification
The text discusses the importance of assessing data retention against business needs and emphasizes minimizing unnecessary data collection and timely deletion of data, which aligns with the control's focus on documented data management processes.

Document Content
Matched Section
Section: Plan detailing disposal of Test data while contract off-boarding
Content: Plan detailing disposal of Test data while contract off-boarding Supplier and/or contractor should acknowledge that Test Data retention and replication should always be assessed against business needs and minimizes, either by not collecting unnecessary data or by deleting data as soon as the need for it has passed and that holding any data presents security risks.
AI Justification
The text discusses the disposal of Test data and emphasizes the importance of minimizing data retention, which aligns with the secure disposal of data as per the control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE - Implementation
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The section mentions logging and monitoring, which aligns with the requirement to log sensitive data access.
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf CIS
3 matches found

Document Content
Matched Section
Section: Evidence Retention and Documentation
Content: Although the primary reason for gathering evidence during an incident is to resolve the incident, the severity and sensitivity of the incident may also deem it necessary hold evidence for legal proceedings. In such cases, it is important to clearly document how all evidence, including compromised systems, has been preserved.
AI Justification
The text discusses the importance of retaining evidence for legal proceedings and the need to document how evidence is preserved, which aligns with data retention policies.

Document Content
Matched Section
Section: Incident Categorization
Content: The follow provides guidelines for CSIRT Incident Managers (IM) to classify the event category, criticality level, and sensitivity level for each incident.
AI Justification
The guidelines for incident categorization align with the need to establish and maintain a data classification scheme, as they involve classifying incidents based on their severity and sensitivity levels.

Document Content
Matched Section
Section: Evidence Handling and Chain of Custody
Content: A detailed log should be kept for all evidence, including the following: Identifying information (e.g., the location, serial number, model number, hostname, media access control (MAC) addresses, and IP addresses of a computer)...
AI Justification
The chunk discusses the importance of maintaining a detailed log of evidence handling, which aligns with the requirement to log sensitive data access.
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf CIS
15 matches found

Document Content
Matched Section
Section: Inventory and Control of Software Assets
Content: Inventory and Control of Software Assets
AI Justification
The control requires maintaining a detailed inventory of licensed software, which aligns with the section title 'Inventory and Control of Software Assets'.

Document Content
Matched Section
Section: Assets should be classified in terms of business criticality, service-level expectations, and operational continuity requirements.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The text discusses the need for a complete inventory of business-critical assets and their regular updates, aligning with the requirement to maintain an accurate inventory of all enterprise assets.

Document Content
Matched Section
Section: Assets should be classified in terms of business criticality, service-level expectations, and operational continuity requirements.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The mention of maintaining an inventory of assets aligns with the control's focus on asset management.

Document Content
Matched Section
Section: Assets should be classified in terms of business criticality, service-level expectations, and operational continuity requirements.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The text emphasizes the importance of maintaining and updating an inventory, which is in line with this control's objectives.

Document Content
Matched Section
Section: Assets should be classified in terms of business criticality, service-level expectations, and operational continuity requirements.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The control focuses on the classification and management of assets, which is reflected in the need for a complete inventory.

Document Content
Matched Section
Section: Assets should be classified in terms of business criticality, service-level expectations, and operational continuity requirements.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The text discusses maintaining and updating a complete inventory of business-critical assets, which aligns with the requirement to use discovery tools for asset identification and inventory updates.

Document Content
Matched Section
Section: A complete inventory of business-critical assets located at all sites and/or geographical locations.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The mention of maintaining a complete inventory of assets aligns with the control's focus on asset management.

Document Content
Matched Section
Section: assigned ownership by defined roles and responsibilities.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The text specifies assigning ownership of assets, which aligns with the control's focus on defining roles and responsibilities for asset management.

Document Content
Matched Section
Section: their usage over time should be maintained and updated regularly.
Content: A complete inventory of business-critical assets located at all sites and/or geographical locations and their usage over time should be maintained and updated regularly and assigned ownership by defined roles and responsibilities.
AI Justification
The text mentions the usage of assets over time, which aligns with the control's focus on understanding asset usage.

Document Content
Matched Section
Section: Definition of data governance and data privacy
Content: data governance managing the lifecycle of organizational data from creation and introduction to removal and/or disposal and destruction. data privacy governs how data is collected, shared, and used.
AI Justification
The chunk discusses data governance, data privacy, and data security, which are all related to the management and protection of data, aligning with the need for a documented data management process.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The chunk discusses various aspects of access control, which aligns with the need to configure data access control lists based on user needs.

Document Content
Matched Section
Section: Data Governance
Content: data governance managing the lifecycle of organizational data from creation and introduction to removal and/or disposal and destruction.
AI Justification
The chunk discusses the lifecycle of organizational data, including removal and disposal, which aligns with the need for secure data disposal as outlined in control 3.5.

Document Content
Matched Section
Section: Management
Content: Policies and procedures should be established, and supporting business processes and technical measures implemented, for the use of encryption protocols for protection of sensitive data in storage (e.g., file servers, databases, and end-user workstations), data in use (memory), and data in transmission (e.g., system interfaces, over public networks, and electronic messaging) as per applicable legal, statutory, and regulatory compliance obligations.
AI Justification
The text discusses the use of encryption protocols for the protection of sensitive data, which aligns with the control's focus on encryption.

Document Content
Matched Section
Section: DLP Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint protection), in motion (data-in-transit/network traffic), and at rest (data-at-rest/storage)
Content: DLP Data loss prevention (DLP) software detects potential data breaches/data exfiltration transmissions and prevents them by monitoring, detecting and blocking sensitive data while in use (endpoint protection), in motion (data-in-transit/network traffic), and at rest (data-at-rest/storage)
AI Justification
The text discusses DLP software that detects and prevents data breaches by monitoring sensitive data, which aligns with the control's focus on identifying sensitive data and updating the data inventory.

Document Content
Matched Section
Section: Access Control and Logging Policies
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data. User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text discusses the need for appropriate segregation of information systems and access restrictions to prevent inappropriate disclosure and tampering of log data, which aligns with logging sensitive data access.
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf CIS
7 matches found

Document Content
Matched Section
Section: 1.2 REQUIREMENTS - Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The section discusses access control measures that should be in place to prevent unauthorized access to information resources, which aligns with the need to address unauthorized assets.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers). Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The text discusses the need to define, document, implement, and maintain policies to control access to information resources, which aligns with establishing a documented data management process.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The text discusses controlling access to information resources based on business and security requirements, aligning with the need-to-know principle and data access control lists.

Document Content
Matched Section
Section: vi. Encryption is to be used to protect the confidentiality of remote access sessions.
Content: vi. Encryption is to be used to protect the confidentiality of remote access sessions.
AI Justification
The chunk mentions the use of encryption to protect the confidentiality of remote access sessions, which aligns with the control's focus on encrypting sensitive data.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: 1.11 DOCUMENT REVISION HISTORY VERSION DATE REVISION AUTHOR SUMMARY OF CHANGES 12/06/2023 Tohru Watanabe Content Updates and Annual Review
AI Justification
The chunk mentions a documented revision history and annual review, which aligns with maintaining a secure configuration process.

Document Content
Matched Section
Section: Service Accounts
Content: a. All service accounts are required to be added to Enterprise Password Vault (EPV) or Enterprise Secrets Management Solution (ESMS). Specifically, all on premise, cloud, third-party and SaaS accounts including but not limited to: i. Local accounts of any kind. ii. WDS service accounts. iii. Unix Directory Service (UDS) accounts. iv. Application specific accounts.
AI Justification
The text discusses the management of service accounts, which includes ensuring that they are added to a password management solution and that appropriate approvals are obtained, aligning with the control's focus on managing accounts.

Document Content
Matched Section
Section: Service Accounts
Content: a. All service accounts are required to be added to Enterprise Password Vault (EPV) or Enterprise Secrets Management Solution (ESMS). Specifically, all on premise, cloud, third-party and SaaS accounts including but not limited to: i. Local accounts of any kind. ii. WDS service accounts. iii. Unix Directory Service (UDS) accounts. iv. Application specific accounts.
AI Justification
The text discusses the management and verification of service accounts, which aligns with maintaining an inventory of accounts.
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf CIS
2 matches found

Document Content
Matched Section
Section: Data Management Process
Content: Supplier service provider information security questionnaires, compliance reports, penetration test reports, and other due diligence documentation should be retained and documented.
AI Justification
The chunk discusses the retention and documentation of due diligence materials, which aligns with the requirements for maintaining a documented data management process.

Document Content
Matched Section
Section: Supplier Relationship Standard and Data Security Policy
Content: Suppliers should be able to remove all Test data from the hosting locations at the conclusion of a service contract. Secure data disposal should follow the Data Security Policy, Cloud Security.
AI Justification
The chunk discusses the requirement for suppliers to remove Test data from hosting locations and mentions secure data disposal following the Data Security Policy.
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf CIS
3 matches found

Document Content
Matched Section
Section: Access rights to the Test information resources should be revoked immediately upon completion of the task for which the access was requested.
Content: Access rights to the Test information resources should be revoked immediately upon completion of the task for which the access was requested. The revocation should be documented and attached to the approved access request documentation.
AI Justification
The text discusses the revocation of access rights to Test information resources and networks, which aligns with the need to address unauthorized assets.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Personnel participating in a BC/DR event may require access to networks and network services needed in the recovery effort. Requests for the granting of access to Test networks and network services should be documented and approved by one of the following: a. A director level IT representative. b. A member of the Information Security department.
AI Justification
The section outlines the process for granting and revoking access to networks and network services, which is relevant to the control.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Access rights to the Test networks and network services should be revoked immediately upon completion of the task for which the access was requested. The revocation should be documented and attached to the approved access request documentation.
AI Justification
The text discusses the revocation of access rights and the documentation of access requests, which aligns with the need to configure data access control lists based on user needs.
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf CIS
3 matches found

Document Content
Matched Section
Section: Access Control Management
Content: A.9.1.1 Access Control Policy
AI Justification
The control emphasizes the need for access control policies which align with the requirement to configure data access control lists based on user needs.

Document Content
Matched Section
Section: Access Control Management
Content: A.9.4.1 Information Access Restriction
AI Justification
This control relates to restricting access to information based on user roles, which is consistent with configuring data access control lists.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary. Network Administrators create network login IDs and administer network-level permissions granted to each employee for perimeter-level security.
AI Justification
The section discusses the management of user accounts, including the creation and administration of login IDs and permissions, which aligns with maintaining an inventory of accounts.
anonymized_9.0_IS_Cryptography_Policy_1.pdf CIS
7 matches found

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Labeling of Information
AI Justification
The chunk mentions 'Labeling of Information', which aligns with establishing a data classification scheme.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of encryption for protecting sensitive data, including encryption-in-transit and the testing of encryption algorithms and keys.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of using digital signature certificates and encryption algorithms aligns with the control's focus on protecting sensitive data.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The reference to authentication and encryption for wireless connections indicates a focus on protecting sensitive data during transmission.

Document Content
Matched Section
Section: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners
Content: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
AI Justification
Testing of encryption algorithms and keys by System Owners aligns with the control's emphasis on ensuring the security of encrypted data.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the use of cryptographic controls to protect sensitive information, which aligns with the requirement to encrypt data, including on removable media.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission.
AI Justification
The policy explicitly states the use of cryptographic controls to protect sensitive data during storage, which aligns with the requirement for encryption of sensitive data at rest.
anonymized_15.0_IS_Incident_Management_Policy_1.pdf CIS
1 matches found

Document Content
Matched Section
Section: Record Retention
Content: Test information security team shall maintain the incident logs and corresponding documentation for a minimum of one year following the discovery of an incident or until an investigation is completed.
AI Justification
The text discusses maintaining incident logs and documentation, which aligns with logging sensitive data access and actions taken during incidents.
anonymized_20.0_IS_Risk_Management_Policy_2.pdf CIS
0 matches found

No detailed analysis available for this document.

anonymized_6.0_IS_Data_Security_Policy_1.pdf NIST
91 matches found

Document Content
Matched Section
Section: Service Set Identifier (SSID)
Content: SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
AI Justification
The chunk discusses the SSID, which is a critical component of wireless network authentication and access control, aligning with the control's focus on wireless technologies and authentication protocols.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner.
AI Justification
The responsibilities of Data Custodians include assigning and removing access to user or service accounts, which aligns with the requirements for managing system accounts and access privileges.

Document Content
Matched Section
Section: Restricted Data
Content: Restricted Data is characterized as sensitive data that is intended for a very limited group of individuals. This level contains data, which if disclosed would provide access to business secrets and could jeopardize material interests or actions of Test or its clients and could lead to material personal or financial detriment if revealed to unauthorized persons.
AI Justification
The chunk discusses characteristics of Restricted Data, which aligns with the control's focus on information that may be restricted and the implications of sharing such information.

Document Content
Matched Section
Section: Public Data and Internal Use Only Data
Content: Public Data is any information that is available or required to be shared with the general public, with no legal restrictions on its access or use. Examples include: i. Published annual reports ii. Interviews with news media iii. Business cards iv. Press releases v. Data available on a public website Internal Use Only Data is typically required to perform normal day-to-day work and may be accessed by Test personnel as appropriate. Internal Use Only data may be shared within Test, but should not be shared with consultants, vendors or contingency workers, unless a non- disclosure agreement or exception by the Data
AI Justification
The text discusses the distinction between public data and internal use only data, aligning with the control's focus on managing access to nonpublic information.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data. Terminated personnel and changes to access privileges should be identified and the information forwarded to the Data Custodian for updating.
AI Justification
The responsibilities outlined for Data Owners include reviewing and verifying user access privileges, which relates directly to access control decisions.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner.
AI Justification
The responsibilities outlined for Data Custodians directly relate to the enforcement of access control policies, including assigning and removing access to user accounts.

Document Content
Matched Section
Section: Data Custodian
Content: Securing information based upon Business Line classification and direction. It is the responsibility of the Data Custodian to work with a Data Owner who can identify all confidential information and define the appropriate security measures for that information. Managing controls over access, storage, processing, and transmission of the data.
AI Justification
The responsibilities of the Data Custodian include managing controls over access, storage, processing, and transmission of data, which aligns with the principles of information flow control.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner.
AI Justification
The responsibilities outlined for Data Custodians emphasize the importance of assigning and removing access based on the direction of Data Owners, which aligns with the principle of separation of duties to mitigate risks associated with unauthorized access.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data.
AI Justification
The responsibilities outlined for Data Owners include reviewing and verifying user access privileges, which aligns with the principle of least privilege by ensuring that users have only the access necessary for their roles.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: Appropriate security controls should be implemented to protect Test¢s information resources. A data classification scheme should be designed to ensure that all data is classified in accordance to its criticality, sensitivity and people dealing with it are aware of how to handle and protect it.
AI Justification
The text discusses the importance of awareness and training policies and procedures in relation to security and privacy assurance, which aligns with the AT-1 control.

Document Content
Matched Section
Section: 1.8 DATA RETENTION and 1.9 ROLES & RESPONSIBILITIES
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements.
AI Justification
The section discusses roles and responsibilities related to data retention and management, which aligns with the need for documentation and training on these policies.

Document Content
Matched Section
Section: 1.9 ROLES & RESPONSIBILITIES
Content: Data Owner l Approving access to the data in accordance with Access control policy.
AI Justification
The responsibilities of the Data Owner include approving access to data in accordance with the access control policy, which is a key aspect of access control.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset. d) Provide training, by means of informational bulletins, to Data Owners concerning their responsibilities. e) Provide technical expertise to Data Owners concerning the identification of security risks and/or compensating controls pertaining to service providers. f) The Data Custodian will change or adjust data only upon written direction from a Data Owner. Exceptions will be made for Non-Key Applications upon sign off by the Data.
AI Justification
The responsibilities outlined for Data Custodians include aspects of accountability and control over information assets, which aligns with the need for audit and accountability policies.

Document Content
Matched Section
Section: 1.8 DATA RETENTION
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements.
AI Justification
The chunk discusses data retention policies driven by legal and regulatory requirements, which aligns with the need to retain audit records for administrative, legal, and operational purposes.

Document Content
Matched Section
Section: 9.0 Cryptography Policy
Content: Certificate A digital certificate provides identifying information is forgery resistant and can be verified because it was issued by an official, trusted agency. The certificate contains the name of the certificate holder, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures) and the digital signature of the certificate-issuing authority (CA) so that a recipient can verify that the certificate is real.
AI Justification
The chunk discusses digital certificates, their properties, and their verification process, which aligns with the definition of PKI and trust anchors.

Document Content
Matched Section
Section: System & Communications Protection | Secure Name/Address Resolution (Authoritative Source)
Content: System & Communications Protection | Secure Name/Address Resolution (Authoritative Source)
AI Justification
The chunk discusses the importance of authoritative source information for name and address resolution, which aligns directly with the control's focus on providing assurances for origin authentication and integrity verification.

Document Content
Matched Section
Section: System & Communications Protection | Secure Name/Address Resolution
Content: System & Communications Protection | Secure Name/Address Resolution (Authoritative Source)
AI Justification
The chunk discusses the validation of name resolution services and the importance of authenticated channels, which aligns directly with the requirements of SC-21.

Document Content
Matched Section
Section: System & Communications Protection| Session Authenticity
Content: System & Communications Protection| Session Authenticity
AI Justification
The chunk explicitly mentions 'System & Communications Protection| Session Authenticity', which aligns with the control's focus on protecting session authenticity and ensuring the integrity of communications.

Document Content
Matched Section
Section: Secure Name/Address Resolution (Authoritative Source)
Content: Systems that provide name and address resolution services include domain name system (DNS) servers. To eliminate single points of failure in systems and enhance redundancy, organizations employ at least two authoritative domain name system servers—one configured as the primary server and the other configured as the secondary server. Additionally, organizations typically deploy the servers in two geographically separated network subnetworks (i.e., not located in the same physical facility). For role separation, DNS servers with internal roles only process name and address resolution requests from within organizations (i.e., from internal clients). DNS servers with external roles only process name and address resolution information requests from clients external to organizations (i.e., on external networks, including the Internet). Organizations specify clients that can access authoritative DNS servers in certain roles (e.g., by address ranges and explicit lists).
AI Justification
The text discusses the implementation of DNS servers to ensure redundancy and role separation, which aligns with the requirements of SC-22.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The responsibilities outlined for Data Custodians include implementing safeguards to protect the confidentiality and integrity of Information Assets, which aligns with the focus of SC-28 on protecting information at rest.

Document Content
Matched Section
Section: System & Communications Protection| Out-of-Band Channels
Content: System & Communications Protection| Out-of-Band Channels
AI Justification
The chunk explicitly mentions 'Out-of-Band Channels' which aligns directly with the control SC-37 that discusses the use and characteristics of out-of-band channels.

Document Content
Matched Section
Section: Scope and Applicability
Content: Appropriate security controls should be implemented to protect Test¢s information resources. A data classification scheme should be designed to ensure that all data is classified in accordance to its criticality, sensitivity and people dealing with it are aware of how to handle and protect it.
AI Justification
The text discusses the need for appropriate security controls to protect information resources and the importance of a data classification scheme, which aligns with the principles of OPSEC.

Document Content
Matched Section
Section: System & Communications Protection| Denial-of-Service Protection
Content: System & Communications Protection| Denial-of-Service Protection
AI Justification
The text discusses denial-of-service events, their causes, and technologies available to mitigate them, which aligns directly with the control's focus on protecting against such events.

Document Content
Matched Section
Section: System & Communications Protection| Boundary Protection
Content: System & Communications Protection| Boundary Protection
AI Justification
The mention of boundary protection devices filtering packets to protect internal networks aligns with the control's focus on boundary protection.

Document Content
Matched Section
Section: System & Communications Protection | Secure Name/Address Resolution (Authoritative Source)
Content: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses. SP 800-189 provides additional information on source address validation techniques to prevent ingress and egress of traffic with spoofed addresses. Commercial telecommunications services are provided by network components and consolidated management systems shared by customers. These services may also include third party-provided access lines and other service elements. Such services may represent sources of increased risk despite contract security provisions. Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).
AI Justification
The text discusses managed interfaces and boundary protection mechanisms, which directly aligns with the control SC-7 regarding the management of interfaces and network boundaries.

Document Content
Matched Section
Section: 1.11 MAINTENANCE and 1.12 EXCEPTION
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval. Exceptions to the policy should be approved by InfoSec in advance.
AI Justification
The text discusses the importance of policies and procedures related to system and information integrity, emphasizing the need for regular reviews and the handling of exceptions, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: Checks into a system or report to ensure the logical consistency of input and stored data
Content: Several checks into a system or report to ensure the logical consistency of input and stored data should be implemented. Checks can include Data type check, code check, range check, format check, consistency check and/or uniqueness.
AI Justification
The section discusses the importance of validating inputs to ensure they meet specified definitions for format and content, which aligns with the control's focus on checking the syntax and semantics of system inputs.

Document Content
Matched Section
Section: 1.8 DATA RETENTION
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements.
AI Justification
The section discusses data retention policies and the responsibilities of the Data Owner in ensuring compliance with legal and regulatory requirements, which aligns with the control's focus on information management and retention.

Document Content
Matched Section
Section: 1.8 DATA RETENTION
Content: Data retention policies are driven by legal and regulatory requirements. The Data Owner should ensure that data is retained as it pertains to Global, Federal, State and Local statutes and regulations and/or requirements.
AI Justification
The section discusses data retention policies and the importance of adhering to legal and regulatory requirements, which aligns with the need to retain information only as long as necessary.

Document Content
Matched Section
Section: Checks into a system or report to ensure the logical consistency of input and stored data
Content: Several checks into a system or report to ensure the logical consistency of input and stored data should be implemented. Checks can include Data type check, code check, range check, format check, consistency check and/or uniqueness.
AI Justification
The chunk discusses the importance of ensuring logical consistency of input and stored data, which aligns with the need to protect against corruption or modification of information.

Document Content
Matched Section
Section: System monitoring capabilities are achieved through a variety of tools and techniques, including intrusion detection and prevention systems...
Content: Depending on the security architecture, the distribution and configuration of monitoring devices may impact throughput at key internal and external boundaries as well as at other locations across a network due to the introduction of network throughput latency.
AI Justification
The text discusses the strategic placement of monitoring devices at key internal and external boundaries, which aligns with the boundary protection objectives.

Document Content
Matched Section
Section: Monitoring devices are typically employed at the managed interfaces associated with controls SC-7 and AC-17.
Content: Monitoring devices are typically employed at the managed interfaces associated with controls SC-7 and AC-17.
AI Justification
The mention of monitoring devices at managed interfaces associated with controls indicates a relationship with remote access control.

Document Content
Matched Section
Section: Organizations monitor systems by observing audit activities in real time or by observing other system aspects...
Content: Organizations monitor systems by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions.
AI Justification
The text emphasizes the importance of observing audit activities in real time, which aligns with audit and accountability controls.

Document Content
Matched Section
Section: Integrity Checks
Content: Several checks into a system or report to ensure the logical consistency of input and stored data should be implemented. Checks can include Data type check, code check, range check, format check, consistency check and/or uniqueness.
AI Justification
The chunk discusses implementing checks to ensure the logical consistency of input and stored data, which aligns with the integrity-checking mechanisms mentioned in control SI-7.

Document Content
Matched Section
Section: Continuous Vulnerability Management
Content: Continuous Vulnerability Management
AI Justification
The control emphasizes the importance of proper disposal of system components to prevent compromise of sensitive information, which aligns with the concept of continuous vulnerability management.

Document Content
Matched Section
Section: Continuous Vulnerability Management
Content: Continuous Vulnerability Management
AI Justification
This control relates to the sanitization of media, which is a key aspect of secure disposal practices mentioned in the provided control.

Document Content
Matched Section
Section: Data Identification
Content: Data Identification: A complete inventory of all Information Asset types that being generated, transmitted or stored within Test should be maintained. All Test Data or data entrusted to Test from a third party should be identified and classified by the Data Owner according to its level of confidentiality.
AI Justification
The text discusses the importance of identifying and classifying data, which aligns with the principles of Supply Chain OPSEC, particularly in relation to safeguarding critical information and managing risks associated with data handling.

Document Content
Matched Section
Section: Restricted Data
Content: Restricted Data is characterized as sensitive data that is intended for a very limited group of individuals. This level contains data, which if disclosed would provide access to business secrets and could jeopardize material interests or actions of Test or its clients and could lead to material personal or financial detriment if revealed to unauthorized persons.
AI Justification
The chunk discusses the characteristics of Restricted Data, which aligns with the concept of unauthorized disclosure of sensitive information, as outlined in AU-13.

Document Content
Matched Section
Section: 1.7 PROTECTION OF LOG INFORMATION
Content: a) Test should establish controls to maintain the confidentiality, integrity, and non-repudiation of log information. The log information may be subjected to these operational problems: i. Alterations to the message types. ii. Log files being edited or deleted. iii. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over-writing of past recorded events.
AI Justification
The section discusses the protection of log information, which aligns with the need for coordinated audit logging across organizations as described in AU-16.

Document Content
Matched Section
Section: 1.7 PROTECTION OF LOG INFORMATION
Content: a) Test should establish controls to maintain the confidentiality, integrity, and non-repudiation of log information. The log information may be subjected to these operational problems: i. Alterations to the message types. ii. Log files being edited or deleted. iii. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over-writing of past recorded events.
AI Justification
The section discusses the importance of maintaining the confidentiality, integrity, and non-repudiation of log information, which aligns with the requirements for logging significant events as outlined in AU-2.

Document Content
Matched Section
Section: 1.7 PROTECTION OF LOG INFORMATION
Content: a) Test should establish controls to maintain the confidentiality, integrity, and non-repudiation of log information. The log information may be subjected to these operational problems: iii. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over-writing of past recorded events.
AI Justification
The section discusses the importance of maintaining log information and addresses the need for sufficient storage capacity to prevent loss or overwriting of log data.

Document Content
Matched Section
Section: 1.7 PROTECTION OF LOG INFORMATION
Content: a) Test should establish controls to maintain the confidentiality, integrity, and non-repudiation of log information. The log information may be subjected to these operational problems: i. Alterations to the message types. ii. Log files being edited or deleted. iii. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over-writing of past recorded events.
AI Justification
The section discusses the importance of maintaining the integrity and confidentiality of log information, as well as addressing issues related to storage capacity and the potential overwriting of logs, which aligns with the requirements of AU-5.

Document Content
Matched Section
Section: 1.7 PROTECTION OF LOG INFORMATION
Content: a) Test should establish controls to maintain the confidentiality, integrity, and non-repudiation of log information. The log information may be subjected to these operational problems: i. Alterations to the message types. ii. Log files being edited or deleted. iii. Storage capacity of the log file media being exceeded, resulting in either the failure to record events or over-writing of past recorded events.
AI Justification
The section discusses the protection of log information, including confidentiality, integrity, and non-repudiation, which aligns with the requirements of AU-9.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The responsibilities outlined for Data Custodians include managing access to information assets and implementing safeguards, which aligns with understanding where information is processed and stored.

Document Content
Matched Section
Section: Certificate
Content: A digital certificate provides identifying information is forgery resistant and can be verified because it was issued by an official, trusted agency. The certificate contains the name of the certificate holder, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures) and the digital signature of the certificate-issuing authority (CA) so that a recipient can verify that the certificate is real.
AI Justification
The definition of a digital certificate and its role in verifying authenticity aligns with the control's focus on preventing unauthorized software and firmware installations.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data. Terminated personnel and changes to access privileges should be identified and the information forwarded to the Data Custodian for updating. b) Classifying and securing data according to the criteria stipulated within this Policy. Each Data Owner will be responsible for identifying and classifying all information for which he/she is responsible. c) Establishing and reviewing access groupings based upon the data classification process.
AI Justification
The responsibilities outlined for Data Owners include reviewing access privileges and classifying data, which aligns with the control's focus on processing personally identifiable information and understanding the data actions involved.

Document Content
Matched Section
Section: Access groupings will be developed and tested prior to the implementation of new or modified applications, files, databases, devices, or other systems.
Content: Access groupings will be developed and tested prior to the implementation of new or modified applications, files, databases, devices, or other systems.
AI Justification
The text discusses the need for access groupings and the authorization of access to information assets, which aligns with the control's focus on managing changes to systems and ensuring only qualified individuals can make modifications.

Document Content
Matched Section
Section: d) Authorizing access to Information Assets.
Content: d) Authorizing access to Information Assets.
AI Justification
The chunk emphasizes the importance of authorizing access to information assets and reviewing access privileges, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: e) Reviewing and approving all modifications to owned applications.
Content: e) Reviewing and approving all modifications to owned applications.
AI Justification
The requirement to review and approve modifications to applications aligns with the need for access enforcement to ensure that only authorized changes are made.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of contingency planning policies and procedures, their development, and their relationship with security and privacy programs.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text implies the need for contingency plans as part of the broader contingency planning policies and procedures.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The responsibilities outlined for Data Custodians include implementing safeguards to protect the integrity and confidentiality of Information Assets, which aligns with the requirements for protecting system-level information and backups.

Document Content
Matched Section
Section: Service Set Identifier (SSID)
Content: SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
AI Justification
The chunk discusses unique identifiers for devices (SSID) and mentions protocols (SNMP) that relate to device management and identification, aligning with the need for unique device identification and authentication.

Document Content
Matched Section
Section: Service Set Identifier (SSID)
Content: SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
AI Justification
The chunk discusses unique identifiers such as SSID and their role in network access, which aligns with the management of individual identifiers as described in IA-4.

Document Content
Matched Section
Section: 1.11 MAINTENANCE and 1.12 EXCEPTION
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval. Exceptions to the policy should be approved by InfoSec in advance.
AI Justification
The text discusses the importance of maintenance policies and procedures, including their review and the process for exceptions, which aligns with the control's focus on establishing and maintaining such policies.

Document Content
Matched Section
Section: 1.6 DATA HANDLING
Content: e) Strong passwords are essential for keeping your data safe. Please see the 2.1 Acceptable Use Standard for information on creating strong passwords. f) The use of multifactor authentication should be enforced.
AI Justification
The chunk emphasizes the importance of strong passwords and multifactor authentication, which aligns with the requirements for establishing identity and ensuring secure access.

Document Content
Matched Section
Section: 1.6 DATA HANDLING
Content: f) The use of multifactor authentication should be enforced. g) It is essential for Test to use VPN (Virtual Private Network). A VPN encrypts employees' internet traffic and makes it harder for third parties to snoop on their online activities.
AI Justification
The mention of multifactor authentication and the use of VPN relates to the requirements for secure nonlocal maintenance and diagnostic activities.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The responsibilities outlined for Data Custodians include managing access and implementing safeguards, which aligns with the need for authorized maintenance personnel to have appropriate access and technical competence.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The section discusses the responsibilities of Data Custodians to implement physical safeguards, which is relevant to the physical access control for maintenance personnel.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset.
AI Justification
The responsibilities outlined for Data Custodians include implementing appropriate safeguards and managing access, which aligns with the need for a media protection policy and procedures.

Document Content
Matched Section
Section: Disposal of Media, Physical Media Transfer
Content: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact discs, and digital versatile discs. Non-digital media includes microfilm and paper. Controlled areas are spaces for which organizations provide physical or procedural controls to meet requirements established for protecting information and systems. Controls to protect media during transport include cryptography and locked containers.
AI Justification
The text discusses the protection of both digital and non-digital media during transport, which aligns with the requirements of MP-5.

Document Content
Matched Section
Section: Secure Disposal or Re-Use of Equipment
Content: Organizations establish documentation requirements for activities associated with the transport of system media in accordance with organizational assessments of risk. Organizations maintain the flexibility to define record-keeping methods for the different types of media transport as part of a system of transport-related records.
AI Justification
The mention of secure disposal and re-use of equipment aligns with the requirements of MP-6.

Document Content
Matched Section
Section: Media Protection | Media Sanitization
Content: Control: MP-6: Media sanitization applies to all digital and non-digital system media subject to disposal or reuse, whether or not the media is considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, workstations, network components, mobile devices, and non-digital media (e.g., paper and microfilm). The sanitization process removes information from system media such that the information cannot be retrieved or reconstructed. Sanitization techniques—including clearing, purging, cryptographic erase, de-identification of personally identifiable information, and destruction—prevent the disclosure of information to unauthorized individuals when such media is reused or released for disposal.
AI Justification
The text discusses the importance of sanitization techniques for both digital and non-digital media, aligning directly with the requirements of MP-6.

Document Content
Matched Section
Section: Disposal of Media, Physical Media Transfer
Content: Media use protections also apply to mobile devices with information storage capabilities. In contrast to MP-2, which restricts user access to media, MP-7 restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives.
AI Justification
The text discusses the restrictions and protections related to the use of both digital and non-digital media, aligning directly with the requirements of MP-7.

Document Content
Matched Section
Section: 1.11 MAINTENANCE and 1.12 EXCEPTION
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval. Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets.
AI Justification
The text discusses the importance of policies and procedures related to physical and environmental protection, including the need for periodic reviews and exceptions to policies.

Document Content
Matched Section
Section: Confidential Data
Content: Confidential Data is data that in the event of unauthorized disclosure, compromise or destruction would directly or indirectly have an adverse impact on Test, its customers or employees. Confidential data may be shared with parties who have a relationship with Test, if they have signed a nondisclosure agreement, have a need to know or there is an agreed upon formal exception from the Chief Information Security Officer (CISO). Data should be classified as Confidential if it includes at least one of the following characteristics and is not classified as Restricted: i. Information regarding clients, personnel, payroll, medical or Test business that Test is obliged to protect. ii. Shareholders personal information such as Social Security Number (SSN), Date of Birth, and Bank Account Number. iii. All data classified as production, including all customer information when used in system testing or development environments. iv. Internal and external audit reports.
AI Justification
The section discusses the classification of confidential data and the potential adverse impact of unauthorized disclosure, which aligns with the control's focus on protecting against information leakage.

Document Content
Matched Section
Section: Scope and Applicability
Content: A data classification scheme should be designed to ensure that all data is classified in accordance to its criticality, sensitivity and people dealing with it are aware of how to handle and protect it.
AI Justification
The text discusses the need for a data classification scheme and the importance of marking data according to its criticality and sensitivity, which aligns with the control's focus on marking hardware components based on the information they handle.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data.
AI Justification
The responsibilities outlined for Data Owners include reviewing user access privileges and ensuring compliance with established rules of behavior, particularly for privileged users.

Document Content
Matched Section
Section: Central management refers to organization-wide management and implementation of selected controls and processes.
Content: Central management refers to organization-wide management and implementation of selected controls and processes. This includes planning, implementing, assessing, authorizing, and monitoring the organization-defined, centrally managed controls and processes.
AI Justification
The text discusses the organization-wide management and implementation of controls and processes, which aligns with the concept of central management as described in control PL-9.

Document Content
Matched Section
Section: Automated tools (e.g., security information and event management tools or enterprise security monitoring and management tools) can improve the accuracy, consistency, and availability of information associated with centrally managed controls and processes.
Content: Automated tools (e.g., security information and event management tools or enterprise security monitoring and management tools) can improve the accuracy, consistency, and availability of information associated with centrally managed controls and processes.
AI Justification
The mention of automated tools and their role in improving accuracy and consistency of information aligns with the need for audit log management.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: To achieve effective Information Security, it is essential to classify information so that appropriate security and control measures are applied.
AI Justification
The text discusses the importance of classifying information to apply appropriate security measures, which aligns with the need to define protection and processing needs for information.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: To achieve effective Information Security, it is essential to classify information so that appropriate security and control measures are applied. For instance, it is as important not to surround trivial information with excessive security, as it is to pay keen attention to the most sensitive matters. Classification of data is also necessary to facilitate compliance with governmental regulations.
AI Justification
The chunk discusses the classification of information and the importance of applying appropriate security measures, which aligns with the requirements for controlled unclassified information.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data. Terminated personnel and changes to access privileges should be identified and the information forwarded to the Data Custodian for updating. b) Classifying and securing data according to the criteria stipulated within this Policy. Each Data Owner will be responsible for identifying and classifying all information for which he/she is responsible. c) Establishing and reviewing access groupings based upon the data classification process.
AI Justification
The responsibilities outlined for Data Owners align with the establishment of coherent policies and procedures for data governance as described in PM-23.

Document Content
Matched Section
Section: Confidential Data
Content: Confidential Data is data that in the event of unauthorized disclosure, compromise or destruction would directly or indirectly have an adverse impact on Test, its customers or employees. Confidential data may be shared with parties who have a relationship with Test, if they have signed a nondisclosure agreement, have a need to know or there is an agreed upon formal exception from the Chief Information Security Officer (CISO). Data should be classified as Confidential if it includes at least one of the following characteristics and is not classified as Restricted: i. Information regarding clients, personnel, payroll, medical or Test business that Test is obliged to protect. ii. Shareholders personal information such as Social Security Number (SSN), Date of Birth, and Bank Account Number. iii. All data classified as production, including all customer information when used in system testing or development environments. iv. Internal and external audit reports.
AI Justification
The chunk discusses the handling of confidential data, which includes personally identifiable information and the risks associated with its unauthorized disclosure.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: Appropriate security controls should be implemented to protect Test¢s information resources. A data classification scheme should be designed to ensure that all data is classified in accordance to its criticality, sensitivity and people dealing with it are aware of how to handle and protect it. This policy is applicable to all Test employees, contractors, consultants, temporary contingency workers, and other employees at Test, including all personnel affiliated with third parties who access, process, or store the organization's data.
AI Justification
The text discusses the importance of personnel security policies and procedures, emphasizing their role in protecting information resources and ensuring that all personnel are aware of their responsibilities regarding data handling.

Document Content
Matched Section
Section: 1.10 ENFORCEMENT
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The section discusses disciplinary actions for policy violations, which aligns with the control's focus on sanctions reflecting applicable laws and policies.

Document Content
Matched Section
Section: 1.3 DATA OWNER RESPONSIBILITIES
Content: Data Owners have overall responsibility for information security for their application(s) including the following responsibilities: a) Reviewing and verifying, at least annually, that users continue to require current access privileges, including associated privileges (e.g. transferring and/or copying of data). Special attention will be given to privileged users e.g.: Domain administrators and users with access to non-public personal, confidential, or restricted data. Terminated personnel and changes to access privileges should be identified and the information forwarded to the Data Custodian for updating. b) Classifying and securing data according to the criteria stipulated within this Policy. Each Data Owner will be responsible for identifying and classifying all information for which he/she is responsible. c) Establishing and reviewing access groupings based upon the data classification process.
AI Justification
The responsibilities outlined for Data Owners include ensuring that access privileges are reviewed and that data is classified and secured, which aligns with the processing and protection of personally identifiable information.

Document Content
Matched Section
Section: Restricted Data
Content: Restricted Data is characterized as sensitive data that is intended for a very limited group of individuals. This level contains data, which if disclosed would provide access to business secrets and could jeopardize material interests or actions of Test or its clients and could lead to material personal or financial detriment if revealed to unauthorized persons.
AI Justification
The chunk discusses the classification of sensitive data, which aligns with the need to apply conditions or protections for specific categories of personally identifiable information.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: Appropriate security controls should be implemented to protect Test¢s information resources. A data classification scheme should be designed to ensure that all data is classified in accordance to its criticality, sensitivity and people dealing with it are aware of how to handle and protect it.
AI Justification
The text discusses the importance of risk assessment policies and procedures in relation to security and privacy assurance, which aligns with the RA-1 control.

Document Content
Matched Section
Section: Threat Hunting
Content: Threat hunting is an active means of cyber defense in contrast to traditional protection measures, such as firewalls, intrusion detection and prevention systems, quarantining malicious code in sandboxes, and Security Information and Event Management technologies and systems.
AI Justification
The text discusses the proactive measures of threat hunting as a means of cyber defense, which aligns directly with the RA-10 control.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: To achieve effective Information Security, it is essential to classify information so that appropriate security and control measures are applied. For instance, it is as important not to surround trivial information with excessive security, as it is to pay keen attention to the most sensitive matters. Classification of data is also necessary to facilitate compliance with governmental regulations.
AI Justification
The chunk discusses the importance of classifying information to apply appropriate security measures, which aligns with the concept of security categorization and its relevance to organizational operations and compliance.

Document Content
Matched Section
Section: 1.4 DATA CUSTODIAN RESPONSIBILITIES
Content: Data Custodians have overall responsibility for technical controls over Information Assets including the following responsibilities: a) Assign and remove access to user or service accounts based upon the direction of the Data Owner. b) Record all information provided and access granted to users or services. c) Implement appropriate physical and technical safeguards to protect the confidentiality, integrity, and availability of the Information Asset. d) Provide training, by means of informational bulletins, to Data Owners concerning their responsibilities. e) Provide technical expertise to Data Owners concerning the identification of security risks and/or compensating controls pertaining to service providers. f) The Data Custodian will change or adjust data only upon written direction from a Data Owner. Exceptions will be made for Non-Key Applications upon sign off by the Data.
AI Justification
The responsibilities outlined for Data Custodians align with the need for policies and procedures that govern access and control over information assets, as well as the collaboration between security and privacy programs.

Document Content
Matched Section
Section: Security and privacy functional requirements are typically derived from the high-level security and privacy requirements described in SA-2.
Content: Security and privacy functional requirements are typically derived from the high-level security and privacy requirements described in SA-2. The derived requirements include security and privacy capabilities, functions, and mechanisms.
AI Justification
The text discusses the derivation of security and privacy requirements, which aligns with the control's focus on functional requirements derived from high-level security and privacy needs.

Document Content
Matched Section
Section: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization.
Content: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization and for reflecting the security and privacy requirements of stakeholders.
AI Justification
The mention of safeguarding capabilities and mechanisms aligns with the protection of information at rest.

Document Content
Matched Section
Section: Controls can include technical, administrative, and physical aspects.
Content: Controls can include technical, administrative, and physical aspects.
AI Justification
The text discusses the importance of security mechanisms, which relates to ensuring confidentiality and integrity during transmission.

Document Content
Matched Section
Section: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle.
Content: The application of systems security and privacy engineering principles helps organizations develop trustworthy, secure, and resilient systems and reduces the susceptibility to disruptions, hazards, threats, and the creation of privacy problems for individuals.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns with the control's focus on applying these principles to ensure secure and resilient systems.

Document Content
Matched Section
Section: Examples of system security engineering principles include: developing layered protections; establishing security and privacy policies, architecture, and controls as the foundation for design and development.
Content: Organizations that apply systems security and privacy engineering concepts and principles can facilitate the development of trustworthy, secure systems, system components, and system services.
AI Justification
The principles mentioned in the text about developing layered protections and establishing security policies relate to ensuring the confidentiality and integrity of information during transmission.

Document Content
Matched Section
Section: 1.11 MAINTENANCE and 1.12 EXCEPTION
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval. Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to system and communications protection, aligning with the requirements of SC-1.

Document Content
Matched Section
Section: 9.0 Cryptographic Policy
Content: A cryptographic key is the core part of cryptographic operations. Many cryptographic systems include pairs of operations, such as encryption and decryption. A key is a part of the variable data that is provided as input to a cryptographic algorithm to execute this sort of operation.
AI Justification
The text discusses the importance of cryptographic keys in operations, which aligns with the control's focus on key management and establishment.

Document Content
Matched Section
Section: 9.0 Cryptographic Policy
Content: A cryptographic key is the core part of cryptographic operations. Many cryptographic systems include pairs of operations, such as encryption and decryption. A key is a part of the variable data that is provided as input to a cryptographic algorithm to execute this sort of operation.
AI Justification
The chunk discusses cryptographic keys and their role in cryptographic operations, which aligns with the control's focus on cryptography for security solutions.

Document Content
Matched Section
Section: Restricted Data
Content: Restricted Data is characterized as sensitive data that is intended for a very limited group of individuals. This level contains data, which if disclosed would provide access to business secrets and could jeopardize material interests or actions of Test or its clients and could lead to material personal or financial detriment if revealed to unauthorized persons.
AI Justification
The chunk discusses the classification of sensitive data, which aligns with the concept of security and privacy attributes that protect information.
anonymized_2.0_IS_Acceptable_Use_Policy.pdf NIST
59 matches found

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of access control policies and procedures, including the process for exceptions to these policies, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: 1.10 REMOTE ACCESS TO Test’s SYSTEMS
Content: Please refer to Test’s Global IT Policies and Standards for policy requirements regarding remote access to Test’s systems.
AI Justification
The text discusses remote access to organizational systems and the use of encrypted VPNs, which aligns with the definition and requirements of AC-17.

Document Content
Matched Section
Section: 1.14 BRING YOUR OWN DEVICE (BYOD)
Content: a) Personal devices used for work are permitted with prior approval and fall under the same safeguards and controls as Test-owned equipment to ensure that Test networks and data remain safe and protected.
AI Justification
The section discusses the use of personal devices for work and outlines the responsibilities and safeguards necessary to protect organizational data, which aligns with the requirements for managing mobile devices.

Document Content
Matched Section
Section: Account Management Requirements
Content: The following requirements should be followed: a) All Users should use only those IDs that have been assigned for their use. b) Each User should be aware that they are responsible for all transactions made under the authorization of his/her system account(s). c) A User should protect his/her password as outlined in the Acceptable Use Standards in order to further enhance security of Test’s Systems. Disclosing passwords is a serious security violation. d) Approved privileged access accounts that access other employee user’s accounts for auditing, configuration or monitoring purposes should be created in accordance with all other IT and IS policies.
AI Justification
The text discusses the management of system accounts, including the responsibilities of users, the prohibition of certain account types, and the need for approved privileged access accounts, which aligns with the requirements of AC-2.

Document Content
Matched Section
Section: Information Sharing and Data Security Classification Policy
Content: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy. This includes but is not limited to blogging and social media usage.
AI Justification
The chunk discusses proprietary information and sensitive material, which aligns with the definition of information that may be restricted based on formal determinations.

Document Content
Matched Section
Section: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy.
Content: This includes but is not limited to blogging and social media usage.
AI Justification
The chunk discusses the handling of proprietary information and sensitive materials, which aligns with the control's focus on restricting access to nonpublic information.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: Test should define, document, implement, and maintain policies to control the access to and use of their information resources. All electronic communications and stored information transmitted, received, or archived in Test’s information systems are the property of Test.
AI Justification
The text discusses the enforcement of access control policies and the mechanisms that ensure such enforcement, which aligns with the requirements of AC-25.

Document Content
Matched Section
Section: 1.2 GENERAL USER RESPONSIBILITIES
Content: All Systems and information contained on those systems are the property of Test and constitute valuable business assets of Test. Test provides users with access to these Systems for appropriate business-related use. Upon use of Test’s Systems, be it directly or indirectly, the user consents the following: a. Their use relates to Test and its business, or the employment relationship between Test and its personnel. b. All use of Systems is non-private and is subject to monitoring c. Users accept they have no right to privacy. d. Subject to any local laws that may apply, any User of the Systems will be deemed to have consented to Test accessing, reviewing, monitoring, and/or restricting all such use. e. Test reserves the right to access and/or view a user’s voice and electronic mailboxes and computer files at will. f. Test reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
AI Justification
The section outlines user responsibilities and the conditions under which access to systems is granted, which aligns with the control's focus on enforcing authorized access and monitoring usage.

Document Content
Matched Section
Section: Account Management and User Responsibilities
Content: All Users should use only those IDs that have been assigned for their use. Each User should be aware that they are responsible for all transactions made under the authorization of his/her system account(s). A User should protect his/her password as outlined in the Acceptable Use Standards in order to further enhance security of Test’s Systems.
AI Justification
The text discusses the responsibilities of users regarding their accounts and emphasizes the importance of not disclosing passwords, which aligns with the principle of separation of duties to prevent abuse of privileges.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: l Is responsible for Periodically auditing the information systems for compliance to Acceptable use policy.
AI Justification
The text discusses the responsibilities of various roles in auditing information systems for compliance and handling security incidents, which aligns with the need for audit and accountability policies and procedures.

Document Content
Matched Section
Section: 1.4 SECURITY & PROPRIETARY INFORMATION
Content: To ensure confidentiality, integrity and availability of Test copyright and proprietary information, the following requirements should be followed: a) All mobile and computing devices that connect to the internal network should comply with the Access Control Policy2.
AI Justification
The chunk discusses the requirements for mobile and computing devices connecting to the internal network, which aligns with the control's focus on mobile code and its potential risks.

Document Content
Matched Section
Section: 1.12 REMOVEABLE STORAGE DEVICES
Content: The use of removable storage devices creates an inherent risk to Test and business partner’s intellectual data. However, the benefits to these devices are also widely known. All types of removable storage devices as described in the General User Responsibilities section above may be used only with the permission of the IT and Information Security departments.
AI Justification
The section discusses the risks associated with removable storage devices and emphasizes the need for permission from IT and Information Security departments, aligning with the control's focus on managing connection ports and I/O devices to prevent data exfiltration.

Document Content
Matched Section
Section: Protecting the confidentiality and integrity of transmitted information
Content: Control: SC-8: Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios. Unprotected communication paths are exposed to the possibility of interception and modification. Protecting the confidentiality and integrity of information can be accomplished by physical or logical means. Physical protection can be achieved by using protected distribution systems. A protected distribution system is a wireline or fiber-optics telecommunications system that includes terminals and adequate electromagnetic, acoustical, electrical, and physical controls to permit its use for the unencrypted transmission of classified information. Logical protection can be achieved by employing encryption techniques.
AI Justification
The text discusses the protection of confidentiality and integrity of transmitted information, which aligns directly with the SC-8 control.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: l Is responsible for Periodically auditing the information systems for compliance to Acceptable use policy. l Is Responsible for resolving al Test user queries regarding use of information systems. CISO or his/her designee l Is Responsible for resolving user queries on this policy l Is Responsible for handling security incidents reported by employees l Is Responsible for necessary approvals for genuine business need l Is Responsible for approving any exceptions to this policy l Should be aware of and ensure compliance to the requirements of the Acceptable use policy. l Should report any suspicious communication or notice of any computer virus to the Help Desk.
AI Justification
The text discusses the responsibilities related to auditing information systems for compliance and handling security incidents, which aligns with the need for established policies and procedures for system and information integrity.

Document Content
Matched Section
Section: 1.5 ORGANIZATIONALY OWNED & MANAGED INFO SYSTEMS & ASSETS
Content: a) Test-owned and managed assets are kept up to date with security patches and antivirus software.
AI Justification
The chunk discusses the importance of keeping assets up to date with security patches and antivirus software, which aligns with the need to remediate system flaws as outlined in control SI-2.

Document Content
Matched Section
Section: Requirements for handling suspicious emails
Content: Users should not open email attachments which are suspect due to their subject, content, or address regardless of whether the sender is well-known or not. Users should perform due diligence to attempt to find out if the message is trustworthy and was sent intentionally. Any suspicious email should be reported to helpdesk.
AI Justification
The text discusses the importance of monitoring and reporting suspicious emails to prevent data exfiltration and insider threats, aligning with the need for vigilance against cyber-attacks.

Document Content
Matched Section
Section: System monitoring includes external and internal monitoring.
Content: System monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at external interfaces to the system. Internal monitoring includes the observation of events occurring within the system.
AI Justification
The text discusses the importance of system monitoring, including both internal and external monitoring, which aligns directly with the objectives of control SI-4.

Document Content
Matched Section
Section: System monitoring is an integral part of organizational continuous monitoring and incident response programs.
Content: System monitoring is an integral part of organizational continuous monitoring and incident response programs, and output from system monitoring serves as input to those programs.
AI Justification
The text mentions the observation of audit activities and the importance of monitoring as part of incident response programs, which aligns with control AU-13.

Document Content
Matched Section
Section: 1.4 SECURITY & PROPRIETARY INFORMATION
Content: e) Employees should use extreme caution when opening e-mail attachments received from unknown senders, which may contain malware.
AI Justification
The chunk discusses the need for caution when opening email attachments from unknown senders, which aligns with the need for spam protection mechanisms.

Document Content
Matched Section
Section: Supply Chain Risk Management Overview
Content: The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware, and poor manufacturing and development practices in the supply chain.
AI Justification
The text discusses the importance of managing supply chain risks and outlines the activities involved in supply chain risk management, which aligns directly with control SR-2.

Document Content
Matched Section
Section: Supply Chain Risk Management Plans
Content: Finally, supply chain risk management plans address requirements for developing trustworthy, secure, privacy-protective, and resilient system components and systems, including the application of the security design principles implemented as part of life cycle-based systems security engineering processes.
AI Justification
The text mentions the development and sustainment of systems across the SDLC, which relates to the acquisition and customization of critical components.

Document Content
Matched Section
Section: Data Security classification policy
Content: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy. This includes but is not limited to blogging and social media usage.
AI Justification
The chunk discusses sensitive material and the implications of disclosing proprietary information, aligning with the control's focus on unauthorized disclosure.

Document Content
Matched Section
Section: Monitoring Internet usage and employee privacy expectations
Content: c) Monitor Internet usage. i. No employee should have any expectation of privacy regarding his or her Internet usage.
AI Justification
The chunk discusses monitoring Internet usage and the lack of expectation of privacy regarding employee Internet usage, which aligns with the session auditing practices outlined in AU-14.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: l Is responsible for Periodically auditing the information systems for compliance to Acceptable use policy.
AI Justification
The text mentions responsibilities related to auditing information systems for compliance, which aligns with the requirements for audit record review and analysis.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of configuration management policies and procedures, including the approval process for exceptions, which aligns with the requirements of CM-1.

Document Content
Matched Section
Section: Scope
Content: Test should define, document, implement, and maintain policies to control the access to and use of their information resources.
AI Justification
The text discusses the need to define, document, implement, and maintain policies related to the access and use of information resources, which aligns with understanding where information is processed and stored.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures for identification and authentication, including the approval process for exceptions, which aligns with the requirements of IA-1.

Document Content
Matched Section
Section: 1.10 REMOTE ACCESS TO Test’s SYSTEMS and 1.11 USER ID & PASSWORD SECURITY
Content: Accessing Test’s computer systems, networks or applications using another employee’s user
AI Justification
The text discusses the requirements for unique identification and authentication of users, which aligns with IA-2's focus on organizational user identification and authentication.

Document Content
Matched Section
Section: 1.10 REMOTE ACCESS TO Test’s SYSTEMS and 1.11 USER ID & PASSWORD SECURITY
Content: Identification and authentication requirements for non-organizational users are described in IA-8.
AI Justification
The text mentions identification and authentication requirements for non-organizational users, which aligns with IA-8.

Document Content
Matched Section
Section: Account Management and Password Protection
Content: All Users should use only those IDs that have been assigned for their use. Each User should be aware that they are responsible for all transactions made under the authorization of his/her system account(s). A User should protect his/her password as outlined in the Acceptable Use Standards in order to further enhance security of Test’s Systems. Disclosing passwords is a serious security violation.
AI Justification
The text discusses the management and protection of user passwords and the responsibilities of users regarding their accounts, which aligns with the requirements for authenticators.

Document Content
Matched Section
Section: User Responsibilities and Password Protection
Content: All Users should use only those IDs that have been assigned for their use. Each User should be aware that they are responsible for all transactions made under the authorization of his/her system account(s). A User should protect his/her password as outlined in the Acceptable Use Standards in order to further enhance security of Test’s Systems.
AI Justification
The text discusses the identification and authentication of users, specifically emphasizing the responsibility of users for their accounts and the protection of passwords, which aligns with the requirements for non-organizational users.

Document Content
Matched Section
Section: Detailed explanation of why the exception is necessary and Detailed mitigation information, if available.
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the necessity of maintaining records of approved requests and the procedures for emergency exceptions, which aligns with incident response policies and procedures.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department and CISO or his/her designee
Content: l Is Responsible for handling security incidents reported by employees l Should report any suspicious communication or notice of any computer virus to the Help Desk.
AI Justification
The responsibilities outlined for the CISO and IT Department align with the need for incident handling and reporting suspicious communications, which is a key aspect of incident response capabilities.

Document Content
Matched Section
Section: 1.12 REMOVEABLE STORAGE DEVICES
Content: The use of removable storage devices creates an inherent risk to Test and business partner’s intellectual data. However, the benefits to these devices are also widely known. All types of removable storage devices as described in the General User Responsibilities section above may be used only with the permission of the IT and Information Security departments.
AI Justification
The chunk discusses the use of removable storage devices and the associated risks, which aligns with the definition of system media and the need for access control.

Document Content
Matched Section
Section: 1.12 REMOVEABLE STORAGE DEVICES
Content: The use of removable storage devices creates an inherent risk to Test and business partner’s intellectual data. However, the benefits to these devices are also widely known. All types of removable storage devices as described in the General User Responsibilities section above may be used only with the permission of the IT and Information Security departments.
AI Justification
The chunk discusses the use of removable storage devices and the associated risks, aligning with the control's focus on managing and securing media.

Document Content
Matched Section
Section: 1.12 REMOVEABLE STORAGE DEVICES
Content: The use of removable storage devices creates an inherent risk to Test and business partner’s intellectual data. However, the benefits to these devices are also widely known. All types of removable storage devices as described in the General User Responsibilities section above may be used only with the permission of the IT and Information Security departments.
AI Justification
The chunk discusses the use of removable storage devices and the associated risks, aligning with the control's focus on restricting and managing the use of system media.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to physical and environmental protection, including the approval process for exceptions, which aligns with the requirements of control PE-1.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the need for policies and procedures regarding exceptions to security policies, which aligns with the planning and implementation of controls.

Document Content
Matched Section
Section: Rules of behavior for organizational users
Content: These rules are in place to protect the employee and Test. Inappropriate use exposes Test and the employee to risks including virus attacks, compromise of network systems and services, and legal issues. It is the responsibility of every employee to know these guidelines, and to conduct their activities accordingly.
AI Justification
The text discusses the importance of rules of behavior for employees to protect both the organization and the individual from various risks.

Document Content
Matched Section
Section: 1.2 GENERAL USER RESPONSIBILITIES
Content: All Systems and information contained on those systems are the property of Test and constitute valuable business assets of Test. Test provides users with access to these Systems for appropriate business-related use. Upon use of Test’s Systems, be it directly or indirectly, the user consents the following: a. Their use relates to Test and its business, or the employment relationship between Test and its personnel. b. All use of Systems is non-private and is subject to monitoring c. Users accept they have no right to privacy. d. Subject to any local laws that may apply, any User of the Systems will be deemed to have consented to Test accessing, reviewing, monitoring, and/or restricting all such use. e. Test reserves the right to access and/or view a user’s voice and electronic mailboxes and computer files at will. f. Test reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
AI Justification
The chunk discusses user responsibilities regarding the use of systems, including monitoring and auditing, which aligns with the need for security and privacy testing and monitoring activities.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: CISO or his/her designee l Is Responsible for resolving user queries on this policy l Is Responsible for handling security incidents reported by employees l Is Responsible for necessary approvals for genuine business need l Is Responsible for approving any exceptions to this policy l Should be aware of and ensure compliance to the requirements of the Acceptable use policy.
AI Justification
The responsibilities outlined in the chunk indicate the role of a senior information security officer, which aligns with the definition of PM-2.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: l Is responsible for Periodically auditing the information systems for compliance to Acceptable use policy. l Is Responsible for resolving al Test user queries regarding use of information systems. CISO or his/her designee l Is Responsible for resolving user queries on this policy l Is Responsible for handling security incidents reported by employees l Is Responsible for necessary approvals for genuine business need l Is Responsible for approving any exceptions to this policy l Should be aware of and ensure compliance to the requirements of the Acceptable use policy. l Should report any suspicious communication or notice of any computer virus to the Help Desk.
AI Justification
The chunk outlines specific responsibilities associated with roles in the organization, indicating clarity in understanding security responsibilities.

Document Content
Matched Section
Section: Role Responsibility Information Technology Department
Content: l Is responsible for Periodically auditing the information systems for compliance to Acceptable use policy. l Is Responsible for resolving al Test user queries regarding use of information systems. CISO or his/her designee l Is Responsible for resolving user queries on this policy l Is Responsible for handling security incidents reported by employees l Is Responsible for necessary approvals for genuine business need l Is Responsible for approving any exceptions to this policy l Should be aware of and ensure compliance to the requirements of the Acceptable use policy. l Should report any suspicious communication or notice of any computer virus to the Help Desk.
AI Justification
The responsibilities outlined for the Information Technology Department and CISO align with the need for policies and procedures that address compliance and incident handling related to personally identifiable information.

Document Content
Matched Section
Section: 1.2 GENERAL USER RESPONSIBILITIES
Content: All Systems and information contained on those systems are the property of Test and constitute valuable business assets of Test. Test provides users with access to these Systems for appropriate business-related use. Upon use of Test’s Systems, be it directly or indirectly, the user consents the following: a. Their use relates to Test and its business, or the employment relationship between Test and its personnel. b. All use of Systems is non-private and is subject to monitoring c. Users accept they have no right to privacy. d. Subject to any local laws that may apply, any User of the Systems will be deemed to have consented to Test accessing, reviewing, monitoring, and/or restricting all such use. e. Test reserves the right to access and/or view a user’s voice and electronic mailboxes and computer files at will. f. Test reserves the right to audit networks and systems on a periodic basis to ensure compliance with this policy.
AI Justification
The text discusses user consent regarding the use of systems and the monitoring of their activities, which aligns with the principles of consent outlined in control PT-4.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including the need for exceptions and the process for requesting them, which aligns with the control's focus on risk management strategies.

Document Content
Matched Section
Section: Security categorization process as an organization-wide activity
Content: Organizations conduct the security categorization process as an organization-wide activity with the direct involvement of chief information officers, senior agency information security officers, senior agency officials for privacy, system owners, mission and business owners, and information owners or stewards.
AI Justification
The text discusses the process of security categorization, its importance in understanding potential adverse impacts, and the involvement of various organizational roles, which aligns directly with the control's focus on security categorization.

Document Content
Matched Section
Section: Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets.
Content: Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation. Risk assessments also consider risk from external parties, including contractors who operate systems on behalf of the organization, individuals who access organizational systems, service providers, and outsourcing entities.
AI Justification
The text discusses the importance of risk assessments considering various factors such as threats, vulnerabilities, and impacts, which aligns with the requirements of RA-3.

Document Content
Matched Section
Section: Risk assessments can also be conducted at various steps in the Risk Management Framework, including preparation, categorization, control selection, control implementation, control assessment, authorization, and control monitoring.
Content: Risk assessments can also be conducted at various steps in the Risk Management Framework, including preparation, categorization, control selection, control implementation, control assessment, authorization, and control monitoring.
AI Justification
The text mentions the categorization of risks and the importance of risk assessments in the context of security, which aligns with RA-2.

Document Content
Matched Section
Section: Risk assessment is an ongoing activity carried out throughout the system development life cycle.
Content: Risk assessment is an ongoing activity carried out throughout the system development life cycle.
AI Justification
The text discusses the ongoing nature of risk assessments and their role in evaluating criticality, which aligns with RA-9.

Document Content
Matched Section
Section: Vulnerability Monitoring and Analysis
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the processes involved in identifying and addressing vulnerabilities.

Document Content
Matched Section
Section: Security Categorization
Content: Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring (including scans).
AI Justification
The text emphasizes the need for security categorization of information and systems, which guides vulnerability monitoring efforts.

Document Content
Matched Section
Section: Criticality Analysis
Content: Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded. If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design.
AI Justification
The text discusses the importance of criticality analysis in identifying and prioritizing system components and functions that require protection, aligning directly with RA-9.

Document Content
Matched Section
Section: Security Categorization
Content: Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration. Such analysis is conducted as part of security categorization in RA-2.
AI Justification
The text mentions that criticality analysis is an important consideration as part of security categorization, which aligns with RA-2.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and services acquisition, including the need for exceptions to be approved, which aligns with the control's focus on policy and procedural requirements.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: SA-20: Organizations determine that certain system components likely cannot be trusted due to specific threats to and vulnerabilities in those components for which there are no viable security controls to adequately mitigate risk. Reimplementation or custom development of such components may satisfy requirements for higher assurance and is carried out by initiating changes to system components (including hardware, software, and firmware) such that the standard attacks by adversaries are less likely to succeed. In situations where no alternative sourcing is available and organizations choose not to reimplement or custom develop critical system components, additional controls can be employed. Controls include enhanced auditing, restrictions on source code and system utility access, and protection from deletion of system and application files.
AI Justification
The chunk directly references the control SA-20, which discusses the need for organizations to determine the trustworthiness of system components and the potential for reimplementation or custom development to mitigate risks.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the process of defining and implementing security requirements and mechanisms, which aligns with the control's focus on deriving security and privacy functional requirements.

Document Content
Matched Section
Section: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle.
Content: The application of systems security and privacy engineering principles helps organizations develop trustworthy, secure, and resilient systems and reduces the susceptibility to disruptions, hazards, threats, and the creation of privacy problems for individuals.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns directly with control SA-8.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, including the process for exceptions to those policies.

Document Content
Matched Section
Section: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy
Content: proprietary information, trade secrets or any other sensitive material covered by Data Security classification policy. This includes but is not limited to blogging and social media usage.
AI Justification
The chunk discusses sensitive material and mentions a data security classification policy, which aligns with the concept of security and privacy attributes that protect information.
anonymized_6.1_IS_Data_Security_Standards.pdf NIST
101 matches found

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their role in security and privacy assurance.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Label information with 'Internal', 'Confidential' or 'Restricted'. Applications should notify users during login that they are handling Confidential or
AI Justification
The text discusses the representation of information using data structures and the importance of attributes for access control and information flow control, which aligns with the control's focus on managing access based on defined attributes.

Document Content
Matched Section
Section: Data transmission should be encrypted.
Content: Data transmission should be encrypted.
AI Justification
The chunk discusses the need for encryption in data transmission and the importance of using approved methods for communication, which aligns with the requirements for remote access security.

Document Content
Matched Section
Section: Should obtain approval from Data Owner prior to sending.
Content: Should obtain approval from Data Owner prior to sending.
AI Justification
The mention of obtaining approval from the Data Owner prior to sending information aligns with the access enforcement requirements.

Document Content
Matched Section
Section: Control of mobile devices and their usage restrictions
Content: Protection and control of mobile devices is behavior or policy-based and requires users to take physical action to protect and control such devices when outside of controlled areas.
AI Justification
The text discusses the protection and control of mobile devices, which aligns with the definition and requirements of AC-19.

Document Content
Matched Section
Section: Adequate security for mobile devices
Content: Many safeguards for mobile devices are reflected in other controls. AC-20 addresses mobile devices that are not organization-controlled.
AI Justification
The mention of safeguards for mobile devices and the reference to organization-controlled and non-organization-controlled devices aligns with AC-20.

Document Content
Matched Section
Section: External systems used to access public interfaces to organizational systems are outside the scope of AC-20.
Content: Should not send via personal email address. Should obtain approval from Data Owner prior to sending. Do not discuss information related to business using external instant messaging services.
AI Justification
The section discusses the use of external systems and the restrictions imposed on their use, aligning with the control's focus on managing external systems.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs.
AI Justification
The chunk discusses handling requirements and procedures for different classifications of information, which aligns with the principles of information sharing and restrictions outlined in AC-21.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The section discusses handling requirements for information collection and emphasizes the importance of collecting only necessary information, which aligns with the principles of data mining protection.

Document Content
Matched Section
Section: Access Control | Remote Access, Access Control | Access Control for Mobile Devices, Access Control | Use of External Systems
Content: Access Control | Remote Access Access Control | Access Control for Mobile Devices Access Control | Use of External Systems
AI Justification
The chunk discusses access control mechanisms and policies, which aligns directly with the definition of AC-3.

Document Content
Matched Section
Section: Data Protection
Content: Segregation of Duties
AI Justification
The chunk explicitly mentions 'Segregation of Duties' which aligns with the concept of separation of duties as described in control AC-5.

Document Content
Matched Section
Section: Activity
Content: Require third parties to sign information non-disclosure agreements (NDA) and acknowledge Test’s data handling guidelines prior to sharing or transferring data with them, which prohibits them from disclosing Test’s data, except as required by law.
AI Justification
The chunk discusses the requirement for third parties to sign non-disclosure agreements and confidentiality agreements, which aligns with the concept of non-repudiation by ensuring that actions taken by individuals (such as sharing data) are acknowledged and cannot be denied.

Document Content
Matched Section
Section: System & Communications Protection| Secure Name/address Resolution Service (authoritative Source)
Content: System & Communications Protection| Secure Name/address Resolution Service (authoritative Source)
AI Justification
The chunk discusses the importance of authoritative source information for network address resolution, which aligns with the control's focus on ensuring the authenticity and integrity of such information.

Document Content
Matched Section
Section: System & Communications Protection| Secure Name/address Resolution Service (recursive or Caching Resolver)
Content: System & Communications Protection| Secure Name/address Resolution Service (recursive or Caching Resolver)
AI Justification
The mention of DNS and its security aspects in the chunk aligns with the control's emphasis on secure name/address resolution services, including recursive or caching resolvers.

Document Content
Matched Section
Section: System & Communications Protection| Secure Name/address Resolution Service (authoritative Source)
Content: System & Communications Protection| Secure Name/address Resolution Service (authoritative Source)
AI Justification
The text discusses the configuration and redundancy of authoritative DNS servers, which aligns with the requirements of SC-22.

Document Content
Matched Section
Section: System & Communications Protection| Session Authenticity
Content: System & Communications Protection| Session Authenticity
AI Justification
The chunk explicitly mentions 'System & Communications Protection| Session Authenticity', which aligns with the control's focus on protecting session authenticity.

Document Content
Matched Section
Section: System & Communications Protection| Secure Name/address Resolution Service
Content: System & Communications Protection| Secure Name/address Resolution Service (authoritative Source)
AI Justification
The chunk discusses various aspects of name and address resolution services, including the need for validation and trusted channels, which aligns with the requirements of SC-21.

Document Content
Matched Section
Section: System & Communications Protection| Secure Name/address Resolution Service
Content: System & Communications Protection| Secure Name/address Resolution Service (recursive or Caching Resolver)
AI Justification
The chunk discusses various aspects of name and address resolution services, including the need for validation and trusted channels, which aligns with the requirements of SC-21.

Document Content
Matched Section
Section: System & Communications Protection| Architecture and Provisioning for Name/address Resolution Service
Content: System & Communications Protection| Architecture and Provisioning for Name/address Resolution Service
AI Justification
The chunk discusses various aspects of name and address resolution services, including the need for validation and trusted channels, which aligns with the requirements of SC-21.

Document Content
Matched Section
Section: Encryption of PII/NPI data under regulatory, legal or contractual requirements when stored on High-risk Technology assets.
Content: Encrypt PII/NPI data element under regulatory, legal or contractual requirements (e.g., PCI PAN, SSN, Account Numbers) when stored on High-risk Technology assets and where technology permits.
AI Justification
The chunk discusses the need to encrypt PII/NPI data when stored on high-risk technology assets, which aligns with the focus on protecting information at rest.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: Control: SC-3: Security functions are isolated from nonsecurity functions by means of an isolation boundary implemented within a system via partitions and domains.
AI Justification
The text discusses the isolation of security functions from nonsecurity functions, which aligns directly with SC-3.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Systems can restrict access to security functions using access control mechanisms and by implementing least privilege capabilities.
AI Justification
The mention of access control mechanisms and least privilege capabilities aligns with the intent of PR.IP-6.

Document Content
Matched Section
Section: System & Communications Protection| Out-of-Band Channels
Content: System & Communications Protection| Out-of-Band Channels
AI Justification
The chunk explicitly mentions 'Out-of-Band Channels' which aligns directly with the control SC-37 that discusses the use and characteristics of out-of-band channels.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: NIST CSF Subcategory Control Reference Control Name A.9.4.4 Use of Privileged Utility Programs A.9.4.5 Access Control to Program Source Code A.10.1.1 Policy on the Utilization of Cryptographic Controls A.11.1.4 Protecting Against External & Environmental Threats A.11.1.5 Working in Secure Areas A.11.2.1 Equipment Siting & Protection A.13.1.1 Network Controls A.13.1.3 Segregation in Networks A.13.2.1 Information Transfer Policies & Procedures A.13.2.3 Electronic Messaging A.13.2.4 Confidentiality or Non-Disclosure Agreements A.14.1.2 Securing Application Services on Public Networks A.14.1.3 Protecting Application Services Transactions NIST SP 800-53 Rev 5 AC-4 Access Control | Information Flow Enforcement AC-5 Access Control | Separation of Duties AC-6 Access Control | Least Privilege AU-13 Audit & Accountability | Monitoring for Information Disclosure PE-19 Physical & Environmental Protection | Information Leakage PS-6 Personnel Security | Monitoring Physical Access SC-7
AI Justification
The control SC-7 relates to the enforcement of policies at the boundary of the security domain, which aligns with the need to prevent logical paths that could bypass policy enforcement mechanisms.

Document Content
Matched Section
Section: 1.4 MAINTAINANCE and 1.5 EXCEPTIONS
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a
AI Justification
The text discusses the ability of divisions and functions to define and implement stronger security requirements and mechanisms, which aligns with the need for additional strength of mechanism for domain separation and policy enforcement.

Document Content
Matched Section
Section: System & Communications Protection| Denial-of-Service Protection
Content: System & Communications Protection| Denial-of-Service Protection
AI Justification
The text discusses the potential for denial-of-service events and mentions technologies to limit their impact, which aligns with the control's focus on protecting against such events.

Document Content
Matched Section
Section: System & Communications Protection| Boundary Protection
Content: System & Communications Protection| Boundary Protection
AI Justification
The mention of boundary protection devices filtering packets aligns with the control's focus on protecting internal networks from external threats.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.
AI Justification
The text discusses managed interfaces, boundary protection, and the importance of restricting traffic to protect organizational networks, which aligns with the control's focus on managing interfaces and protecting boundaries.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: SP 800-189 provides additional information on source address validation techniques to prevent ingress and egress of traffic with spoofed addresses.
AI Justification
The mention of monitoring traffic and preventing spoofed addresses aligns with the need for system monitoring to detect and respond to potential threats.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).
AI Justification
The control emphasizes the importance of managing and protecting information processes, which is relevant to the discussion of boundary protection and traffic management.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The chunk discusses the development and implementation of data handling procedures in accordance with an information classification scheme, which aligns with the need for policies and procedures addressing system and information integrity.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Notify appropriate personnel in the event paper documents are lost or stolen. Disposal (in accordance with Retention Policy) Paper Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well.
AI Justification
The text discusses the procedures for managing and disposing of paper and electronic documents, which aligns with information management and retention requirements.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Verify and validate, with the information source, that the information being collected is reliable and relevant.
AI Justification
The chunk discusses the verification and validation of collected information, which aligns with the quality operations for personally identifiable information.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs.
AI Justification
The text discusses the process of removing personally identifiable information from datasets, which aligns with the de-identification control.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs.
AI Justification
The text discusses the importance of protecting valuable information from exfiltration and suggests methods to increase the difficulty for adversaries to capture such information.

Document Content
Matched Section
Section: System & Information Integrity | Malicious Code Protection
Content: Malicious code protection mechanisms include both signature- and nonsignature-based technologies. Nonsignature-based detection mechanisms include artificial intelligence techniques that use heuristics to detect, analyze, and describe the characteristics or behavior of malicious code and to provide controls against such code for which signatures do not yet exist or for which existing signatures may not be effective.
AI Justification
The text discusses various methods and technologies to protect against malicious code, including signature and nonsignature-based detection mechanisms.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: In situations where malicious code cannot be detected by detection methods or technologies, organizations rely on other types of controls, including secure coding practices, configuration management and control, trusted procurement processes, and monitoring practices to ensure that software does not perform functions other than the functions intended.
AI Justification
The text mentions monitoring practices as a control to ensure that software does not perform unintended functions, aligning with the need for system monitoring.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: In addition to the above technologies, pervasive configuration management, comprehensive software integrity controls, and anti-exploitation software may be effective in preventing the execution of unauthorized code.
AI Justification
The text discusses configuration management and control as a necessary measure to prevent unauthorized code execution.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: System monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at external interfaces to the system. Internal monitoring includes the observation of events occurring within the system.
AI Justification
The text explicitly discusses system monitoring, including both external and internal monitoring, and the tools and techniques used for this purpose.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: Adjustments to levels of system monitoring are based on law enforcement information, intelligence information, or other sources of information.
AI Justification
The text mentions the need for specific types of system monitoring and the legal considerations surrounding monitoring activities, which aligns with the control's focus on information protection processes.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: System & Communications Protection | Boundary Protection SI-4 System & Information Integrity | System Monitoring PR.IP-6
AI Justification
The chunk discusses unauthorized changes to software and the importance of integrity-checking mechanisms, which aligns with the control's focus on preventing unauthorized changes and ensuring system integrity.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: System & Communications Protection | Boundary Protection SI-4 System & Information Integrity | System Monitoring PR.IP-6
AI Justification
The mention of boundary protection aligns with the control's focus on protecting system boundaries from unauthorized access and changes.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: System & Communications Protection | Boundary Protection SI-4 System & Information Integrity | System Monitoring PR.IP-6
AI Justification
The reference to monitoring systems aligns with the control's focus on maintaining the integrity of information through monitoring processes.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: System & Communications Protection | Boundary Protection
AI Justification
The chunk discusses various system entry and exit points and mentions spam protection mechanisms, which aligns with the control's focus on managing these points.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: System & Information Integrity | System Monitoring
AI Justification
The mention of spam and monitoring aligns with the need for system monitoring to detect and respond to spam threats.

Document Content
Matched Section
Section: Policy Exceptions and Procedures
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of having a policy for exceptions in the context of information security risks, which aligns with the need for a supply chain risk management policy and procedures.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well. Electronic Erase, degauss, or destroy (using a CD shredder) all electronic media in a manner that will render the information irretrievable.
AI Justification
The text discusses procedures for the disposal of paper and electronic documents, which aligns with the control's focus on disposal during the system development life cycle.

Document Content
Matched Section
Section: Term Definitions
Content: Confidential data is personal identifiable information (PII) that an organization does not want anyone to obtain without its permission.
AI Justification
The definition of 'Confidential' aligns with the control as it describes the protection of personally identifiable information (PII) which is relevant to unauthorized disclosure.

Document Content
Matched Section
Section: Data transmission
Content: Data transmission should be encrypted.
AI Justification
The chunk discusses the encryption of external file transfers and data connections, which aligns with the requirements for secure information exchange as outlined in CA-3.

Document Content
Matched Section
Section: Configuration Management Policy and Procedures
Content: higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of a configuration management policy and procedures, including the process for requesting exceptions to the policy, which aligns with the requirements of CM-1.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The chunk discusses handling requirements and information classification, which aligns with understanding where information is processed and stored.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The chunk discusses handling requirements for data collection and emphasizes the importance of collecting only necessary information, which aligns with the control's focus on processing personally identifiable information and understanding its lifecycle.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses the importance of developing and implementing policies and procedures for data handling, which aligns with the need for contingency planning policies as outlined in CP-1.

Document Content
Matched Section
Section: Protection of system backup information while in transit is addressed by MP-5 and SC-8.
Content: When stored on High-risk Technology assets and where technology permits. Across High-Risk Technology Assets
AI Justification
The chunk discusses the protection of PII/NPI data elements and mentions backup media, which aligns with the control's focus on system-level information and backup integrity.

Document Content
Matched Section
Section: Required - Encrypt PII/NPI data element under regulatory, legal or contractual requirements.
Content: Encrypt PII/NPI data element under regulatory, legal or contractual requirements (e.g., PCI PAN, SSN, Account Numbers) when stored on High-risk Technology assets and where technology permits.
AI Justification
The requirement to encrypt PII/NPI data elements when stored on high-risk technology assets aligns with the control's focus on protecting information at rest.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Verify and validate, with the information source, that the information being collected is reliable and relevant.
AI Justification
The chunk discusses the verification and validation of collected information, which aligns with the identity proofing process outlined in control IA-12.

Document Content
Matched Section
Section: Access Control | Remote Access
Content: Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations consider to have an equivalent status to employees (e.g., contractors and guest researchers). Unique identification and authentication of users applies to all accesses other than those that are explicitly identified in AC-14 and that occur through the authorized use of group authenticators without individual authentication.
AI Justification
The text discusses the identification and authentication requirements for organizational users, including the use of passwords, physical authenticators, and biometrics.

Document Content
Matched Section
Section: Access Control | Remote Access
Content: Identification and authentication requirements for non-organizational users are described in IA-8.
AI Justification
The text mentions identification and authentication requirements for non-organizational users, indicating a need for controls related to their access.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations. Return, discard, mask, or sanitize information that is not required to satisfy business needs.
AI Justification
The text discusses handling procedures for information based on its classification, which aligns with the concept of managing information spills as described in control IR-9.

Document Content
Matched Section
Section: Media Protection | Media Marking, Media Storage, Media Transport, Media Sanitization, Media Use, Media Downgrading
Content: Control: MP-1: Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of media protection policies and procedures, aligning directly with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Media Protection | Media Marking, Media Protection | Media Storage, Media Protection | Media Transport, Media Protection | Media Sanitization, Media Protection | Media Use, Media Protection | Media Downgrading
Content: Media Protection | Media Marking Media Protection | Media Storage Media Protection | Media Transport Media Protection | Media Sanitization Media Protection | Media Use Media Protection | Media Downgrading
AI Justification
The chunk discusses various aspects of media protection, including digital and non-digital media, which aligns directly with the control's focus on protecting system media.

Document Content
Matched Section
Section: Media Protection | Media Marking
Content: Media Protection | Media Marking
AI Justification
The chunk discusses the application of security markings to various types of media, which aligns directly with the definition and requirements outlined in control MP-3.

Document Content
Matched Section
Section: Media Protection | Media Storage
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. The type of media storage is commensurate with the security category or classification of the information on the media.
AI Justification
The text discusses various aspects of media protection, including types of media, secure storage, and physical controls.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Notify appropriate personnel in the event paper documents are lost or stolen. Disposal (in accordance with Retention Policy) Paper Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well.
AI Justification
The section discusses procedures for handling and disposing of paper documents and electronic media, which aligns with the control's focus on protecting media during transport and disposal.

Document Content
Matched Section
Section: Disposal (in accordance with Retention Policy)
Content: Place all copies of information in a shredding bin. Place unattended copies of information found after business hours in a shredding bin as well. Erase, degauss, or destroy (using a CD shredder) all electronic media in a manner that will render the information irretrievable.
AI Justification
The text discusses procedures for the disposal and sanitization of both digital and non-digital media, including shredding paper documents and securely wiping electronic media, which aligns with the requirements for media sanitization.

Document Content
Matched Section
Section: Media use protections also apply to mobile devices with information storage capabilities.
Content: In contrast to MP-2, which restricts user access to media, MP-7 restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives.
AI Justification
The text discusses the protection of media, including portable storage devices, which aligns with the control's focus on restricting the use of system media.

Document Content
Matched Section
Section: Required - Encrypt PII/NPI data element under regulatory, legal or contractual requirements.
Content: In absence of encryption, appropriate compensating controls approved by Information security should be implemented.
AI Justification
The mention of encrypting PII/NPI data when stored on high-risk technology assets aligns with the need to protect media during transport.

Document Content
Matched Section
Section: Media Protection | Media Downgrading
Content: Media Protection | Media Downgrading
AI Justification
The chunk explicitly mentions 'Media Downgrading' and describes the process of downgrading media, which aligns directly with the control's definition.

Document Content
Matched Section
Section: Policy Exception Process
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of a policy for physical protection levels and the process for requesting exceptions, which aligns with the need for established policies and procedures in the PE family.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Label information with 'Internal', 'Confidential' or 'Restricted'. Applications should notify users during login that they are handling Confidential or
AI Justification
The chunk discusses handling requirements and labeling of information, which aligns with the need for marking hardware components based on their classification and impact level.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Label information with 'Internal', 'Confidential' or 'Restricted'. Applications should notify users during login that they are handling Confidential or
AI Justification
The mention of permissions controlling output to output devices relates to access enforcement mechanisms.

Document Content
Matched Section
Section: Policy Exception Process
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of having policies and procedures in place for managing exceptions to security policies, which aligns with the planning and implementation of controls.

Document Content
Matched Section
Section: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest.
Content: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either satisfy mandates imposed by laws, executive orders, directives, regulations, policies, standards, and guidelines or address threats common to all users of the baseline under the assumptions specific to the baseline.
AI Justification
The control is relevant as it addresses the enforcement of access control measures to protect information flow, which aligns with the need for control baselines to manage risks associated with information systems.

Document Content
Matched Section
Section: The selection of a control baseline is determined by the needs of stakeholders.
Content: The selection of a control baseline is determined by the needs of stakeholders. Stakeholder needs consider mission and business requirements as well as mandates imposed by applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.
AI Justification
This control is relevant as it emphasizes the importance of separating duties to reduce risk, which is a key aspect of establishing control baselines.

Document Content
Matched Section
Section: Baselines represent a starting point for the protection of individuals' privacy, information, and information systems with subsequent tailoring actions to manage risk.
Content: Baselines represent a starting point for the protection of individuals' privacy, information, and information systems with subsequent tailoring actions to manage risk in accordance with mission, business, or other constraints.
AI Justification
This control aligns with the concept of control baselines as it ensures that users have only the access necessary to perform their tasks, which is critical for protecting information.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference Control Name
Content: NIST CSF Subcategory Control Reference Control Name A.9.4.4 Use of Privileged Utility Programs A.9.4.5 Access Control to Program Source Code A.10.1.1 Policy on the Utilization of Cryptographic Controls A.11.1.4 Protecting Against External & Environmental Threats A.11.1.5 Working in Secure Areas A.11.2.1 Equipment Siting & Protection A.13.1.1 Network Controls A.13.1.3 Segregation in Networks A.13.2.1 Information Transfer Policies & Procedures A.13.2.3 Electronic Messaging A.13.2.4 Confidentiality or Non-Disclosure Agreements A.14.1.2 Securing Application Services on Public Networks A.14.1.3 Protecting Application Services Transactions NIST SP 800-53 Rev 5 AC-4 Access Control | Information Flow Enforcement
AI Justification
The chunk discusses tailoring controls which can include access control measures to enforce information flow.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference Control Name
Content: NIST CSF Subcategory Control Reference Control Name A.9.4.4 Use of Privileged Utility Programs A.9.4.5 Access Control to Program Source Code A.10.1.1 Policy on the Utilization of Cryptographic Controls A.11.1.4 Protecting Against External & Environmental Threats A.11.1.5 Working in Secure Areas A.11.2.1 Equipment Siting & Protection A.13.1.1 Network Controls A.13.1.3 Segregation in Networks A.13.2.1 Information Transfer Policies & Procedures A.13.2.3 Electronic Messaging A.13.2.4 Confidentiality or Non-Disclosure Agreements A.14.1.2 Securing Application Services on Public Networks A.14.1.3 Protecting Application Services Transactions NIST SP 800-53 Rev 5 AC-4 Access Control | Information Flow Enforcement
AI Justification
The concept of tailoring controls can also apply to separation of duties to ensure that no single individual has control over all aspects of a process.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference Control Name
Content: NIST CSF Subcategory Control Reference Control Name A.9.4.4 Use of Privileged Utility Programs A.9.4.5 Access Control to Program Source Code A.10.1.1 Policy on the Utilization of Cryptographic Controls A.11.1.4 Protecting Against External & Environmental Threats A.11.1.5 Working in Secure Areas A.11.2.1 Equipment Siting & Protection A.13.1.1 Network Controls A.13.1.3 Segregation in Networks A.13.2.1 Information Transfer Policies & Procedures A.13.2.3 Electronic Messaging A.13.2.4 Confidentiality or Non-Disclosure Agreements A.14.1.2 Securing Application Services on Public Networks A.14.1.3 Protecting Application Services Transactions NIST SP 800-53 Rev 5 AC-4 Access Control | Information Flow Enforcement
AI Justification
Tailoring actions can help organizations implement least privilege access controls effectively.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses the importance of defining protection needs and handling requirements for information, which aligns with the control's focus on technology-independent capabilities to counter threats and protect information.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses handling requirements and procedures for different classifications of information, aligning with the safeguarding and dissemination requirements for controlled unclassified information.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Verify and validate, with the information source, that the information being collected is reliable and relevant.
AI Justification
The section discusses the importance of verifying and validating the reliability and relevance of collected information, which aligns with the control's focus on managing the quality of personally identifiable information.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses the establishment of a Data Governance Body that ensures coherent policies for data management, which aligns with the control's focus on data governance and compliance with laws and regulations.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The chunk discusses handling requirements for information collection and emphasizes the importance of only collecting necessary information, which aligns with the control's focus on the use of personally identifiable information.

Document Content
Matched Section
Section: Policy Exception Process
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of a personnel security policy and procedures, including the process for requesting exceptions to the policy, which aligns with the requirements of PS-1.

Document Content
Matched Section
Section: Data transmission should be encrypted.
Content: Encrypt all external file transfers and data connections. This includes the email itself, email attachments, CDs, USB flash drives, SFTP, HTTPS, WPA2, etc.
AI Justification
The chunk discusses the handling of external communications and the requirement for encryption, which aligns with the need for managing external providers and their access to sensitive information.

Document Content
Matched Section
Section: 1.6 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The text discusses disciplinary actions for policy violations, which aligns with the concept of organizational sanctions as described in PS-8.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses the importance of policies and procedures for handling personally identifiable information, which aligns with the requirements of control PT-1.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The chunk discusses handling requirements for personally identifiable information, including collection, validation, and documentation, which aligns with the processing operations described in control PT-2.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Provide a description of the reason for collecting the information to the information source. If this changes, details of the change should be communicated to the information source.
AI Justification
The section discusses the importance of identifying and documenting the purpose for processing personally identifiable information, which aligns with the control's focus on understanding processing purposes.

Document Content
Matched Section
Section: Term Definitions
Content: Restricted Highly confidential business or personal information. There are often general statutory, regulatory, or contractual requirements that require protection of the data. Confidential Confidential data is personal identifiable information (PII) that an organization does not want anyone to obtain without its permission.
AI Justification
The chunk discusses the classification of data, including personally identifiable information (PII), and highlights the need for protection based on its sensitivity, which aligns with the requirements of PT-7.

Document Content
Matched Section
Section: Policy Exception Process
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of a policy exception process and the importance of documenting exceptions, which aligns with the need for risk assessment policies and procedures.

Document Content
Matched Section
Section: 1.1 Data Handling Procedures
Content: Handling requirements for the following shall be developed and implemented in accordance with the information classification scheme adopted by Test: Activity Medium Procedure Public Internal Confidential Restricted Collection All Collect only the information necessary to meet business objectives or fulfill Customer obligations.
AI Justification
The text discusses the importance of conducting a privacy impact assessment to ensure that personally identifiable information is handled in compliance with privacy requirements, which aligns with the control's focus on analyzing privacy risks and incorporating protections.

Document Content
Matched Section
Section: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization.
Content: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization and for reflecting the security and privacy requirements of stakeholders.
AI Justification
The text discusses the importance of controls and their implementation in the context of security and privacy requirements, which aligns with the use of privileged utility programs to ensure proper access control.

Document Content
Matched Section
Section: Controls are selected and implemented in order to satisfy system requirements and include developer and organizational responsibilities.
Content: Controls are selected and implemented in order to satisfy system requirements and include developer and organizational responsibilities.
AI Justification
The text emphasizes the selection and implementation of controls to satisfy system requirements, which includes the principle of least privilege in access control.

Document Content
Matched Section
Section: Documentation provides user and administrator guidance for the implementation and operation of controls.
Content: Documentation provides user and administrator guidance for the implementation and operation of controls.
AI Justification
The mention of documentation providing user and administrator guidance aligns with the need for monitoring and accountability in access control.

Document Content
Matched Section
Section: System & Communications Protection | Boundary Protection
Content: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle (see SA-3). Organizations can apply systems security and privacy engineering principles to new systems under development or to systems undergoing upgrades.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns directly with control SA-8.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: System security engineering principles can also be used to protect against certain supply chain risks, including incorporating tamper-resistant hardware into a design.
AI Justification
The mention of threat modeling and monitoring for risks aligns with the intent of control SI-4, which focuses on monitoring systems for security incidents.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: The application of systems security and privacy engineering principles helps organizations develop trustworthy, secure, and resilient systems and reduces the susceptibility to disruptions, hazards, threats, and the creation of privacy problems for individuals.
AI Justification
The text emphasizes the importance of incorporating security and privacy requirements into the system development life cycle, which aligns with the intent of control PR.IP-6.

Document Content
Matched Section
Section: Policy Exception Process
Content: In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the necessity of a policy for system and communications protection and outlines the process for requesting exceptions to this policy, which aligns with the requirements of SC-1.

Document Content
Matched Section
Section: System & Communications Protection | Collaborative Computing Devices & Applications
Content: Access Control | Remote Access Access Control | Access Control for Mobile Devices Access Control | Use of External Systems AC-1 AC-17 AC-19 AC-20 SC-15 System & Communications Protection | Collaborative Computing Devices & Applications
AI Justification
The chunk explicitly mentions collaborative computing devices and applications, which aligns with the control SC-15 that focuses on the use of such devices and the need for user indication when they are activated.

Document Content
Matched Section
Section: Term Definitions
Content: Restricted Highly confidential business or personal information. There are often general statutory, regulatory, or contractual requirements that require protection of the data. Confidential Confidential data is personal identifiable information (PII) that an organization does not want anyone to obtain without its permission Internal Any information, facts or data that come directly from Test systems and are specific to Test. Public Any information that can be freely used and easily accessible by anyone with no existing local, national, regulatory or legal restrictions on access or usage.
AI Justification
The definitions provided for 'Restricted', 'Confidential', 'Internal', and 'Public' information align with the concept of security and privacy attributes as they describe how different types of information are categorized based on their sensitivity and the associated requirements for protection.
anonymized_2.1_IS_Acceptable_Use_Standard.pdf NIST
68 matches found

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of access control policies and procedures, including how exceptions to these policies should be managed, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: Mobile Device Management and Reporting Procedures
Content: If the device is lost or stolen, the user should IMMEDIATELY report this to the Information Security Department and IT Department so they can remotely wipe or remove all data from the device. This applies even if the user has misplaced the device and knows where it is located.
AI Justification
The section discusses the responsibilities of users regarding the protection of mobile devices, including reporting lost or stolen devices and ensuring proper data management.

Document Content
Matched Section
Section: Mobile Device Management and Reporting Procedures
Content: Also, if the user decides to replace or upgrade the device, the user should report this as well. The IT Department will make arrangements to wipe the old device.
AI Justification
The section addresses the management of mobile devices, including reporting procedures for lost devices and the handling of data storage, which aligns with the requirements for mobile device controls.

Document Content
Matched Section
Section: 1.6 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of different types of accounts, which aligns with the requirements of AC-2.

Document Content
Matched Section
Section: Classification of Information
Content: Classification of Information
AI Justification
The chunk discusses the classification of information and mentions access restrictions, which aligns with the principles of information sharing as outlined in AC-21.

Document Content
Matched Section
Section: Access Control | Use of External Systems
Content: Access Control | Use of External Systems
AI Justification
The mention of external systems and access restrictions aligns with the control AC-20 regarding the use of external systems.

Document Content
Matched Section
Section: Internet Use Restrictions
Content: 1. Transmitting non-public information over the internet or unsecure means.
AI Justification
The chunk discusses restrictions on transmitting non-public information and accessing inappropriate or illegal content, which aligns with the control's focus on managing access to nonpublic information.

Document Content
Matched Section
Section: 1.6 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The text discusses enforcement of policies and the consequences of unauthorized access, which relates to access control decisions and enforcement.

Document Content
Matched Section
Section: 1.6 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination.
AI Justification
The chunk discusses enforcement of policies and consequences for violations, which aligns with the access control policies that govern authorized access and enforcement mechanisms.

Document Content
Matched Section
Section: c. Internet Use Restrictions
Content: 1. Transmitting non-public information over the internet or unsecure means.
AI Justification
The chunk discusses restrictions on transmitting non-public information over the internet, which aligns with the concept of information flow control.

Document Content
Matched Section
Section: 1.2 SYSTEM USE NOTIFICATION
Content: When accessing Test systems, all users should be presented a system use notification message upon login. Where such messages are not able to be presented to the user, Test should actively monitor the system and activity to maintain system security and availability and to ensure appropriate and legitimate usage.
AI Justification
The chunk explicitly discusses the requirement for system use notifications to be presented to users upon login, which aligns directly with the control's description of implementing such notifications.

Document Content
Matched Section
Section: 1.2 SYSTEM USE NOTIFICATION
Content: When accessing Test systems, all users should be presented a system use notification message upon login.
AI Justification
The section discusses the requirement for a system use notification message upon login, which aligns with the need for users to be informed about their last access.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, including the need for exceptions to be approved and documented, which aligns with the requirements of AU-1.

Document Content
Matched Section
Section: Section 6: Unacceptable Uses of Test's Systems
Content: 4. Posting Test information on public Internet sites such as system configurations, details of products or vendors utilized by Test, personally identifiable information (PII) 5. Opening commercial email attachments on any email systems (e.g., Yahoo, Hotmail, Gmail, etc.) other than Test’s email system. 6. Unauthorized downloading of software and/or files from Internet. 7. The installation and use of peer-to-peer file sharing applications such as BitTorrent on Test systems. 8. Using Test’s Internet to deliberately propagate any virus, worm, or any other code with malicious intent such as spyware, hacking tools, and Trojans. 9. Using high bandwidth streaming media applications such as Google Music, YouTube Music, Netflix, Hulu, or internet radio, etc. unless required for a valid business purpose.
AI Justification
The chunk discusses various unacceptable uses of Test's systems that could lead to the introduction of malicious code, aligning with the need for external malicious code identification and isolation measures.

Document Content
Matched Section
Section: Usage Restrictions and Compliance
Content: preempt any business activity; does not collectively consume excessive resources and is otherwise in compliance with Test’s Acceptable Usage and related policies. Individual managers reserve the right to place additional restrictions on personal use.
AI Justification
The text discusses compliance with acceptable usage policies and mentions that individual managers can impose additional restrictions, aligning with the concept of usage restrictions for system components.

Document Content
Matched Section
Section: b. Monitoring of User’s device.
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application.
AI Justification
The monitoring of user devices and the requirement to install specific software aligns with the control's focus on managing the capabilities and data collection of mobile devices, particularly in relation to security and privacy concerns.

Document Content
Matched Section
Section: c. Installation of Software on User’s device.
Content: 1. User agrees to install required software on his/her device, including but not limited to, antivirus/antimalware, operating system upgrades, and software that accesses and collects data stored in a Test managed application.
AI Justification
The requirement for users to install software that collects data aligns with the control's emphasis on the capabilities of mobile devices and the potential risks associated with their sensors.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including how exceptions to these policies should be handled.

Document Content
Matched Section
Section: IV. Maintaining Security while using Organizationally Owned & Managed Information Systems & Assets
Content: To maintain security, users SHOULD: a. Ensure they do not turn off the antivirus software or take any other action to inhibit automatic updates. b. Promptly report any indication that automatic updates are not working properly to the Help desk.
AI Justification
The chunk discusses the importance of maintaining security through updates and reporting issues related to automatic updates, which aligns with the need to remediate system flaws.

Document Content
Matched Section
Section: Section 4: Posting Test information on public Internet sites and other unacceptable uses of Test’s Systems.
Content: Opening commercial email attachments on any email systems (e.g., Yahoo, Hotmail, Gmail, etc.) other than Test’s email system. Unauthorized downloading of software and/or files from Internet. The installation and use of peer-to-peer file sharing applications such as BitTorrent on Test systems. Using Test’s Internet to deliberately propagate any virus, worm, or any other code with malicious intent such as spyware, hacking tools, and Trojans.
AI Justification
The text discusses various methods and technologies to protect against malicious code, which aligns with the control's focus on system entry and exit points and the types of malicious code.

Document Content
Matched Section
Section: 1.2 SYSTEM USE NOTIFICATION
Content: When accessing Test systems, all users should be presented a system use notification message upon login. Where such messages are not able to be presented to the user, Test should actively monitor the system and activity to maintain system security and availability and to ensure appropriate and legitimate usage.
AI Justification
The chunk discusses the need for active monitoring of the system and user activity to maintain security and ensure legitimate usage, which aligns with the objectives of system monitoring.

Document Content
Matched Section
Section: 1.2 SYSTEM USE NOTIFICATION
Content: For Windows network authentication, the system use notification banner should describe privacy expectations, monitoring activities, and any applicable laws, regulations, and company policy compliance requirements.
AI Justification
The mention of monitoring activities related to user access and compliance with laws and policies aligns with the need for controls over remote access.

Document Content
Matched Section
Section: Monitoring of User’s device and Installation of Software on User’s device
Content: b. Monitoring of User’s device. 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application. 2. Monitoring can be conducted live or through automated programs that detect and flag unsafe practices. 3. User may be asked and required to hand over his/her Test managed device as part of an internal investigation. c. Installation of Software on User’s device. 1. User agrees to install required software on his/her device, including but not limited to, antivirus/antimalware, operating system upgrades, and software that accesses and collects data stored in a Test managed application. 2. User agrees not to remove, disable, or in any way interfere with Test installed software.
AI Justification
The chunk discusses monitoring of user devices and the installation of software, which relates to ensuring the integrity of software and preventing unauthorized changes.

Document Content
Matched Section
Section: Section 6: Unacceptable Uses of Test’s Systems
Content: 4. Posting Test information on public Internet sites such as system configurations, details of products or vendors utilized by Test, personally identifiable information (PII) 5. Opening commercial email attachments on any email systems (e.g., Yahoo, Hotmail, Gmail, etc.) other than Test’s email system. 6. Unauthorized downloading of software and/or files from Internet. 7. The installation and use of peer-to-peer file sharing applications such as BitTorrent on Test systems. 8. Using Test’s Internet to deliberately propagate any virus, worm, or any other code with malicious intent such as spyware, hacking tools, and Trojans. 9. Using high bandwidth streaming media applications such as Google Music, YouTube Music, Netflix, Hulu, or internet radio, etc. unless required for a valid business purpose.
AI Justification
The chunk discusses various unacceptable uses of Test's systems, which aligns with the need for spam protection mechanisms and the management of system entry and exit points.

Document Content
Matched Section
Section: V. Bring Your Own Device
Content: Mandatory security controls and safeguards have been identified by Test for managing security for personally owned devices registered, provisioned, and authorized to connect to Test’s network. By participating in Test’s BYOD program, the User agrees to the following: a. Wiping or removal of data of User’s device.
AI Justification
The chunk discusses the wiping or removal of data from personal devices, which aligns with the control's focus on data disposal at any time during the system development life cycle.

Document Content
Matched Section
Section: 2.1 Acceptable Use Standard
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The section discusses the confidentiality of the document and the restrictions on copying, using, or disclosing the information contained within it, which aligns with the control's focus on preventing unauthorized disclosure.

Document Content
Matched Section
Section: Monitoring of User’s device.
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application.
AI Justification
The chunk discusses monitoring of user devices and the collection of data, which aligns with the concept of session auditing.

Document Content
Matched Section
Section: Monitoring of User’s device.
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application.
AI Justification
The chunk discusses monitoring of user devices, which aligns with the logging and analysis of account usage and security events as described in AU-6.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the need for policies and procedures regarding exceptions to security policies, which aligns with the assessment and authorization aspects of CA-1.

Document Content
Matched Section
Section: Monitoring of User’s device
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application. 2. Monitoring can be conducted live or through automated programs that detect and flag unsafe practices.
AI Justification
The text discusses monitoring of user devices and the agreement of users to allow monitoring, which aligns with the continuous monitoring principles outlined in CA-7.

Document Content
Matched Section
Section: Monitoring of User’s device
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application.
AI Justification
The monitoring of user devices and the review of data aligns with the need for ongoing awareness of security posture and risk management decisions.

Document Content
Matched Section
Section: Installation of Software on User’s device.
Content: User agrees to install required software on his/her device, including but not limited to, antivirus/antimalware, operating system upgrades, and software that accesses and collects data stored in a Test managed application.
AI Justification
The chunk discusses user agreements regarding the installation and management of software on their devices, which aligns with the control's focus on governing software installation practices.

Document Content
Matched Section
Section: V. Bring Your Own Device
Content: Mandatory security controls and safeguards have been identified by Test for managing security for personally owned devices registered, provisioned, and authorized to connect to Test’s network. By participating in Test’s BYOD program, the User agrees to the following: a. Wiping or removal of data of User’s device.
AI Justification
The chunk discusses the management of personally identifiable information (PII) on personal devices, including the processes of wiping or removing data, which aligns with the control's focus on data actions involving PII.

Document Content
Matched Section
Section: IV. Maintaining Security while using Organizationally Owned & Managed Information Systems & Assets
Content: To maintain security, users SHOULD: a. Ensure they do not turn off the antivirus software or take any other action to inhibit automatic updates. b. Promptly report any indication that automatic updates are not working properly to the Help desk. c. Ensure they do not disable the pre-configured, password protected screensaver. d. Assets are updated only when they are connected to the VPN. e. Owners of BYOD devices should promptly follow helpdesk directions to apply security updates and patches to their devices as outlined in the Test Global IT policies. f. Do not dispose of pre-defined Test Standard images on laptops. Do not apply privately created images as outlined in the Test Global IT policies.
AI Justification
The chunk discusses maintaining security through various actions related to configuration settings, such as ensuring antivirus software is not turned off and applying security updates, which directly relates to the management of configuration settings.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having identification and authentication policies and procedures, including the need for exceptions to be approved, which aligns with the control's focus on policy development and implementation.

Document Content
Matched Section
Section: Section 7.j, 7.k, and 7.l
Content: If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately and inform Test’s Information Security Team. If the compromise was without the knowledge of the owner, the user should report the event to the Test IT Users should never use the 'Remember Password' feature in web browsers (e.g., Internet Explorer, Edge, Chrome, etc.) except in by Test approved password vault such as LastPass, CyberArk. Passwords should not be inserted into email messages, help desk tickets, change requests or any other form of electronic communication. If available, Multi-Factor Authentication (MFA) should be used to augment credential security. MFA requires two forms of identification for successful login: (cid:127) Something you know – the employee’s username and password. (cid:127) Something you have – a device or access token.
AI Justification
The section discusses the importance of changing passwords when compromised and the use of Multi-Factor Authentication (MFA) to enhance credential security, which aligns with adaptive authentication principles.

Document Content
Matched Section
Section: Section 7, Sub-section j
Content: If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately and inform Test’s Information Security Team.
AI Justification
The text discusses the need for users to change passwords immediately if they suspect compromise, which aligns with the re-authentication requirements when credentials change.

Document Content
Matched Section
Section: Section 7, Sub-section l
Content: If available, Multi-Factor Authentication (MFA) should be used to augment credential security. MFA requires two forms of identification for successful login.
AI Justification
The mention of Multi-Factor Authentication (MFA) aligns with the need for additional authentication methods to augment credential security.

Document Content
Matched Section
Section: Identification and Authentication Requirements
Content: Passwords should not be based on personal information, names of family, pets, etc. NOTE/EXCEPTION: There may be instances where third party or legacy systems are unable to adhere to certain password requirements. In such cases, an exception should be received from the Test CISO. Users should be aware that Test systems will lockout users after the threshold for invalid access attempts has been reached. The general threshold is set to five failed attempts but may be set lower depending on specific system requirements. Multi-Factor Authentication (MFA) is required to access the Test network, any internet facing applications and certain sensitive and business critical Test systems. With Test IT Department Personnel only, there may be select instances where a common ID and Password is used by several IT professionals who are performing the same function. This practice, while rare, should be documented and approved by the local IT Security Office or IT Management.
AI Justification
The chunk discusses password requirements, multi-factor authentication, and the use of common IDs and passwords, which aligns with the identification and authentication requirements outlined in IA-2.

Document Content
Matched Section
Section: Section 7: Password Management and Multi-Factor Authentication
Content: If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately and inform Test’s Information Security Team. If the compromise was without the knowledge of the owner, the user should report the event to the Test IT Users should never use the 'Remember Password' feature in web browsers (e.g., Internet Explorer, Edge, Chrome, etc.) except in by Test approved password vault such as LastPass, CyberArk. Passwords should not be inserted into email messages, help desk tickets, change requests or any other form of electronic communication. If available, Multi-Factor Authentication (MFA) should be used to augment credential security. MFA requires two forms of identification for successful login: Something you know – the employee’s username and password. Something you have – a device or access token.
AI Justification
The section discusses the importance of changing passwords when compromised, the use of Multi-Factor Authentication, and the management of authenticators, which aligns with the requirements for authenticator content and management.

Document Content
Matched Section
Section: Section 7, Sub-section j, k, and l
Content: If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately and inform Test’s Information Security Team. If the compromise was without the knowledge of the owner, the user should report the event to the Test IT Users should never use the 'Remember Password' feature in web browsers (e.g., Internet Explorer, Edge, Chrome, etc.) except in by Test approved password vault such as LastPass, CyberArk. Passwords should not be inserted into email messages, help desk tickets, change requests or any other form of electronic communication. If available, Multi-Factor Authentication (MFA) should be used to augment credential security. MFA requires two forms of identification for successful login: (cid:127) Something you know – the employee’s username and password. (cid:127) Something you have – a device or access token.
AI Justification
The section discusses the importance of changing compromised passwords and using Multi-Factor Authentication (MFA), which aligns with the need for authentication mechanisms to verify operator identity.

Document Content
Matched Section
Section: Password Requirements and Multi-Factor Authentication
Content: Passwords should not be based on personal information, names of family, pets, etc. NOTE/EXCEPTION: There may be instances where third party or legacy systems are unable to adhere to certain password requirements. In such cases, an exception should be received from the Test CISO. n. Users should be aware that Test systems will lockout users after the threshold for invalid access attempts has been reached. The general threshold is set to five failed attempts but may be set lower depending on specific system requirements. o. Multi-Factor Authentication (MFA) is required to access the Test network, any internet facing applications and certain sensitive and business critical Test systems.
AI Justification
The chunk discusses password requirements and Multi-Factor Authentication (MFA) for accessing systems, which aligns with the identification and authentication of users.

Document Content
Matched Section
Section: Detailed explanation of why the exception is necessary.
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the necessity of maintaining records of approved exceptions and the roles involved in approving emergency exceptions, which aligns with incident response policies and procedures.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of maintenance policies and procedures in addressing security and privacy assurance, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of media protection policies and procedures, including the approval process for exceptions, which aligns with the requirements of MP-1.

Document Content
Matched Section
Section: 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use
Content: The following activities are acceptable to be performed using Test IT resources and information systems, to include removable media.
AI Justification
The section discusses acceptable use of removable media, which aligns with the control's focus on managing access to both digital and non-digital media.

Document Content
Matched Section
Section: 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use
Content: The following activities are acceptable to be performed using Test IT resources and information systems, to include removable media.
AI Justification
The chunk discusses acceptable use of removable media, which aligns with the control's focus on managing and protecting both digital and non-digital media.

Document Content
Matched Section
Section: 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use
Content: The following activities are acceptable to be performed using Test IT resources and information systems, to include removable media.
AI Justification
The section discusses acceptable use of removable media, including encrypted removable media, which aligns with the requirements for protecting media during transport.

Document Content
Matched Section
Section: 1.3 RULES OF BEHAVIOR (ROB) - Acceptable Use
Content: The following activities are acceptable to be performed using Test IT resources and information systems, to include removable media.
AI Justification
The section discusses acceptable use of removable media and the restrictions on personally owned removable media, aligning with the control's focus on managing the use of system media.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of having policies and procedures for physical and environmental protection, including the need for exceptions to be approved and the process for doing so.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the need for policies and procedures regarding exceptions to security policies, which aligns with the planning and implementation of controls.

Document Content
Matched Section
Section: Monitoring of User’s device.
Content: 1. User agrees that designated staff can monitor his/her device and review any data as long as the data is stored or processed by a Test managed application.
AI Justification
The monitoring of the user's device and the requirement to install specific software align with the control's focus on managing remote access and ensuring security measures are in place.

Document Content
Matched Section
Section: Monitoring of User’s device.
Content: 2. Monitoring can be conducted live or through automated programs that detect and flag unsafe practices.
AI Justification
The monitoring and review of data on the user's device relate to the need for audit and monitoring controls to ensure compliance and security.

Document Content
Matched Section
Section: Installation of Software on User’s device.
Content: 2. User agrees not to remove, disable, or in any way interfere with Test installed software.
AI Justification
The requirement for users to install specific software and not interfere with it relates to maintaining the integrity of the system configuration.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: As part of its business mission, Test procures, configures, and maintains computers, information systems, and networks. These technology resources are intended for business-related purposes, including direct and indirect support of the business units, partners, and subsidiaries.
AI Justification
The text discusses how technology resources are intended for business-related purposes and the importance of understanding usage restrictions to strengthen security, aligning with the need to support specific missions.

Document Content
Matched Section
Section: 1.6 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The text describes disciplinary actions for policy violations, which aligns with the need for organizational sanctions as outlined in PS-8.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information processing and transparency, aligning with the requirements of control PT-1.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including the approval process for exceptions to these policies, which aligns with the requirements of RA-1.

Document Content
Matched Section
Section: Risk Assessment | Security Categorization
Content: Risk Assessment | Security Categorization
AI Justification
The chunk discusses the process of security categorization, its importance in understanding potential adverse impacts, and the involvement of various organizational roles, which aligns directly with the control's focus on categorizing security risks.

Document Content
Matched Section
Section: Risk Assessment | Security Categorization
Content: Control: RA-5: Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring (including scans). Organizations determine the required vulnerability monitoring for system components, ensuring that the potential sources of vulnerabilities—such as infrastructure components (e.g., switches, routers, guards, sensors), networked printers, scanners, and copiers—are not overlooked.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the processes involved in identifying and addressing vulnerabilities.

Document Content
Matched Section
Section: Risk Assessment | Security Categorization
Content: Control: RA-5: Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring (including scans).
AI Justification
The text emphasizes the role of security categorization in guiding vulnerability monitoring efforts.

Document Content
Matched Section
Section: Risk Assessment | Security Categorization
Content: The capability to readily update vulnerability monitoring tools as new vulnerabilities are discovered and announced and as new scanning methods are developed helps to ensure that new vulnerabilities are not missed by employed vulnerability monitoring tools.
AI Justification
The text mentions the need for continuous monitoring and assessment of vulnerabilities, which aligns with the principles of risk assessment.

Document Content
Matched Section
Section: Privacy Impact Assessment
Content: A privacy impact assessment is an analysis of how personally identifiable information is handled to ensure that handling conforms to applicable privacy requirements, determine the privacy risks associated with an information system or activity, and evaluate ways to mitigate privacy risks.
AI Justification
The text discusses the process and importance of conducting a privacy impact assessment, which aligns directly with the requirements outlined in control RA-8.

Document Content
Matched Section
Section: Criticality Analysis
Content: Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded. If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design.
AI Justification
The text discusses the importance of criticality analysis in identifying and prioritizing system components and functions that require protection, which aligns directly with control RA-9.

Document Content
Matched Section
Section: Security Categorization
Content: Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration. Such analysis is conducted as part of security categorization in RA-2.
AI Justification
The text mentions that criticality analysis is an important consideration as part of security categorization, which aligns with control RA-2.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of policies and procedures for system and services acquisition, including the need for exceptions to be approved and documented, aligning with the requirements of SA-1.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the need for defining and implementing security requirements and mechanisms, which aligns with the control's focus on deriving security and privacy functional requirements.

Document Content
Matched Section
Section: 1.5 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the necessity of having policies and procedures for system and communications protection, including the process for exceptions to these policies.
anonymized_4.0_IS_Organization_of_Information_Security_Policy_1.pdf NIST
85 matches found

Document Content
Matched Section
Section: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations.
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, including their development and implementation within organizations.

Document Content
Matched Section
Section: A.9.4.4 Access to Networks & Network Services
Content: Control: AC-17: Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broadband, and wireless. Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections.
AI Justification
The text discusses remote access to organizational systems, the use of encrypted VPNs, and the implications of remote access controls.

Document Content
Matched Section
Section: A.9.4.4 Access to Networks & Network Services
Content: Enforcing access restrictions for remote access is addressed via AC-3.
AI Justification
The text mentions enforcing access restrictions for remote access, which aligns with access enforcement controls.

Document Content
Matched Section
Section: implementation and operation of information security within Test
Content: This policy should also ensure the security of teleworking and use of mobile devices within Test so that they are adequately protected to prevent leakage of information through them.
AI Justification
The text discusses the security of mobile devices and the need for policies to protect them, which aligns with the requirements of AC-19 regarding the protection and control of mobile devices.

Document Content
Matched Section
Section: Control: AC-2
Content: Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of various types of system accounts, which aligns with the requirements of AC-2.

Document Content
Matched Section
Section: Control: AC-2
Content: Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access.
AI Justification
The text mentions the need for additional scrutiny for users requiring administrative privileges and the establishment of conditions for access, which aligns with access enforcement principles.

Document Content
Matched Section
Section: Control: AC-2
Content: Organizations may choose to define access privileges or other attributes by account, type of account, or a combination of the two.
AI Justification
The text discusses defining access privileges and restrictions based on account types, which is a key aspect of the least privilege principle.

Document Content
Matched Section
Section: Access Control Policy
Content: Access Control Policy
AI Justification
The chunk discusses access control policies and information handling, which aligns with the principles of information sharing and restrictions outlined in AC-21.

Document Content
Matched Section
Section: 4.0 Organization of Information Security Policy
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The text discusses the management of nonpublic information and the policies regarding public access, which aligns with the requirements of AC-22.

Document Content
Matched Section
Section: Access Control Policy
Content: Access Control Policy
AI Justification
The chunk discusses access control policies and their implementation, which aligns with the concept of access control decisions and enforcement as described in control AC-24.

Document Content
Matched Section
Section: Access Control Policy
Content: Access Control Policy
AI Justification
The chunk explicitly mentions 'Access Control Policy', which aligns with the definition of control AC-3 regarding the enforcement of access control policies.

Document Content
Matched Section
Section: A.9.4.1 - A.13.2.1
Content: Control: AC-4: Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses to that information. Flow control restrictions include blocking external traffic that claims to be from within the organization, keeping export-controlled information from being transmitted in the clear to the Internet, restricting web requests that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content.
AI Justification
The text discusses the regulation of information flow within and between systems, which aligns directly with the control's focus on managing where information can travel.

Document Content
Matched Section
Section: 1.3 SEGREGATION OF DUTIES
Content: a) Conflicting duties and areas of responsibility should be segregated to reduce opportunities for unauthorized or unintentional modification or misuse of the organization's assets.
AI Justification
The text discusses the importance of segregating conflicting duties to reduce unauthorized modifications or misuse, which aligns with the principle of separation of duties.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of awareness and training policies and procedures, which aligns directly with control AT-1.

Document Content
Matched Section
Section: 1.11 CONTROL REFERENCES
Content: NIST CSF Subcategory Control Reference Control Name ID.AM-6 CIS CSC 14 Security Awareness & Skills Training
AI Justification
The mention of awareness and training policies aligns with the need for security awareness and skills training.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users.
AI Justification
The chunk discusses the importance of training users on security and privacy, which aligns with role-based training requirements.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Literacy training after the initial training described in AT-2a.1 is conducted at a minimum frequency consistent with applicable laws, directives, regulations, and policies.
AI Justification
The content emphasizes the need for ongoing training and awareness for personnel, which is a key aspect of managing a security and privacy workforce.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The training content includes understanding security and privacy responsibilities, which relates to the terms and conditions of employment.

Document Content
Matched Section
Section: Security Awareness & Skills Training
Content: Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical controls.
AI Justification
The text discusses the importance of role-based training tailored to the specific roles and responsibilities of individuals within an organization, which aligns directly with the requirements of AT-3.

Document Content
Matched Section
Section: Access Control Policy
Content: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture.
AI Justification
The text discusses managed interfaces and the restrictions on traffic, which aligns with access control policies.

Document Content
Matched Section
Section: Access to Networks & Network Services
Content: Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces.
AI Justification
The mention of restricting external web traffic and managing network interfaces aligns with access to networks and network services.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: Prohibiting internal traffic that appears to be spoofing external addresses.
AI Justification
The control discusses prohibiting internal traffic that appears to be spoofing external addresses, which relates to the management of privileged access.

Document Content
Matched Section
Section: Network Controls
Content: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary.
AI Justification
The text directly addresses network components and boundary protection, which are essential aspects of network controls.

Document Content
Matched Section
Section: Segregation in Networks
Content: Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs.
AI Justification
The mention of physically or logically separated subnetworks aligns with the concept of network segregation.

Document Content
Matched Section
Section: Access to Networks & Network Services
Content: Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios.
AI Justification
The control emphasizes the need to protect the confidentiality and integrity of transmitted information across various network types, which aligns with ensuring secure access to networks and services.

Document Content
Matched Section
Section: Information Transfer Policies & Procedures
Content: Protecting the confidentiality and integrity of information can be accomplished by physical or logical means.
AI Justification
This control relates to the policies and procedures for transferring information securely, which is directly addressed in the context of protecting transmitted information.

Document Content
Matched Section
Section: Policy on the Utilization of Cryptographic Controls
Content: Logical protection can be achieved by employing encryption techniques.
AI Justification
The mention of employing encryption techniques for logical protection aligns with the need for a policy on cryptographic controls.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units.
AI Justification
The text discusses the importance of defining information security responsibilities and the allocation of those responsibilities within business units, which aligns with the need for a comprehensive system and information integrity policy.

Document Content
Matched Section
Section: A.9.4.1 - A.13.2.1
Content: One objective of the advanced persistent threat is to exfiltrate valuable information. Once exfiltrated, there is generally no way for the organization to recover the lost information. Therefore, organizations may consider dividing the information into disparate elements and distributing those elements across multiple systems or system components and locations.
AI Justification
The text discusses strategies to mitigate the risk of information exfiltration by dividing information into disparate elements, which aligns with the objectives of SI-23.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of supply chain risk management policies and procedures, aligning with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.11 CONTROL REFERENCES
Content: NIST CSF Subcategory Control Reference Control Name
AI Justification
The mention of security and privacy programs collaborating indicates a need for awareness and training in these areas.

Document Content
Matched Section
Section: Coordination and oversight of third-party relationships
Content: Coordination and oversight of third-party relationships should be identified and documented. See section in Supplier Relationship Policy4, for additional information and guidance.
AI Justification
The text discusses the coordination and oversight of third-party relationships, which aligns with the assessment and review of supplier risk as outlined in control SR-6.

Document Content
Matched Section
Section: Coordination and oversight of third-party relationships
Content: Coordination and oversight of third-party relationships should be identified and documented. See section in Supplier Relationship Policy4, for additional information and guidance.
AI Justification
The text discusses the importance of managing relationships with suppliers and the need for oversight and documentation regarding third-party relationships, which aligns with the principles of Supply Chain OPSEC.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: DOCUMENT CLASSIFICATION Confidential
AI Justification
The document classification as 'Confidential' and the restrictions on copying, using, or disclosing the information align with the control's focus on preventing unauthorized disclosure of sensitive information.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units. b) Responsibilities for the protection of individual assets and for carrying out specific information security should be identified. See the Asset Management Policy1 for additional information and guidance.
AI Justification
The text discusses the importance of defining information security responsibilities and the need for policies and procedures related to assessment, authorization, and monitoring, which aligns with the CA-1 control.

Document Content
Matched Section
Section: Authorization levels should be defined and documented.
Content: Authorization levels should be defined and documented.
AI Justification
The text discusses the need for authorization levels to be defined and documented, which aligns with the control's focus on official management decisions to authorize operations and accept risks.

Document Content
Matched Section
Section: A.9.4.1 - A.13.2.1
Content: Control: CA-3: System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, connections to internet service providers, database sharing or exchanges of database transaction information, connections and exchanges with cloud services, exchanges via web-based services, or exchanges of files via file transfer protocols, network protocols (e.g., IPv4, IPv6), email, or other organization-to-organization communications. Organizations consider the risk related to new or increased threats that may be introduced when systems exchange information with other systems that may have different security and privacy requirements and controls. This includes systems within the same organization and systems that are external to the organization. A joint authorization of the systems exchanging information, as described in CA-6(1) or CA-6(2), may help to communicate and reduce risk. Authorizing officials determine the risk associated with system information exchange and the controls needed for appropriate risk mitigation. The types of agreements selected are based on factors such as the impact level of the information being exchanged, the relationship between the organizations exchanging information (e.g., government to government, government to business, business to business, government or business to service provider, government or business to individual), or the level of access to the organizational system by users of the other system. If systems that exchange information have the same authorizing official, organizations need not develop agreements. Instead, the interface characteristics between the systems (e.g., how the information is being exchanged. how the information is protected) are described in the respective security and privacy plans. If the systems that exchange information have different authorizing officials within the same organization, the organizations can develop agreements or provide the same information that would be provided in the appropriate agreement type from CA-3a in the respective security and privacy plans for the systems. Organizations may incorporate agreement information into formal contracts, especially for information exchanges established between federal agencies and nonfederal organizations (including service providers, contractors, system developers, and system integrators). Risk considerations include systems that share the same networks.
AI Justification
The text discusses the requirements and considerations for system information exchanges, including risk assessment and agreements between organizations.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of configuration management policies and procedures, aligning directly with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units. b) Responsibilities for the protection of individual assets and for carrying out specific information security should be identified. See the Asset Management Policy1 for additional information and guidance. c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined. See the Risk Management Policy2 for additional information and guidance.
AI Justification
The section outlines the responsibilities for information security, including risk management and accountability, which aligns with the need for conducting impact analyses as described in control CM-4.

Document Content
Matched Section
Section: Contingency planning policy and procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of contingency planning policies and procedures, which aligns directly with the control's focus on addressing controls in the CP family.

Document Content
Matched Section
Section: Identification and Authentication Requirements
Content: Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations consider to have an equivalent status to employees (e.g., contractors and guest researchers). Unique identification and authentication of users applies to all accesses other than those that are explicitly identified in AC-14 and that occur through the authorized use of group authenticators without individual authentication.
AI Justification
The text discusses the requirements for unique identification and authentication of users, including the use of passwords, physical authenticators, and biometrics.

Document Content
Matched Section
Section: Identification and Authentication Requirements for Non-Organizational Users
Content: Identification and authentication requirements for non-organizational users are described in IA-8.
AI Justification
The text mentions identification and authentication requirements for non-organizational users, indicating a need for controls related to their access.

Document Content
Matched Section
Section: Access Control | Permitted Actions without Identification or Authorization
Content: Non-organizational users are uniquely identified and authenticated for accesses other than those explicitly identified and documented in AC-14.
AI Justification
The text discusses the identification and authentication of non-organizational users and mentions exceptions for actions that do not require identification or authorization.

Document Content
Matched Section
Section: Account Management
Content: Non-organizational users are uniquely identified and authenticated for accesses other than those explicitly identified and documented in AC-14.
AI Justification
The mention of uniquely identifying and authenticating non-organizational users aligns with account management practices.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Organizations consider many factors—including security, privacy, scalability, and practicality—when balancing the need to ensure ease of use for access to federal information and systems with the need to protect and adequately mitigate risk.
AI Justification
The text implies a need to balance ease of use with the protection of information, which relates to the principle of least privilege.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of incident response policies and procedures, their development, and the factors influencing them, which aligns directly with the control's focus.

Document Content
Matched Section
Section: 1.4 CONTACT WITH AUTHORITIES
Content: Management should have procedures specifying when and by whom authorities (e.g., law enforcement, regulatory bodies, supervisory authorities) should be contacted and how identified information including security incidents should be reported in a timely manner.
AI Justification
The chunk discusses the procedures for contacting authorities in relation to security incidents, which aligns with the incident response capabilities outlined in control IR-4.

Document Content
Matched Section
Section: 1.4 CONTACT WITH AUTHORITIES
Content: a) Management should have procedures specifying when and by whom authorities (e.g., law enforcement, regulatory bodies, supervisory authorities) should be contacted and how identified information including security incidents should be reported in a timely manner. See the IS Incident Management Policy5 for more details.
AI Justification
The section outlines procedures for contacting authorities and reporting security incidents, which aligns with the requirements for incident reporting and compliance with laws and regulations.

Document Content
Matched Section
Section: Incident Response Management
Content: Control: IR-5: Documenting incidents includes maintaining records about each incident, the status of the incident, and other pertinent information necessary for forensics as well as evaluating incident details, trends, and handling.
AI Justification
The chunk discusses the importance of documenting incidents and maintaining records, which aligns directly with the requirements of control IR-5.

Document Content
Matched Section
Section: Incident Response Management
Content: IR-4 provides information on the types of incidents that are appropriate for monitoring.
AI Justification
The mention of incident information sources and types of incidents for monitoring aligns with the objectives of control IR-4.

Document Content
Matched Section
Section: 1.6 MAINTENANCE
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval.
AI Justification
The text discusses the periodic review of standards and associated documents, which aligns with the need to approve, control, monitor, and review maintenance tools as outlined in control MA-3.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of planning policies and procedures for security and privacy programs, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: Control: PL-11
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions. Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions, the environments where their systems operate, the threats and vulnerabilities that can affect their systems, and any other conditions or situations that can impact their mission or business success.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns with the control's focus on customizing baseline controls.

Document Content
Matched Section
Section: Program Management | Information Security Program Plan
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance and details of an information security program plan, including its purpose, implementation details, and updates.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units. b) Responsibilities for the protection of individual assets and for carrying out specific information security should be identified. See the Asset Management Policy1 for additional information and guidance. c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined. See the Risk Management Policy2 for additional information and guidance.
AI Justification
The chunk discusses the allocation of information security responsibilities and the identification of roles related to risk management, which aligns with the need for an organization-wide risk management process as outlined in PM-10.

Document Content
Matched Section
Section: Program Management | Information Security Program Leadership Role
Content: Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same standards and guidelines that apply to insider threat programs in classified environments can also be employed effectively to improve the security of controlled unclassified and other information in non-national security systems.
AI Justification
The text discusses the establishment and requirements of insider threat programs, which aligns directly with control PM-12.

Document Content
Matched Section
Section: Program Management | Security Awareness & Skills Training
Content: Security Awareness & Skills Training
AI Justification
The chunk discusses the importance of security awareness and skills training, which aligns with the need for defined knowledge, skills, and abilities for security roles.

Document Content
Matched Section
Section: Program Management | Information Security Program Leadership Role
Content: Program Management | Information Security Program Leadership Role
AI Justification
The chunk explicitly mentions the role of the senior agency information security officer, which aligns directly with the control PM-2.

Document Content
Matched Section
Section: 1.4 CONTACT WITH AUTHORITIES
Content: Management should have procedures specifying when and by whom authorities (e.g., law enforcement, regulatory bodies, supervisory authorities) should be contacted and how identified information including security incidents should be reported in a timely manner.
AI Justification
The chunk discusses the procedures for contacting authorities and reporting incidents, which aligns with promoting accountability and transparency in privacy operations.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units. b) Responsibilities for the protection of individual assets and for carrying out specific information security should be identified. See the Asset Management Policy1 for additional information and guidance. c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined. See the Risk Management Policy2 for additional information and guidance. d) Personnel with defined information security responsibilities may delegate security tasks to others. However, the defined personnel will remain accountable and should determine whether the delegated tasks have been performed correctly. Specifically, the following should take place: i. The assets and information security process should be identified and defined.
AI Justification
The text discusses the allocation and definition of information security responsibilities within business units, which aligns with the concept of establishing champions for information security.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined. See the Risk Management Policy2 for additional information and guidance.
AI Justification
The chunk discusses the allocation of responsibilities for information security risk management activities and acceptance of residual risks, which aligns with the organization-wide risk management strategy outlined in PM-9.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of personnel security policies and procedures, their development, and the need for collaboration between security and privacy programs.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Control: PS-2: Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel security program. The Position Designation System (PDS) assesses the duties and responsibilities of a position to determine the degree of potential damage to the efficiency or integrity of the service due to misconduct of an incumbent of a position and establishes the risk level of that position.
AI Justification
The text discusses the importance of proper position designation and its impact on personnel security programs, aligning directly with the requirements of PS-2.

Document Content
Matched Section
Section: Coordination and oversight of third-party relationships
Content: Coordination and oversight of third-party relationships should be identified and documented. See section in Supplier Relationship Policy4, for additional information and guidance.
AI Justification
The chunk discusses the coordination and oversight of third-party relationships, which aligns with the requirements for managing external providers.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Personnel Security | Position Descriptions
AI Justification
The chunk discusses various roles and responsibilities related to information security, which aligns with the specification of security and privacy roles in organizational position descriptions.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of policies and procedures for managing personally identifiable information, aligning with the requirements of PT-1.

Document Content
Matched Section
Section: 1.11 CONTROL REFERENCES
Content: NIST CSF Subcategory Control Reference Control Name
AI Justification
The mention of security and privacy programs collaborating indicates a need for awareness and training in handling personally identifiable information.

Document Content
Matched Section
Section: Risk Assessment Policy and Procedures
Content: Control: RA-1: Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of risk assessment policies and procedures, emphasizing their role in security and privacy assurance, which aligns with the RA-1 control.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units. b) Responsibilities for the protection of individual assets and for carrying out specific information security should be identified. See the Asset Management Policy1 for additional information and guidance. c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined. See the Risk Management Policy2 for additional information and guidance.
AI Justification
The text discusses the importance of defining information security responsibilities and the allocation of these responsibilities within business units, which aligns with the concept of security categorization and its impact on organizational operations and assets.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The chunk discusses the organization's approach to risk management, including the need for procedures and protocols to address risk, which aligns with the control's focus on responding to risk.

Document Content
Matched Section
Section: Privacy Impact Assessment
Content: A privacy impact assessment is an analysis of how personally identifiable information is handled to ensure that handling conforms to applicable privacy requirements, determine the privacy risks associated with an information system or activity, and evaluate ways to mitigate privacy risks.
AI Justification
The text discusses the importance of conducting a privacy impact assessment, detailing how personally identifiable information is handled and the need for ongoing analysis throughout the information life cycle.

Document Content
Matched Section
Section: Criticality analysis and its importance in risk management.
Content: Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded. If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design.
AI Justification
The text discusses the importance of criticality analysis in assessing system components and their dependencies, which aligns with the principles of risk assessment.

Document Content
Matched Section
Section: Criticality analysis of information.
Content: Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration.
AI Justification
The mention of criticality analysis of information as part of security categorization aligns with the RA-2 control.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units.
AI Justification
The text discusses the importance of defining information security responsibilities and procedures, which aligns with the need for policies and procedures in system and services acquisition.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: c) Responsibilities for information security risk management activities and for acceptance of residual risks should be defined.
AI Justification
The text mentions responsibilities for information security risk management activities, which aligns with the need for risk assessment policies and procedures.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Control: SA-16: Developer-provided training applies to external and internal (in-house) developers. Training personnel is essential to ensuring the effectiveness of the controls implemented within organizational systems.
AI Justification
The control emphasizes the importance of training for both internal and external developers, which aligns with the need for role-based training to ensure personnel are adequately prepared for their responsibilities.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Organizations determine the type of training necessary and may require different types of training for different security and privacy functions, controls, and mechanisms.
AI Justification
This control aligns with the need for organizations to determine the type of training necessary for their workforce, ensuring they are equipped to handle security and privacy functions.

Document Content
Matched Section
Section: Incident Response | Incident Response Training
Content: Types of training include web-based and computer-based training, classroom-style training, and hands-on training (including micro-training).
AI Justification
The mention of different types of training for various security functions includes incident response training, which is crucial for effective incident management.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: a) Information security responsibilities should be defined and allocated within Test business units.
AI Justification
The text discusses the importance of defining and allocating information security responsibilities within business units, which aligns with the principles of the system development life cycle that incorporates security and privacy considerations.

Document Content
Matched Section
Section: 1.2 INFORMATION SECURITY ROLES & RESPONSIBILITIES
Content: Role-based security and privacy training programs can ensure that individuals with key security and privacy roles and responsibilities have the experience, skills, and expertise to conduct assigned system development life cycle activities.
AI Justification
The mention of role-based security and privacy training programs aligns with the need for qualified personnel in system development life cycle processes, as outlined in SA-8.

Document Content
Matched Section
Section: Coordination and oversight of third-party relationships
Content: Coordination and oversight of third-party relationships should be identified and documented. See section in Supplier Relationship Policy for additional information and guidance.
AI Justification
The text discusses the coordination and oversight of third-party relationships, which aligns with the requirements for managing risks associated with external service providers as outlined in control SA-9.

Document Content
Matched Section
Section: Policy
Content: Statement of intent that is implemented as a procedure or protocol.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, which aligns directly with the SC-1 control.

Document Content
Matched Section
Section: Segregation of duties
Content: Designed to prevent unilateral actions within an organization’s workflow, which can result in damaging events that would exceed the organization’s risk tolerance.
AI Justification
The mention of segregation of duties aligns with the need to prevent unilateral actions, which is a key aspect of the AC-5 control.

Document Content
Matched Section
Section: Policy on the Utilization of Cryptographic Controls
Content: Control: SC-12: Cryptographic key management and establishment can be performed using manual procedures or automated mechanisms with supporting manual procedures. Organizations define key management requirements in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and specify appropriate options, parameters, and levels.
AI Justification
The chunk discusses cryptographic key management and establishment, which aligns with the need for a policy regarding the utilization of cryptographic controls.

Document Content
Matched Section
Section: Policy on the Utilization of Cryptographic Controls
Content: Cryptography can be employed to support a variety of security solutions, including the protection of classified information and controlled unclassified information, the provision and implementation of digital signatures, and the enforcement of information separation when authorized individuals have the necessary clearances but lack the necessary formal access approvals.
AI Justification
The text discusses the use of cryptography for protecting information and specifies standards for cryptographic implementations.
anonymized_7.1_IS_Asset_Management_Standard.pdf NIST
40 matches found

Document Content
Matched Section
Section: Section 1.6 - Access Control Policy and Procedures
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of access control policies and procedures, including the process for exceptions to these policies.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk discusses the requirement for devices to automatically lock after idle time, which aligns with the concept of device locks as a temporary measure to prevent unauthorized access.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: a) Test should follow its mobile device security standards as outlined in the Test IS 7.2 End User Device Standard. b) System threat models frameworks (e.g., the OWASP Threat Model Framework) for mobile devices and the resources that are accessed through the mobile devices should be followed. c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time. d) Endpoint device security should be regularly maintained. e) Each organization-issued endpoint device should be fully secured before allowing a user to access it. f) Aspects of endpoint device solution that should be evaluated. 1. protection, 2. authentication, 3. application functionality, 4. solution management, 5. logging, and performance.
AI Justification
The text discusses the management and security of mobile devices, which aligns with the requirements outlined in AC-19 regarding the protection and control of mobile devices.

Document Content
Matched Section
Section: 1.6 Exception
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, including the need for approval for exceptions, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Endpoint Security Device Management
Content: a) Test should follow its mobile device security standards as outlined in the Test IS 7.2 End User Device Standard.
AI Justification
The chunk discusses security standards and authentication for mobile devices, which aligns with the control's focus on managing mobile code and its potential risks.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: a) Test should follow its mobile device security standards as outlined in the Test IS 7.2 End User Device Standard. b) System threat models frameworks (e.g., the OWASP Threat Model Framework) for mobile devices and the resources that are accessed through the mobile devices should be followed. c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk discusses the security standards and authentication measures for mobile devices, aligning with the need for usage restrictions to ensure authorized access and prevent potential damage.

Document Content
Matched Section
Section: Exceptions to the policy
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions and functions to define and implement stronger security requirements, which aligns with the need for additional strength of mechanism for domain separation and policy enforcement.

Document Content
Matched Section
Section: Section 1.6 - EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including the process for exceptions to these policies.

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting.
AI Justification
The text discusses asset disposal procedures and data security measures, which align with information management and retention requirements.

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting.
AI Justification
The section outlines procedures for asset disposal and management, which aligns with asset management controls.

Document Content
Matched Section
Section: 1.3 IT Asset (NEW) and other assets Retirement and Disposal
Content: a) Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting. b) Establish data security procedures to protect sensitive (classification internal, confidential, restricted) data when assets are planned to be retired.
AI Justification
The text discusses the need for a defined asset disposal procedure and data security procedures for sensitive data, which aligns with the control's focus on disposal at any stage of the system development life cycle.

Document Content
Matched Section
Section: IT Asset Procurement
Content: a) Test should establish supplier management plans like: 1. Escalation process 2. Supplier contingency plan 3. Supplier contract renewal and termination procedures
AI Justification
The text discusses the importance of the acquisition process in protecting the supply chain, which aligns with the control's focus on managing supply chain risks.

Document Content
Matched Section
Section: IT Asset Procurement
Content: Test should establish supplier management plans like: 1. Escalation process 2. Supplier contingency plan 3. Supplier contract renewal and termination procedures
AI Justification
The chunk discusses the establishment of supplier management plans, which aligns with the need for agreements and procedures to facilitate communication among supply chain entities.

Document Content
Matched Section
Section: Section 1.6 - EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception.
AI Justification
The text discusses the importance of having policies and procedures for assessment, authorization, and monitoring, as well as the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Section 1.6 - Configuration Management Policy and Procedures
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of configuration management policies and procedures, including the need for exceptions and approvals, which aligns with CM-1.

Document Content
Matched Section
Section: Contingency planning policy and procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures.
AI Justification
The text discusses the importance of contingency planning policies and procedures, including the approval process for exceptions, which aligns with the requirements of CP-1.

Document Content
Matched Section
Section: Chunk: 1.6
Content: EXCEPTION Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, including the need for approval for exceptions, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk mentions that all users should be authenticated prior to accessing the organization's resources, which aligns with the re-authentication requirements outlined in IA-11.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk discusses the need for user authentication and device security, which aligns with the requirement for unique device identification and authentication.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources.
AI Justification
The chunk discusses the importance of authentication and security measures for endpoint devices, which relates to the management of device identifiers.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources.
AI Justification
The chunk emphasizes user authentication and the management of user access to resources, which aligns with account management practices.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk discusses the need for user authentication before accessing organizational resources, which aligns with the requirements for authenticators and their management.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources.
AI Justification
The requirement for all users to be authenticated before accessing resources aligns with access enforcement controls.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Control: IR-1: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of incident response policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to incident response policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of incident response policies and procedures, including the need for collaboration between security and privacy programs, which aligns with the intent of control IR-1.

Document Content
Matched Section
Section: Chunk: 1.6
Content: Control: MA-1: Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of maintenance policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to maintenance policy and procedures assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of maintenance policies and procedures in relation to security and privacy assurance, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time.
AI Justification
The chunk emphasizes the need for user authentication prior to accessing organizational resources, aligning with the requirements for identification and authentication.

Document Content
Matched Section
Section: 1.2 Endpoint Security Device Management
Content: d) Endpoint device security should be regularly maintained.
AI Justification
The mention of maintaining endpoint device security and ensuring devices are secured aligns with the maintenance aspect of control MA-4.

Document Content
Matched Section
Section: 1.6 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of media protection policies and procedures, including the approval process for exceptions, which aligns with the requirements of control MP-1.

Document Content
Matched Section
Section: IT Asset (NEW) and other assets Retirement and Disposal
Content: Define an asset disposal procedure encompassing identification of assets, assessment of assets, approval, disposal methods, and reporting.
AI Justification
The text discusses procedures for asset disposal and data security measures, which align with the requirements for media sanitization to ensure sensitive data is protected during disposal.

Document Content
Matched Section
Section: 1.6
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets.
AI Justification
The text discusses the importance of having policies and procedures for physical and environmental protection, including the need for approval for exceptions to these policies.

Document Content
Matched Section
Section: 1.6 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception.
AI Justification
The text discusses the need for policies and procedures related to security and privacy, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: 1.6
Content: EXCEPTION Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of personnel security policies and procedures, including the need for approval for exceptions, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.5 ENFORCEMENT/COMPLIANCE
Content: Test Senior Management should define consequences for violations of all information security related policies, procedures, processes, or standards. Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The section discusses the importance of exit interviews and the accountability for system-related property, which aligns with the control's focus on managing system property and ensuring proper accountability.

Document Content
Matched Section
Section: ENFORCEMENT/COMPLIANCE
Content: Test Senior Management should define consequences for violations of all information security related policies, procedures, processes, or standards. Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The text outlines the consequences for violations of information security policies, which aligns with the need for organizational sanctions as described in PS-8.

Document Content
Matched Section
Section: 1.6
Content: EXCEPTION Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information, including the need for approval for exceptions and the establishment of security requirements.

Document Content
Matched Section
Section: Chunk: 1.6
Content: EXCEPTION Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including how exceptions to these policies should be handled, which aligns with the control's focus on risk management strategies.

Document Content
Matched Section
Section: 1.6
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to system and services acquisition, including the need for approvals and the process for exceptions, which aligns with the requirements of SA-1.

Document Content
Matched Section
Section: 1.6
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the derivation of security and privacy requirements, including the ability to define and implement stronger security requirements, which aligns with the concept of deriving functional requirements as stated in SA-4.

Document Content
Matched Section
Section: Endpoint Security Device Management
Content: a) Test should follow its mobile device security standards as outlined in the Test IS 7.2 End User Device Standard. b) System threat models frameworks (e.g., the OWASP Threat Model Framework) for mobile devices and the resources that are accessed through the mobile devices should be followed. c) All users should be authenticated prior to accessing the organization’s resources. Due diligence should be conducted; forgotten passwords should be reset, and devices should automatically lock after idle time. d) Endpoint device security should be regularly maintained. e) Each organization-issued endpoint device should be fully secured before allowing a user to access it. f) Aspects of endpoint device solution that should be evaluated. 1. protection, 2. authentication, 3. application functionality, 4. solution management, 5. logging, and performance.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns with the control's focus on applying these principles to develop secure systems.

Document Content
Matched Section
Section: 1.6 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception.
AI Justification
The text discusses the importance of having a system and communications protection policy and procedures, including the process for exceptions to the policy.
anonymized_5.0_IS_Human_Resource_Security_Policy_1.pdf NIST
110 matches found

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their relation to security and privacy programs.

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations.
AI Justification
The text emphasizes the need for an access control policy, which aligns with the control regarding access control policies.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the termination of access privileges and the responsibilities of administrators to disable IDs upon employee termination, which aligns with the control's focus on session termination.

Document Content
Matched Section
Section: Control: AC-17: Remote access is access to organizational systems...
Content: Control: AC-17: Remote access is access to organizational systems (or processes acting on behalf of users) that communicate through external networks such as the Internet. Types of remote access include dial-up, broadband, and wireless. Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections...
AI Justification
The text discusses remote access to organizational systems, including the use of encrypted VPNs and the need for authorization prior to allowing remote access.

Document Content
Matched Section
Section: Enforcing access restrictions for remote access is addressed via AC-3.
Content: Enforcing access restrictions for remote access is addressed via AC-3.
AI Justification
The text mentions enforcing access restrictions for remote access, which aligns with the need for access enforcement controls.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges upon termination, which aligns with the requirements for managing system accounts and their access privileges.

Document Content
Matched Section
Section: Access Control Management
Content: External systems are systems that are used by but not part of organizational systems, and for which the organization has no direct control over the implementation of required controls or the assessment of control effectiveness.
AI Justification
The text discusses the management and restrictions of access to external systems, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Access Control Management
Content: Restrictions that organizations impose on authorized individuals need not be uniform, as the restrictions may vary depending on trust relationships between organizations.
AI Justification
The text mentions imposing restrictions on authorized individuals and external systems, which aligns with the control for restricting access to information.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The chunk mentions 'Access Control Management' which aligns with the need for an access control policy to manage access to organizational systems.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The reference to access control policies implies the need for restricting access to information, which aligns with this control.

Document Content
Matched Section
Section: Control: AC-4: Information flow control regulates where information can travel within a system and between systems
Content: Control: AC-4: Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses to that information. Flow control restrictions include blocking external traffic that claims to be from within the organization, keeping export-controlled information from being transmitted in the clear to the Internet, restricting web requests that are not from the internal web proxy server, and limiting information transfers between organizations based on data structures and content.
AI Justification
The text discusses the regulation of information flow within and between systems, which aligns with the definition of Information Flow Control.

Document Content
Matched Section
Section: Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information
Content: Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations within systems and between connected systems.
AI Justification
The mention of access control policies and enforcement mechanisms aligns with the Access Control Policy.

Document Content
Matched Section
Section: Managers
Content: Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information. Ensure that conflicting functions such as data entry, computer operations, network management business system use, system administration, system development, change management, security administration, and security audit are not carried out by the same person.
AI Justification
The chunk discusses the segregation of conflicting duties and areas of responsibility to minimize risks, which aligns directly with the principles of separation of duties outlined in AC-5.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Periodic Information Security Training will be provided to employees and a recording of these sessions will be maintained. Training materials are prepared by Information Security Management. Specialized Information Security Training should be carried out periodically for employees performing security duties as part of their job requirements. Based on roles and responsibilities, training should include, but is not limited to, Information Security Procedures, Proper Use of Information Security Resources and Current Threats to Information Systems.
AI Justification
The chunk discusses the provision of periodic information security training to employees, which aligns with the requirements of the AT-1 control regarding awareness and training policies.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Periodic Information Security Training will be provided to employees and a recording of these sessions will be maintained. Training materials are prepared by Information Security Management. Specialized Information Security Training should be carried out periodically for employees performing security duties as part of their job requirements. Based on roles and responsibilities, training should include, but is not limited to, Information Security Procedures, Proper Use of Information Security Resources and Current Threats to Information Systems. At a minimum, the following topics should be covered in Information Security Awareness training for employees: Information Security Policies and Procedures, Password and User ID Practices.
AI Justification
The chunk discusses the provision of periodic information security training and the topics that should be covered, which aligns with the requirements for literacy training and awareness as outlined in control AT-2.

Document Content
Matched Section
Section: Security Awareness & Skills Training
Content: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the importance of role-based training tailored to the responsibilities and security requirements of various roles within an organization, which aligns directly with control AT-3.

Document Content
Matched Section
Section: Managers
Content: Managers (cid:127) Review and validate security roles and responsibilities in job descriptions, if applicable. (cid:127) Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information.
AI Justification
The text discusses the importance of policies and procedures related to audit and accountability, which aligns with the AU-1 control.

Document Content
Matched Section
Section: Managers
Content: Ensure that conflicting functions such as data entry, computer operations, network management business system use, system administration, system development, change management, security administration, and security audit are not carried out by the same person.
AI Justification
The text emphasizes the need to segregate conflicting duties to minimize risks, which aligns with the AC-5 control.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the isolation of security functions and the importance of access control mechanisms, which aligns with the Access Control Policy.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The mention of restricting access to security functions relates directly to the need for information access restrictions.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications. Upon termination, managers should inspect any materials an employee wishes to remove from the premises. The IT Department should examine any computing or communications equipment issued to or used by terminated employees to ensure that all internal information is retrieved or destroyed from the device prior to reuse of the device or issuance to another employee.
AI Justification
The text discusses the removal of access privileges and the examination of devices to ensure that internal information is retrieved or destroyed, which aligns with preventing unauthorized access to shared resources.

Document Content
Matched Section
Section: Managers
Content: Ensure that there is enough depth of expertise in critical functions to prevent disruption if unexpected staff changes occur. A primary and an alternate should be assigned to all critical information security functions, and alternates should have the necessary expertise to perform those functions in the event the primary is not available.
AI Justification
The text discusses the assignment of primary and alternate personnel for critical functions, which aligns with the need for alternate communications paths and decision-making during incidents.

Document Content
Matched Section
Section: Access Control Management
Content: Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.
AI Justification
The text discusses the management of interfaces and access control measures that restrict or prohibit traffic, aligning with access control policies.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).
AI Justification
The mention of managed interfaces and boundary protection relates to controlling access to networks and services.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture.
AI Justification
The text describes network-based protections and controls, which aligns with network control measures.

Document Content
Matched Section
Section: NIST CSF
Content: NIST CSF Subcategory Control Reference Control Name 6 Access Control Management 13 Network Monitoring & Defense 15 Service Provider Management 16 Application Software Security
AI Justification
This control is relevant as it addresses the protection of transmitted information across networks, ensuring confidentiality and integrity.

Document Content
Matched Section
Section: 1.12 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Access Control Policy and employee termination procedures
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges and the responsibilities of administrators in managing access upon employee termination, which aligns with access control policies.

Document Content
Matched Section
Section: Information management and retention regarding terminated employees
Content: The IT Department should examine any computing or communications equipment issued to or used by terminated employees to ensure that all internal information is retrieved or destroyed from the device prior to reuse of the device or issuance to another employee.
AI Justification
The text mentions the need to retrieve or destroy internal information from devices used by terminated employees, which relates to information management and retention.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges and the importance of ensuring that internal information is retrieved or destroyed, which aligns with the principles of de-identification.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination.
AI Justification
The section emphasizes the need to manage access privileges effectively upon employee termination, which is a key aspect of account management.

Document Content
Matched Section
Section: 1.8 DISCIPLINARY PROCESS
Content: There should be a formal disciplinary process for employees who violate Test’s Information Security policies and procedures. Disciplinary action should be taken when there is appropriate evidence of a violation. The formal disciplinary process should provide for an appropriate management response that takes into consideration factors such as the nature and gravity of the breach and its impact on business, whether it is a first or repeat offence, whether the violator was properly trained, relevant legislation, business contracts and other factors, as required. Disciplinary actions may include but are not limited to: loss of access privileges to information resources, termination of employment and/or other actions as may be deemed appropriate by HR and the Chief Information Security Officer.
AI Justification
The section discusses the importance of a formal disciplinary process for violations of information security policies, which aligns with the need to protect organizational information from various threats, including insider attacks and erroneous user procedures.

Document Content
Matched Section
Section: System monitoring includes external and internal monitoring.
Content: System monitoring includes external and internal monitoring. External monitoring includes the observation of events occurring at external interfaces to the system. Internal monitoring includes the observation of events occurring within the system. Organizations monitor systems by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions.
AI Justification
The text discusses various aspects of system monitoring, including internal and external monitoring, tools used, and the importance of monitoring in incident response.

Document Content
Matched Section
Section: Organizations monitor systems by observing audit activities in real time.
Content: Organizations monitor systems by observing audit activities in real time or by observing other system aspects such as access patterns, characteristics of access, and other actions.
AI Justification
The text mentions the observation of audit activities as part of system monitoring.

Document Content
Matched Section
Section: Monitoring devices are typically employed at the managed interfaces associated with controls SC-7 and AC-17.
Content: Monitoring devices are typically employed at the managed interfaces associated with controls SC-7 and AC-17.
AI Justification
The text refers to monitoring devices employed at managed interfaces associated with controls, including AC-17.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The chunk discusses the removal of access privileges and the responsibilities of administrators during the termination process, which aligns with the transitional states of systems.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. The employee’s privileges and/or passwords should be changed to prevent access to systems.
AI Justification
The chunk emphasizes the need to remove access privileges and change passwords upon employee termination, which aligns with account management practices.

Document Content
Matched Section
Section: Supply chain risk management (SCRM) activities include identifying and assessing risks, determining appropriate risk response actions, developing SCRM plans to document response actions, and monitoring performance against plans.
Content: Supply chain risk management (SCRM) activities include identifying and assessing risks, determining appropriate risk response actions, developing SCRM plans to document response actions, and monitoring performance against plans.
AI Justification
The text discusses the risks associated with external providers and emphasizes the importance of managing supply chain risks, which aligns with service provider management.

Document Content
Matched Section
Section: Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware.
Content: Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware.
AI Justification
The text mentions threats such as unauthorized production, tampering, and insertion of malicious software, which relate to protecting against external threats.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION and restrictions on information use
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The document classification and restrictions on copying, using, or disclosing information align with the control's focus on preventing unauthorized disclosure of sensitive information.

Document Content
Matched Section
Section: Managers
Content: Review and validate security roles and responsibilities in job descriptions, if applicable. Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information. Ensure that there is enough depth of expertise in critical functions to prevent disruption if unexpected staff changes occur. A primary and an alternate should be assigned to all critical information security functions, and alternates should have the necessary expertise to perform those functions in the event the primary is not available. Ensure that conflicting functions such as data entry, computer operations, network management business system use, system administration, system development, change management, security administration, and security audit are not carried out by the same person. Monitor security policy compliance, IT security compliance and performance of assigned.
AI Justification
The text discusses the importance of policies and procedures related to assessment, authorization, and monitoring, which aligns with the CA-1 control.

Document Content
Matched Section
Section: Managers
Content: Review and validate security roles and responsibilities in job descriptions, if applicable. Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information.
AI Justification
The text discusses the importance of configuration management policies and procedures, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the need for understanding where information is processed and stored, which aligns with access control policies that dictate how access to information is managed.

Document Content
Matched Section
Section: Labeling of Information
Content: Labeling of Information
AI Justification
The mention of identifying where specific information types reside aligns with the need for proper labeling of information to ensure it is managed correctly.

Document Content
Matched Section
Section: Information Access Restriction
Content: Information Access Restriction
AI Justification
Understanding where information resides is crucial for implementing access restrictions to protect sensitive information.

Document Content
Matched Section
Section: Access privileges of employees should be removed from all systems upon termination.
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The chunk discusses the removal of access privileges and the responsibilities of administrators in managing access upon employee termination, which aligns with access enforcement controls.

Document Content
Matched Section
Section: Refer to the Access Control Policy for additional details.
Content: Refer to the Access Control Policy for additional details.
AI Justification
The chunk emphasizes the importance of managing access rights and the responsibilities of administrators, which aligns with the control's focus on authorized access for changes.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the establishment of configuration settings that impact access controls, which aligns with the Access Control Policy.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The mention of parameters impacting security and privacy includes access controls, which relates to restricting information access.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses limiting component functionality and managing access to prevent unauthorized connections, which aligns with access control policies.

Document Content
Matched Section
Section: Identification and Authentication Policy and Procedures
Content: Control: IA-1: Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: INFORMATION SECURITY AWARENESS
Content: 1.6 INFORMATION SECURITY AWARENESS Employees should complete Security Awareness Training within a defined period.
AI Justification
The mention of Security Awareness Training for employees aligns with the need for a structured training program as outlined in this control.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary.
AI Justification
The section discusses the process of providing IDs and passwords to new hires, which involves validating and verifying identity information for access to systems.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges and changing of passwords upon termination, which aligns with re-authentication requirements when roles or credentials change.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination.
AI Justification
The text emphasizes the importance of managing access privileges and ensuring they are removed upon termination, which aligns with account management practices.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary.
AI Justification
The text discusses the provision of IDs and passwords to new hires, which aligns with the requirement for unique identification and authentication of users.

Document Content
Matched Section
Section: 1.5 ROLES & RESPONSIBILITIES
Content: Conduct a pre-employment background check for employees joining the Firm. Conduct exit interviews for employees leaving the Firm. Communicate employee terminations to appropriate individuals.
AI Justification
The mention of roles and responsibilities related to employee terminations and background checks implies a need for identification and authentication processes for non-organizational users.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges and the disabling of IDs upon employee termination, which aligns with account management practices.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: The employee’s privileges and/or passwords should be changed to prevent access to systems.
AI Justification
The text implies the management of identifiers through the disabling of IDs and changing of passwords upon termination, which relates to the management of individual identifiers.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary. Network Administrators create network login IDs and administer network-level permissions granted to each employee for perimeter-level security. Application Security Administrators create application login IDs and administer permissions granted to each employee based upon instructions from the hiring manager.
AI Justification
The text discusses the provision of IDs and passwords to new hires, which relates to the authentication of operators accessing systems.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary.
AI Justification
The chunk discusses the provision of IDs and passwords to new hires, which aligns with the management of authenticators as described in control IA-5.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: Network Administrators create network login IDs and administer network-level permissions granted to each employee for perimeter-level security.
AI Justification
The chunk describes the administration of network login IDs and permissions, which relates to enforcing access controls.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: Application Security Administrators create application login IDs and administer permissions granted to each employee based upon instructions from the hiring manager.
AI Justification
The chunk indicates that permissions are granted based on the employee's group and instructions from the hiring manager, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: 1.4 NEW HIRE IDS & PASSWORDS
Content: IDs and passwords are provided to new hires in order to access required systems as determined by the employee’s group. Hiring managers will review and approve applications and adjust as necessary. Network Administrators create network login IDs and administer network-level permissions granted to each employee for perimeter-level security. Application Security Administrators create application login IDs and administer permissions granted to each employee based upon instructions from the hiring manager.
AI Justification
The section discusses the provision of IDs and passwords to new hires, which aligns with the identification and authentication of users.

Document Content
Matched Section
Section: Detailed explanation of why the exception is necessary.
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the importance of incident response policies and procedures, including the need for collaboration between security and privacy programs, which aligns with the requirements of control IR-1.

Document Content
Matched Section
Section: Incident Response | Incident Response Training
Content: Incident response training is associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training.
AI Justification
The chunk discusses the need for incident response training tailored to the roles and responsibilities of personnel, which aligns directly with the requirements of control IR-2.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources.
AI Justification
The mention of user training in identifying and reporting suspicious activities aligns with the objectives of control AT-3, which focuses on role-based training.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the responsibilities and actions related to access privileges and termination processes, which align with the control's focus on maintenance personnel and access authorizations.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: The IT Department should examine any computing or communications equipment issued to or used by terminated employees to ensure that all internal information is retrieved or destroyed from the device prior to reuse of the device or issuance to another employee.
AI Justification
The mention of ensuring that internal information is retrieved or destroyed from devices used by terminated employees relates to the physical access control measures that should be in place.

Document Content
Matched Section
Section: Media protection policy and procedures
Content: Control: MP-1: Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of media protection policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to media protection policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of media protection policies and procedures, including the approval process for exceptions, which aligns with the requirements of MP-1.

Document Content
Matched Section
Section: Leaving Test
Content: The IT Department should examine any computing or communications equipment issued to or used by terminated employees to ensure that all internal information is retrieved or destroyed from the device prior to reuse of the device or issuance to another employee.
AI Justification
The text discusses the need to ensure that all internal information is retrieved or destroyed from devices prior to reuse, which aligns with the media sanitization control.

Document Content
Matched Section
Section: Section 1.12 - EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having a physical and environmental protection policy and procedures, including the process for exceptions to the policy.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the need to restrict access and manage privileges upon employee termination, which aligns with enforcing authorizations.

Document Content
Matched Section
Section: Leaving Test
Content: Access privileges of employees should be removed from all systems upon termination.
AI Justification
The section emphasizes the removal of access privileges and changing passwords upon termination, which aligns with account management practices.

Document Content
Matched Section
Section: Labeling of Information
Content: Marking of system hardware components reflects applicable laws, executive orders, directives, policies, regulations, and standards.
AI Justification
The chunk discusses the marking and labeling of hardware components and the classification of information, which aligns with the control regarding labeling of information.

Document Content
Matched Section
Section: Handling of Assets
Content: Components are marked to indicate the impact level or classification level of the system to which the devices are connected, or the impact level or classification level of the information permitted to be output.
AI Justification
The chunk addresses the handling and marking of hardware components, which is relevant to the control concerning the handling of assets.

Document Content
Matched Section
Section: Access Control Policy
Content: Permissions controlling output to the output devices are addressed in AC-3 or AC-4.
AI Justification
The mention of permissions controlling output to devices relates to access control policies.

Document Content
Matched Section
Section: Chunk: 1.12
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for security and privacy, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the importance of control baselines and access control management, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: Network Monitoring & Defense
AI Justification
The mention of network monitoring and defense indicates a need for controls related to access to networks and network services.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the tailoring of controls, which aligns with the need for an access control policy that can be customized based on specific organizational needs.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The tailoring actions mentioned can also apply to access controls related to networks and services, ensuring they meet specific organizational requirements.

Document Content
Matched Section
Section: Access Control Management
Content: Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information.
AI Justification
The text discusses the importance of defining protection needs and the categorization process, which aligns with establishing an access control policy to protect information.

Document Content
Matched Section
Section: Access Control Management
Content: The categorization process is used to make such potential impact determinations.
AI Justification
The mention of categorization and the adverse impact of information compromise suggests the need for proper labeling of information to manage access and protection.

Document Content
Matched Section
Section: Access Control Management
Content: Privacy risk assessments are used to prioritize the risks that are created for individuals from system processing of personally identifiable information.
AI Justification
The text emphasizes the need for controls based on risk assessments, which directly relates to restricting access to sensitive information.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Periodic Information Security Training will be provided to employees and a recording of these sessions will be maintained. Training materials are prepared by Information Security Management. Specialized Information Security Training should be carried out periodically for employees performing security duties as part of their job requirements. Based on roles and responsibilities, training should include, but is not limited to, Information Security Procedures, Proper Use of Information Security Resources and Current Threats to Information Systems.
AI Justification
The chunk discusses periodic information security training for employees, which aligns with the need for organization-wide security and privacy training as outlined in PM-14.

Document Content
Matched Section
Section: Section 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the management of personally identifiable information (PII) during the termination process, ensuring that access is revoked and information is handled properly.

Document Content
Matched Section
Section: Section 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. The employee’s privileges and/or passwords should be changed to prevent access to systems.
AI Justification
The text emphasizes the need to remove access privileges and change passwords upon employee termination, which aligns with account management practices.

Document Content
Matched Section
Section: Managers
Content: Monitor security policy compliance, IT security compliance and performance of assigned
AI Justification
The text discusses the importance of monitoring security roles and responsibilities, which aligns with the continuous monitoring aspect of PM-31.

Document Content
Matched Section
Section: Managers
Content: Review and validate security roles and responsibilities in job descriptions, if applicable.
AI Justification
The mention of reviewing and validating security roles and responsibilities aligns with the account management control.

Document Content
Matched Section
Section: Managers
Content: Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information.
AI Justification
The segregation of conflicting duties to minimize risks aligns with the control's focus on managing remote access.

Document Content
Matched Section
Section: Managers
Content: Review and validate security roles and responsibilities in job descriptions, if applicable. Segregate conflicting duties and areas of responsibility to minimize the risk of theft, fraud, error, and unauthorized changes to information. Ensure that there is enough depth of expertise in critical functions to prevent disruption if unexpected staff changes occur. A primary and an alternate should be assigned to all critical information security functions, and alternates should have the necessary expertise to perform those functions in the event the primary is not available. Ensure that conflicting functions such as data entry, computer operations, network management business system use, system administration, system development, change management, security administration, and security audit are not carried out by the same person. Monitor security policy compliance, IT security compliance and performance of assigned.
AI Justification
The text discusses the importance of defining roles and responsibilities, ensuring expertise in critical functions, and monitoring compliance, which aligns with the need for personnel security policies and procedures.

Document Content
Matched Section
Section: 1.2 SCOPE & APPLICABILITY
Content: This policy is applicable to all Test employees. Third party consultants, contractors and vendors should be held accountable at the same level of security compliance as Test employees.
AI Justification
The section discusses the applicability of security compliance for employees and third-party personnel, which aligns with the need for personnel screening and rescreening activities.

Document Content
Matched Section
Section: 1.3 BACKGROUND CHECKS
Content: 1.3 BACKGROUND CHECKS
AI Justification
The mention of background checks in section 1.3 directly relates to the control's focus on personnel screening activities.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The chunk discusses the importance of managing access privileges and ensuring that terminated employees do not retain access to systems, which aligns with the control's focus on accountability for system-related property.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The chunk emphasizes the removal of access privileges and the responsibilities of administrators in managing user accounts upon termination, which aligns with account management practices.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination. Application Security Administrators (System Administrators) are responsible for disabling IDs in their respective applications.
AI Justification
The text discusses the removal of access privileges and the responsibilities of administrators regarding the termination of employees, which aligns with the requirements for personnel transfers and reassignments.

Document Content
Matched Section
Section: 1.9 LEAVING Test
Content: Access privileges of employees should be removed from all systems upon termination.
AI Justification
The section emphasizes the need to disable accounts and change access privileges upon termination, which aligns with account management practices.

Document Content
Matched Section
Section: 1.8 DISCIPLINARY PROCESS
Content: There should be a formal disciplinary process for employees who violate Test’s Information Security policies and procedures. Disciplinary action should be taken when there is appropriate evidence of a violation. The formal disciplinary process should provide for an appropriate management response that takes into consideration factors such as the nature and gravity of the breach and its impact on business, whether it is a first or repeat offence, whether the violator was properly trained, relevant legislation, business contracts and other factors, as required. Disciplinary actions may include but are not limited to: loss of access privileges to information resources, termination of employment and/or other actions as may be deemed appropriate by HR and the Chief Information Security Officer.
AI Justification
The disciplinary process outlined in the chunk aligns with the need for organizational sanctions that reflect applicable laws and policies, as well as the need for a formal process for violations of information security policies.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: The purpose of this policy is to ensure that appropriate Information Security measures are taken during the employee lifecycle.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information processing and transparency, aligning with the control's focus on these aspects.

Document Content
Matched Section
Section: Section 1.12 - Policy Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures for system and services acquisition, including the need for collaboration between security and privacy programs, which aligns with the SA-1 control.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Periodic Information Security Training will be provided to employees and a recording of these sessions will be maintained. Training materials are prepared by Information Security Management. Specialized Information Security Training should be carried out periodically for employees performing security duties as part of their job requirements.
AI Justification
The chunk discusses the provision of periodic information security training to employees, which aligns with the need for training as outlined in SA-16.

Document Content
Matched Section
Section: 1.2 SCOPE & APPLICABILITY
Content: This policy is applicable to all Test employees. Third party consultants, contractors and vendors should be held accountable at the same level of security compliance as Test employees.
AI Justification
The section discusses the need for background checks and responsibilities for ensuring security, which aligns with personnel screening requirements.

Document Content
Matched Section
Section: 1.2 SCOPE & APPLICABILITY
Content: Third party consultants, contractors and vendors should be held accountable at the same level of security compliance as Test employees.
AI Justification
The mention of third-party consultants and contractors implies a need for developer screening to ensure trustworthiness and compliance.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Periodic Information Security Training will be provided to employees and a recording of these sessions will be maintained. Training materials are prepared by Information Security Management. Specialized Information Security Training should be carried out periodically for employees performing security duties as part of their job requirements.
AI Justification
The chunk discusses the provision of periodic information security training for employees, which aligns with the requirement for security awareness training.

Document Content
Matched Section
Section: 1.7 INFORMATION SECURITY EDUCATION & TRAINING
Content: Based on roles and responsibilities, training should include, but is not limited to, Information Security Procedures, Proper Use of Information Security Resources and Current Threats to Information Systems.
AI Justification
The chunk mentions specialized information security training based on roles and responsibilities, which aligns with role-based security training requirements.

Document Content
Matched Section
Section: Access Control Management
Content: Access Control Management
AI Justification
The text discusses the importance of access control management and the need for documentation and requirements related to security and privacy, which aligns with the Access Control Policy.

Document Content
Matched Section
Section: Access to Networks & Network Services
Content: Access to Networks & Network Services
AI Justification
The mention of controls and their implementation in the context of network services aligns with the need for access control to networks.

Document Content
Matched Section
Section: System and communications protection policy and procedures
Content: System and communications protection policy and procedures address the controls in the SC family that are implemented within systems and organizations.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Confidentiality or Non-Disclosure Agreements
Content: Securing Application Services on Public Networks Protecting Application Services Transactions NIST SP 800-53 Rev 5 Access Control | Information Flow Enforcement
AI Justification
The chunk discusses the importance of security and privacy attributes in relation to access control and information flow, which aligns with the definition provided in control SC-16.
anonymized_11.0_IS_Operations_Security_Policy.pdf NIST
169 matches found

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures related to access control and the need for formal documentation and authorization, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: business unit security officers to ensure that help desk and support personnel are adequately trained to handle business application specific events.
Content: business unit security officers to ensure that help desk and support personnel are adequately trained to handle business application specific events. In addition, escalation procedures should be documented to ensure that notification of virus activity is enough to minimize virus spread.
AI Justification
The section discusses the need for adequate training and procedures to handle security incidents related to mobile devices, which aligns with the control's focus on protecting mobile devices.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text discusses the need for documented operating procedures and access restrictions, which aligns with the principles of access control and the management of nonpublic information.

Document Content
Matched Section
Section: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the review of logs and the protection of sensitive data, which aligns with the need to prevent unauthorized data mining activities.

Document Content
Matched Section
Section: Detailed analysis of these logs should be used to update and modify security controls.
Content: Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The mention of analyzing logs for security-related events and potential incidents aligns with monitoring for unauthorized data mining activities.

Document Content
Matched Section
Section: REQUIREMENT Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication. b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential. c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals. d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The chunk discusses the need for documented operating procedures and access restrictions to ensure that only authorized personnel can access sensitive information and tools, aligning with the principles of access control policies.

Document Content
Matched Section
Section: 1.2 REQUIREMENT
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the enforcement of access control policies and the mechanisms that ensure only authorized personnel can access certain information and tools, aligning with the requirements of AC-25.

Document Content
Matched Section
Section: 1.2 REQUIREMENT
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The section mentions that access to operating procedures and tools should be restricted to authorized individuals, which aligns with the principles of account management.

Document Content
Matched Section
Section: 1.2 REQUIREMENT
Content: d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The restriction on the possession and use of certain tools aligns with the control's focus on managing remote access and ensuring that only authorized personnel have access to sensitive tools.

Document Content
Matched Section
Section: Firewall Security
Content: Firewalls should be established to protect internal/external network connections, and the information that traverses them, from vulnerabilities and exposures to unauthorized access.
AI Justification
The text discusses the importance of controlling the flow of information within and between systems, which aligns with the requirements of AC-4.

Document Content
Matched Section
Section: Scope & Applicability
Content: System and application managers should be granted the minimum level of access privileges required to perform their job functions and should adhere to formal procedures when working with all Information Resources. Additionally, operational duties should be segregated in accordance with a user's role and responsibilities.
AI Justification
The text discusses the segregation of operational duties based on a user's role and responsibilities, which aligns with the principle of separation of duties to mitigate risks.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: System and application managers should be granted the minimum level of access privileges required to perform their job functions and should adhere to formal procedures when working with all Information Resources.
AI Justification
The text emphasizes granting minimum access privileges necessary for job functions, aligning with the principle of least privilege.

Document Content
Matched Section
Section: 1.3 ROLES AND RESPONSIBILITIES
Content: Role Responsibility IT Management l Responsible for developing and maintaining operating procedures. l Responsible for implementation of the policy. Resource Administrator l Responsible for reviewing event logs periodically. l Responsible for installing available patches on the Information Resources in a timely fashion. l Responsible for installing and hardening the resulting software when deploying off-the-shell software. l Responsible for performing periodic back-ups of the Information Resources they have been assigned. Business Unit Security Officer l Responsible for assessing and providing exceptional approvals for the policy. l Responsible for ensuring that help desk and support personnel are adequately trained. l Responsible for immediately notifying any Test personnel and third parties who could be affected by an intrusion or malicious code activity.
AI Justification
The text discusses the importance of role-based training tailored to the responsibilities of various roles within an organization, which aligns with the requirements of AT-3.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures, which aligns with the need for audit and accountability policies and procedures that are implemented within systems and organizations.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with access control policies and procedures.

Document Content
Matched Section
Section: b) Information owners should only grant privileged access to developers on a need-to-use basis.
Content: b) Information owners should only grant privileged access to developers on a need-to-use basis. Privileged access should only be used to support specific incidents or problems and those accounts should be limited, monitored and disabled upon termination of the requested tasks.
AI Justification
The text discusses the need for controlled access to information and the management of privileged access, which relates to the management of security and privacy attributes.

Document Content
Matched Section
Section: Section g
Content: Test personnel, third party consultants, contractors and vendors should not intentionally write, generate, compile, copy, collect, propagate, execute or attempt to introduce any computer code designed to self-replicate, damage or otherwise hinder the performance of, or access to, any Test information resource. If such activity is verified, it is grounds for disciplinary action, up to and including immediate termination. Where the use of mobile code is authorized, the configuration should ensure that the authorized mobile code operates according to a clearly defined security policy, and unauthorized mobile code should be prevented from executing.
AI Justification
The chunk discusses the handling and restrictions of mobile code, including the prevention of unauthorized mobile code execution, which aligns with the requirements of SC-18.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the need for documented operating procedures and access controls, which aligns with the requirement for privileged user access and separation of user functions from system management functions.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The requirement for access to operating procedures and tools to be restricted to authorized personnel aligns with the need for separation of system management functions from user functions.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text discusses access restrictions to operating procedures and tools, which aligns with access enforcement controls.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The text emphasizes restricting access to certain tools and software to authorized personnel, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: Software Monitoring and Cyber Security Incident Response Plan
Content: software installed and active. This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in "auto-protect", "full-time" or "real-time" mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative. This software should be chosen from Test's Approved Products list. f) A formal Cyber Security Incident Response Plan (CSIRP) should be documented and communicated to IT, the help desk and all support personnel informing them of their responsibilities when malicious code-related activity is reported. It is the responsibility of
AI Justification
The chunk discusses software that continuously monitors for malicious code, which aligns with the control's focus on identifying external malicious code.

Document Content
Matched Section
Section: REQUIREMENT - Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication. b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential. c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals. d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The chunk discusses access restrictions and the need for authorization for operating procedures and tools, aligning with the concept of usage restrictions outlined in SC-43.

Document Content
Matched Section
Section: Monitoring for Malicious Code
Content: software installed and active. This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in "auto-protect", "full-time" or "real-time" mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative.
AI Justification
The chunk discusses software that monitors for malicious code, which aligns with the purpose of detonation chambers to identify and mitigate threats in a controlled environment.

Document Content
Matched Section
Section: External and internal requirements for time representation, synchronization and accuracy
Content: a) External and internal requirements for time representation, synchronization and accuracy should be considered. Such requirements can be legal, regulatory, contractual requirements, standards compliance, or requirements for internal monitoring. A standard reference time for use within the organization should be defined.
AI Justification
The chunk discusses the importance of time representation, synchronization, and accuracy, which aligns with the control's focus on time synchronization for system services.

Document Content
Matched Section
Section: A network time protocol should be used to keep all the servers in synchronization with the master clock.
Content: c) A network time protocol should be used to keep all the servers in synchronization with the master clock.
AI Justification
The mention of using a network time protocol to synchronize servers directly relates to the control's emphasis on time synchronization.

Document Content
Matched Section
Section: Network Administration and its designees will centrally monitor all intrusion sensors and respond to alarms appropriately.
Content: malicious activity. Network Administration and its designees will centrally monitor all intrusion sensors and respond to alarms appropriately.
AI Justification
The text discusses the monitoring of intrusion sensors and responding to alarms, which aligns with the need to detect adversarial movements and activities.

Document Content
Matched Section
Section: Control: SC-8: Protecting the confidentiality and integrity of transmitted information
Content: Control: SC-8: Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios. Unprotected communication paths are exposed to the possibility of interception and modification. Protecting the confidentiality and integrity of information can be accomplished by physical or logical means. Physical protection can be achieved by using protected distribution systems. A protected distribution system is a wireline or fiber-optics telecommunications system that includes terminals and adequate electromagnetic, acoustical, electrical, and physical controls to permit its use for the unencrypted transmission of classified information. Logical protection can be achieved by employing encryption techniques.
AI Justification
The text discusses protecting the confidentiality and integrity of transmitted information, which aligns directly with the SC-8 control.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the importance of documented operating procedures and policies related to system integrity, which aligns with the requirements of SI-1.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential. c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The section discusses access control to operating procedures and tools, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing logs for sensitive data and ensuring that error messages do not expose exploitable information, which aligns with the control's focus on the structure and content of error messages.

Document Content
Matched Section
Section: e) Event logs can contain sensitive data and personally identifiable information.
Content: Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The mention of event logs containing sensitive data and personally identifiable information aligns with the control's emphasis on handling error conditions and protecting sensitive information.

Document Content
Matched Section
Section: Protection of log information
Content: Certain records should be archived in accordance with Test’s records retention
AI Justification
The chunk discusses the importance of reviewing logs and retaining certain records, which aligns with the information management and retention requirements outlined in SI-12.

Document Content
Matched Section
Section: Disaster Recovery Plans and Backup Procedures
Content: Formal disaster recovery plans for each mission-critical Test application will be developed, documented, and tested periodically.
AI Justification
The chunk discusses backup processes and disaster recovery plans, which relate to failure conditions and the necessary procedures to recover from such failures.

Document Content
Matched Section
Section: Section d) and e)
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls. Resource Administrators should use the classification and/or analysis definitions within IT policy to determine the appropriate response to any potential incident or event that needs to be escalated. This includes security related events, capacity or performance warnings or other events that could indicate an issue. Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The chunk discusses the importance of reviewing logs that may contain personally identifiable information and the need for appropriate privacy protection measures, which aligns with ensuring the quality and accuracy of personally identifiable information.

Document Content
Matched Section
Section: Technical Vulnerability Management
Content: The purpose of a patch management system is to highlight, classify and prioritize any missing patches on an asset.
AI Justification
The text discusses the management of technical vulnerabilities and the need for a patch management system, which aligns with the requirements for flaw remediation as outlined in control SI-2.

Document Content
Matched Section
Section: Anti-Virus, Hostile, and Malicious Code Security
Content: All Test servers, workstations and laptops should have approved virus detection or integrity software installed and active. This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in 'auto-protect', 'full-time' or 'real-time' mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative.
AI Justification
The text discusses the requirement for virus detection and integrity software to monitor systems for malicious code, which aligns with the control's focus on protecting against malicious code.

Document Content
Matched Section
Section: requirements for maintaining evidence
Content: requirements for maintaining evidence. b) System logs need to be protected, because if the data can be modified or data in them deleted, their existence may create a false sense of security. Real-time copying of logs to a system outside the control of a system administrator or operator can be used to safeguard logs. Administrator and operator logs a) Test should establish controls to protect the log information of privileged users such as system administrators and system operators, which will help in maintaining accountability. The privileged account holders should be prevented from manipulating the logs generated from information processing facilities. b) Test should establish intrusion detection controls to monitor the system and network administration activities conducted by the administrators. c) Intrusion detection devices approved by the Head of Network Administration, or Information Security Manager, will be utilized to monitor all inbound traffic for suspicious and potentially
AI Justification
The chunk discusses the importance of protecting system logs and establishing controls for monitoring system and network administration activities, which aligns with the objectives of system monitoring.

Document Content
Matched Section
Section: Monitoring and Response to Malicious Activity
Content: This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in 'auto-protect', 'full-time' or 'real-time' mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative.
AI Justification
The chunk discusses the need for software to monitor systems for malicious activity, which aligns with the integrity-checking mechanisms mentioned in control SI-7.

Document Content
Matched Section
Section: h) Business unit security officers and IT team are responsible for developing, implementing, maintaining and communicating controls to protect against malware...
Content: h) Business unit security officers and IT team are responsible for developing, implementing, maintaining and communicating controls to protect against malware to limit the introduction and spread of computer viruses, worms, Trojan Horses, spam, spyware, malware, and denial of service attacks, etc., within Test¢s computing environments.
AI Justification
The text discusses responsibilities for developing and implementing controls to protect against malware, including spam, which aligns with the control's focus on system entry and exit points and spam protection mechanisms.

Document Content
Matched Section
Section: j) Test should assure that SPAM protection as part of its email infrastructure.
Content: j) Test should assure that SPAM protection as part of its email infrastructure.
AI Justification
The mention of spam protection as part of the email infrastructure directly relates to the control's focus on spam and its transport mechanisms.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organizations.
AI Justification
The text discusses the importance of having a supply chain risk management policy and procedures that address various controls, which aligns directly with SR-1.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Events that may precipitate an update to supply chain risk management policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The mention of establishing procedures for security and privacy programs and the overall discussion of supply chain risk management aligns with the requirements of SR-2.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Supply Chain Risk Management | Supply Chain Risk Management Plan
AI Justification
The text discusses the importance of managing supply chain risks, including the development and implementation of tailored SCRM plans, which aligns directly with the control's focus on supply chain risk management.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Supply chain elements include organizations, entities, or tools employed for the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of systems and system components. Supply chain processes include hardware, software, and firmware development processes; shipping and handling procedures; personnel security and physical security programs; configuration management tools, techniques, and measures to maintain provenance; or other programs, processes, or procedures associated with the development, acquisition, maintenance and disposal of systems and system components.
AI Justification
The text discusses the importance of supply chain elements and processes, highlighting vulnerabilities that can affect the organization's operations, which aligns with the control's focus on managing supply chain risks.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Supply Chain Risk Management | Supply Chain Risk Management Plan
AI Justification
The mention of supply chain risk management plans indicates a structured approach to identifying and mitigating risks associated with supply chain vulnerabilities.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or system component, using blind or filtered buys, requiring tamper-evident packaging, or using trusted or controlled distribution.
AI Justification
The text discusses various strategies and tools for protecting the supply chain, which aligns with the objectives of supply chain risk management.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: The results from a supply chain risk assessment can guide and inform the strategies, tools, and methods that are most applicable to the situation.
AI Justification
The mention of supply chain risk assessments and the need for strategies to mitigate risks aligns with the objectives of SR-2.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: The establishment of agreements and procedures facilitates communications among supply chain entities. Early notification of compromises and potential compromises in the supply chain that can potentially adversely affect or have adversely affected organizational systems or system components is essential for organizations to effectively respond to such incidents.
AI Justification
The text discusses the importance of establishing agreements and procedures for communication among supply chain entities, which aligns with the objectives of supply chain risk management.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: The results of assessments or audits may include open-source information that contributed to a decision or result and could be used to help the supply chain entity resolve a concern or improve its processes.
AI Justification
The mention of assessments or audits and their results contributing to decision-making aligns with the need for a structured supply chain risk management plan.

Document Content
Matched Section
Section: Section d) Resource Administrators should regularly review the logs (audit trail logs)
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the review of audit trail logs and the importance of analyzing these logs for security incidents, which aligns with the session auditing control.

Document Content
Matched Section
Section: Section e) Event logs can contain sensitive data and personally identifiable information.
Content: Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The chunk mentions the need for detailed analysis of logs and the protection of sensitive data, which aligns with monitoring and logging controls.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing audit logs and maintaining their integrity, which aligns with the need for a coordinated approach to audit logging across organizations.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing logs and analyzing them for security control updates, which aligns with the need for logging significant events as outlined in AU-2.

Document Content
Matched Section
Section: e) Event logs can contain sensitive data and personally identifiable information.
Content: e) Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The mention of sensitive data and personally identifiable information in event logs indicates a need for controls regarding the content of audit records.

Document Content
Matched Section
Section: This includes security related events, capacity or performance warnings or other events that could indicate an issue.
Content: This includes security related events, capacity or performance warnings or other events that could indicate an issue. Escalation procedures should be followed to notify appropriate personnel.
AI Justification
The requirement for escalation procedures in response to potential incidents or events aligns with the need to respond to audit processing failures.

Document Content
Matched Section
Section: Section d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The text discusses the importance of reviewing and analyzing audit logs, which relates to the allocation of audit log storage capacity to prevent loss of logging capability.

Document Content
Matched Section
Section: Section d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing audit logs, which aligns with the need to ensure that audit records contain necessary information to support auditing functions.

Document Content
Matched Section
Section: Section e) Event logs can contain sensitive data and personally identifiable information.
Content: Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The mention of sensitive data and personally identifiable information in event logs highlights the need for careful consideration of what is recorded in audit trails, which is a key aspect of AU-3.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the review of audit logs and the importance of analyzing these logs to update security controls, which aligns with the requirements for managing audit logging process failures.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the regular review and analysis of audit trail logs by Resource Administrators, which aligns with the requirements for audit record review and reporting.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Cross-Organizational Audit Logging
AI Justification
The chunk discusses the processes involved in audit logging and the importance of audit record reduction, which aligns directly with the AU-7 control.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Session Audit
AI Justification
The chunk discusses audit information and its protection, which aligns with the requirements of AU-9.

Document Content
Matched Section
Section: Audit & Accountability | Cross-Organizational Audit Logging
Content: Audit & Accountability | Cross-Organizational Audit Logging
AI Justification
The mention of audit logging and session audit relates to the need for auditable events as described in AU-14.

Document Content
Matched Section
Section: External and internal requirements for time representation, synchronization and accuracy
Content: a) External and internal requirements for time representation, synchronization and accuracy should be considered. Such requirements can be legal, regulatory, contractual requirements, standards compliance, or requirements for internal monitoring. A standard reference time for use within the organization should be defined.
AI Justification
The chunk discusses the importance of time representation, synchronization, and accuracy, which aligns with the requirements for time stamps generated by the system.

Document Content
Matched Section
Section: Test’s approach to obtaining a reference time from external source(s) and how to synchronize internal clocks reliably should be documented and implemented.
Content: c) A network time protocol should be used to keep all the servers in synchronization with the master clock.
AI Justification
The mention of using a network time protocol to synchronize servers aligns with the control's focus on time synchronization.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the importance of documented operating procedures and their maintenance, which aligns with the need for policies and procedures in the CA family.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text specifies that access to tools required for system audits should be restricted to authorized individuals, which aligns with access enforcement controls.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The text mentions restrictions on the possession and use of certain tools to designated and authorized personnel, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: Roles and Responsibilities
Content: IT Management l Responsible for developing and maintaining operating procedures. l Responsible for implementation of the policy. Resource Administrator l Responsible for reviewing event logs periodically. l Responsible for installing available patches on the Information Resources in a timely fashion. l Responsible for installing and hardening the resulting software when deploying off-the-shell software. l Responsible for performing periodic back-ups of the Information Resources they have been assigned. Business Unit Security Officer l Responsible for assessing and providing exceptional approvals for the policy.
AI Justification
The text discusses the roles and responsibilities of various personnel, including the IT Management and Business Unit Security Officer, in relation to policy implementation and security oversight, which aligns with the concept of authorizations and accountability outlined in CA-6.

Document Content
Matched Section
Section: Continuous Monitoring of Systems
Content: This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in 'auto-protect', 'full-time' or 'real-time' mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative.
AI Justification
The chunk discusses the need for software that continuously monitors systems for malicious activities, which aligns with the concept of continuous monitoring outlined in control CA-7.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and their maintenance, which aligns with the need for configuration management policies and procedures.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text mentions restricting access to tools required for system audits to authorized individuals, which aligns with account management controls.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The restriction on the possession and use of certain software tools to designated personnel aligns with access enforcement controls.

Document Content
Matched Section
Section: Restrictions on software installations
Content: The installation of software on Test-owned or leased Information Resources by unauthorized personnel is prohibited. Test should define, document and establish a strict policy that states the types of software users can install.
AI Justification
The text discusses the need for approval for software acquisition and implementation, as well as the establishment of a strict policy regarding the types of software users can install, aligning with the control's focus on governing user-installed software.

Document Content
Matched Section
Section: Section d) and e)
Content: Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls. Resource Administrators should use the classification and/or analysis definitions within IT policy to determine the appropriate response to any potential incident or event that needs to be escalated. This includes security related events, capacity or performance warnings or other events that could indicate an issue. Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The chunk discusses the handling of logs that may contain sensitive data and personally identifiable information, which aligns with the control's focus on processing personally identifiable information throughout its life cycle.

Document Content
Matched Section
Section: Restrictions on software installations
Content: The installation of software on Test-owned or leased Information Resources by unauthorized personnel is prohibited. Test should define, document and establish a strict policy that states the types of software users can install.
AI Justification
The text discusses the approval and restrictions on software installations, which aligns with the control's focus on preventing unauthorized software installation and ensuring that software is signed and verified.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Control: CM-2: Baseline configurations for systems and system components include connectivity, operational, and communications aspects of systems. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for systems or configuration items within those systems.
AI Justification
The text discusses the importance of baseline configurations for systems, including documentation, review, and specifications, which aligns directly with the control CM-2.

Document Content
Matched Section
Section: Configuration Management | Access Restrictions for Change
Content: Configuration Management | Access Restrictions for Change
AI Justification
The chunk discusses configuration management and access restrictions for changes, which aligns with the systematic proposal and management of configuration changes as described in CM-3.

Document Content
Matched Section
Section: System & Services Acquisition | Developer Configuration
Content: System & Services Acquisition | Developer Configuration
AI Justification
The mention of developer configuration aligns with the need for managing changes in system configurations, particularly in the context of new systems or major upgrades.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The section discusses the need for documented operating procedures and access restrictions for authorized personnel, which aligns with the control's focus on managing changes to systems.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes access restrictions to operating procedures and tools, which aligns with the need for enforcing access controls.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The mention of restricting access to tools and procedures to authorized individuals aligns with the need for physical access controls.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration settings are the parameters that can be changed in the hardware, software, or firmware components of the system that affect the security and privacy posture or functionality of the system.
AI Justification
The chunk discusses the importance of configuration settings and their impact on security and privacy, aligning directly with the definition of CM-6.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Organizations establish organization-wide configuration settings and subsequently derive specific configuration settings for systems.
AI Justification
The mention of establishing organization-wide configuration settings and deriving specific settings aligns with the concept of baseline configuration.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Common secure configurations provide recognized, standardized, and established benchmarks that stipulate secure configuration settings for information technology products.
AI Justification
The discussion of secure configurations and their implementation relates to the processes and procedures for protecting information.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and their maintenance, which aligns with the need for contingency planning policies and procedures.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Control: CM-9: Configuration management activities occur throughout the system development life cycle. As such, there are developmental configuration management activities (e.g., the control of code and software libraries) and operational configuration management activities (e.g., control of installed components and how the components are configured). Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual systems.
AI Justification
The text discusses configuration management activities throughout the system development life cycle, including the creation and implementation of configuration management plans.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Configuration management plans define processes and procedures for how configuration management is used to support system development life cycle activities.
AI Justification
The text mentions the importance of maintaining component inventories and controlling development, test, and operational environments, which aligns with baseline configuration management.

Document Content
Matched Section
Section: Contingency Planning and Recovery Procedures
Content: Formal disaster recovery plans for each mission-critical Test application will be developed, documented, and tested periodically.
AI Justification
The text discusses the development and testing of disaster recovery plans, which aligns with the need for recovery and reconstitution activities outlined in CP-10.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan Testing
Content: Contingency Planning | Contingency Plan Testing
AI Justification
The chunk mentions contingency planning and testing, which aligns with the need for contingency plans and associated training or testing.

Document Content
Matched Section
Section: Contingency Planning | Alternate Storage Site
Content: Contingency Planning | Alternate Storage Site
AI Justification
The mention of alternate storage site relates to establishing resilience in organizational systems, which is a key aspect of CP-11.

Document Content
Matched Section
Section: Contingency Planning | System Backup
Content: Contingency Planning | System Backup
AI Justification
System backup is a critical component of contingency planning, ensuring that alternate communication protocols can be supported.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan Testing
Content: Contingency Planning | Contingency Plan Testing
AI Justification
This control aligns with the need for alternative security mechanisms to ensure mission and business continuity.

Document Content
Matched Section
Section: Contingency Planning | Alternate Storage Site
Content: Contingency Planning | Alternate Storage Site
AI Justification
This control supports the implementation of alternative mechanisms for data recovery and continuity.

Document Content
Matched Section
Section: Contingency Planning | System Backup
Content: Contingency Planning | System Backup
AI Justification
This control is relevant as it relates to maintaining operations through backup systems.

Document Content
Matched Section
Section: 1.3 ROLES AND RESPONSIBILITIES
Content: Role Responsibility IT Management l Responsible for developing and maintaining operating procedures. l Responsible for implementation of the policy. Resource Administrator l Responsible for reviewing event logs periodically. l Responsible for installing available patches on the Information Resources in a timely fashion. l Responsible for installing and hardening the resulting software when deploying off-the-shell software. l Responsible for performing periodic back-ups of the Information Resources they have been assigned. Business Unit Security Officer l Responsible for assessing and providing exceptional approvals for the policy. l Responsible for ensuring that help desk and support personnel are adequately trained. l Responsible for immediately notifying any Test personnel and third parties who could be affected by an intrusion or malicious code activity.
AI Justification
The text discusses the roles and responsibilities of personnel in relation to contingency training, which aligns with the requirement for training to be linked to assigned roles and responsibilities.

Document Content
Matched Section
Section: Contingency Planning
Content: Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restoration and implementation of alternative mission or business processes when systems are compromised or breached.
AI Justification
The text discusses the importance of contingency planning in maintaining continuity of operations and addresses system restoration and alternative processes when systems are compromised.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan Testing
Content: By coordinating contingency planning with incident handling activities, organizations ensure that the necessary planning activities are in place and activated in the event of an incident.
AI Justification
The text mentions the need for contingency plans to be coordinated with incident handling activities, which implies the necessity of testing these plans.

Document Content
Matched Section
Section: Contingency Planning | Alternate Storage Site
Content: Systems can be designed for redundancy, to provide backup capabilities, and for resilience.
AI Justification
The text refers to backup capabilities and alternate processes, which aligns with the concept of having alternate storage sites for data recovery.

Document Content
Matched Section
Section: Contingency Planning | System Backup
Content: Contingency plans reflect the degree of restoration required for organizational systems since not all systems need to fully recover to achieve the level of continuity of operations desired.
AI Justification
The text discusses system restoration and backup capabilities, which directly relates to the need for system backups.

Document Content
Matched Section
Section: Contingency Planning | Alternate Storage Site
Content: Contingency Planning | Alternate Storage Site
AI Justification
The chunk discusses the importance of alternate storage sites and their role in maintaining essential mission and business functions despite disruptions.

Document Content
Matched Section
Section: Data Backup
Content: Test management should collaborate with Asset owners to identify backup and restoration requirements of all data, applications, operating systems, databases, user configurations and hardware configurations in line with legal and regulatory implications.
AI Justification
The section discusses the requirements for data backup and restoration, aligning with the need to protect system-level and user-level information as outlined in CP-9.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented policies and procedures for identification and authentication, which aligns with the requirements for formal documentation and access control.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The chunk emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the management of authenticators, including the need for documented procedures and access restrictions, which aligns with the requirements for authenticator management.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text mentions that access to operating procedures and tools should be restricted to authorized individuals, which aligns with access enforcement controls.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: System and application managers should be granted the minimum level of access privileges required to perform their job functions and should adhere to formal procedures when working with all Information Resources.
AI Justification
The text discusses the need for access privileges and adherence to formal procedures, which aligns with the requirement for authentication mechanisms to ensure that operators are authorized to perform their roles.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: Organizations recognize that incident response capabilities are dependent on the capabilities of organizational systems and the mission and business processes being supported by those systems. Organizations consider incident response as part of the definition, design, and development of mission and business processes and systems.
AI Justification
The text discusses the importance of incident response capabilities and their integration into organizational systems and processes, which aligns directly with the intent of control IR-4.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Response to Information Security Incidents
AI Justification
The chunk discusses the documentation of incidents, including maintaining records about each incident and evaluating incident details, which aligns with the requirements of control IR-5.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: IR-4
AI Justification
The mention of IR-4 in the chunk indicates that it relates to the types of incidents appropriate for monitoring, which aligns with the control's focus.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and maintenance policies, emphasizing the need for formal documentation and authorization by IT management.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented policies and procedures for media protection, which aligns with the requirements for media protection policy and procedures outlined in control MP-1.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with the requirements for access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The chunk discusses access restrictions to operating procedures and tools, which aligns with the control's focus on restricting access to both digital and non-digital media.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The chunk emphasizes the need to restrict access to tools and operating procedures to authorized individuals, which aligns with the access enforcement control.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Session Audit Audit & Accountability | Cross-Organizational Audit Logging AU-14 AU-16 PR.PT-2 CIS CSC 3 10 A.8.2.1 A.8.2.2 A.8.2.3 A.8.3.1 A.8.3.3 Data Protection Malware Defenses ISO/IEC 27001:2013 Classification of Information Labeling of Information Handling of Assets Management of Removable Media Physical Media Transfer A.11.2.9 Clear Desk & Clear Screen Policy NIST SP 800-53 Rev 5 MP-1 MP-2 MP-3 Media Protection | Policy & Procedure Media Protection | Media Access Media Protection | Media Marking
AI Justification
The chunk discusses security marking and the application of security attributes to various types of media, which aligns directly with the definition of MP-3.

Document Content
Matched Section
Section: Media Protection | Policy & Procedure
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs.
AI Justification
The section discusses the importance of having policies and procedures in place for the protection of media, which aligns with the control's focus on establishing a media protection policy.

Document Content
Matched Section
Section: Media Protection | Media Access
Content: Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media.
AI Justification
The text emphasizes the need for controlled access to stored media, which is a key aspect of media access control.

Document Content
Matched Section
Section: Media Protection | Media Marking
Content: The type of media storage is commensurate with the security category or classification of the information on the media.
AI Justification
The mention of classification and secure storage aligns with the need for proper marking of media based on its classification.

Document Content
Matched Section
Section: Media Protection | Policy & Procedure
Content: Control: MP-7: System media includes both digital and non-digital media. Digital media includes diskettes, magnetic tapes, flash drives, compact discs, digital versatile discs, and removable hard disk drives. Non-digital media includes paper and microfilm. Media use protections also apply to mobile devices with information storage capabilities.
AI Justification
The section discusses the policies and procedures related to the protection and management of media, including restrictions on the use of certain types of media.

Document Content
Matched Section
Section: Media Protection | Media Access
Content: Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports or disabling or removing the ability to insert, read, or write to such devices.
AI Justification
The section outlines the restrictions on access to media, particularly regarding portable storage devices and the implementation of technical and non-technical controls.

Document Content
Matched Section
Section: Media Protection | Media Marking
Content: Requiring identifiable owners for storage devices reduces the risk of using such devices by allowing organizations to assign responsibility for addressing known vulnerabilities in the devices.
AI Justification
The section implies the need for identifiable ownership and responsibility for storage devices, which relates to the marking and classification of media.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and their maintenance, which aligns with the need for policies and procedures in physical and environmental protection.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The chunk discusses the need for access restrictions to operating procedures and tools, aligning with the requirement to enforce authorizations for access to system components.

Document Content
Matched Section
Section: NIST CSF
Content: PE-9: Organizations determine the types of protection necessary for the power equipment and cabling employed at different locations that are both internal and external to organizational facilities and environments of operation.
AI Justification
The control PE-9 directly addresses the need for organizations to determine the types of protection necessary for power equipment and cabling, which aligns with the content provided in the chunk.

Document Content
Matched Section
Section: Section d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls. Resource Administrators should use the classification and/or analysis definitions within IT policy to determine the appropriate response to any potential incident or event that needs to be escalated. This includes security related events, capacity or performance warnings or other events that could indicate an issue. Escalation procedures should be followed to notify appropriate personnel.
AI Justification
The chunk discusses the review and analysis of audit trail logs, which aligns with the requirement for auditing events and maintaining logs for security purposes.

Document Content
Matched Section
Section: Section e) Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
Content: e) Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The chunk mentions that event logs can contain sensitive data and personally identifiable information, which aligns with the control that addresses the content of audit records.

Document Content
Matched Section
Section: Section d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls. Resource Administrators should use the classification and/or analysis definitions within IT policy to determine the appropriate response to any potential incident or event that needs to be escalated. This includes security related events, capacity or performance warnings or other events that could indicate an issue. Escalation procedures should be followed to notify appropriate personnel.
AI Justification
The mention of escalation procedures for security-related events aligns with the need to respond to audit processing failures and incidents.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and their maintenance, which aligns with the planning and policy aspect of control PL-1.

Document Content
Matched Section
Section: Control: PL-11
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns with the control's focus on customizing baseline controls.

Document Content
Matched Section
Section: CM-1
Content: Configuration Management | Policy & Procedures
AI Justification
The mention of developing security and privacy plans reflects the need for policies and procedures in configuration management.

Document Content
Matched Section
Section: CM-2
Content: Configuration Management | Baseline Configuration
AI Justification
The text refers to customizing control baselines, which is directly related to baseline configuration management.

Document Content
Matched Section
Section: CM-3
Content: Configuration Management | Configuration Change Control
AI Justification
The discussion of applying scoping considerations and selecting compensating controls relates to managing changes in configurations.

Document Content
Matched Section
Section: i) Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus, worm, Trojan horse, malware, etc.
Content: i) Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus, worm, Trojan horse, malware, etc. This training information should be included in the overall training and awareness program that is the responsibility of Information Security.
AI Justification
The chunk discusses the training of company personnel in proper procedures for using virus detection software, which aligns with the need for role-based training programs for individuals assigned security roles.

Document Content
Matched Section
Section: h) Business unit security officers and IT team are responsible for developing, implementing, maintaining and communicating controls to protect against malware...
Content: h) Business unit security officers and IT team are responsible for developing, implementing, maintaining and communicating controls to protect against malware to limit the introduction and spread of computer viruses, worms, Trojan Horses, spam, spyware, malware, and denial of service attacks, etc., within Test¢s computing environments. They are also responsible for reviewing and selecting approved virus detection software to be used by Test.
AI Justification
The text discusses the responsibilities of business unit security officers and IT teams in developing and implementing controls, as well as the training of personnel in proper procedures for using virus detection software, which aligns with the need for organization-wide security and privacy training and monitoring.

Document Content
Matched Section
Section: i) Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus...
Content: i) Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus, worm, Trojan horse, malware, etc. This training information should be included in the overall training and awareness program that is the responsibility of Information Security.
AI Justification
The mention of training personnel in proper procedures for using virus detection software aligns with the need for coordinated training activities across the organization.

Document Content
Matched Section
Section: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible.
Content: d) Resource Administrators should regularly review the logs (audit trail logs) regularly of all production Information Resources for which they are responsible. Detailed analysis of these logs should be used to update and modify security controls.
AI Justification
The chunk discusses the importance of reviewing logs and maintaining an audit trail, which aligns with the purpose of accounting for disclosures of personally identifiable information.

Document Content
Matched Section
Section: e) Event logs can contain sensitive data and personally identifiable information.
Content: e) Event logs can contain sensitive data and personally identifiable information. Appropriate privacy protection measures should be taken.
AI Justification
The mention of event logs containing sensitive data and personally identifiable information highlights the need for proper accounting and protection measures.

Document Content
Matched Section
Section: System & Services Acquisition | Customized Development of Critical Components
Content: Control: PM-30: An organization-wide supply chain risk management strategy includes an unambiguous expression of the supply chain risk appetite and tolerance for the organization, acceptable supply chain risk mitigation strategies or controls, a process for consistently evaluating and monitoring supply chain risk, approaches for implementing and communicating the supply chain risk management strategy, and the associated roles and responsibilities.
AI Justification
The text discusses the organization-wide supply chain risk management strategy, including risk appetite, mitigation strategies, and roles and responsibilities, which aligns directly with control PM-30.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: The supply chain risk management strategy is implemented at the organization and mission/business levels, whereas the supply chain risk management plan (see SR-2) is implemented at the system level.
AI Justification
The mention of the supply chain risk management plan (SR-2) indicates a direct alignment with the control regarding the implementation of supply chain risk management strategies at the system level.

Document Content
Matched Section
Section: NIST CSF
Content: Control: PM-8: Protection strategies are based on the prioritization of critical assets and resources. The requirement and guidance for defining critical infrastructure and key resources and for preparing an associated critical infrastructure protection plan are found in applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.
AI Justification
The text discusses the prioritization of critical assets and resources, which aligns with the requirements of PM-8.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented operating procedures and the need for policies and procedures to be established and maintained, which aligns with the requirements of personnel security policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The chunk emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The restriction of access to tools required for system audits to authorized individuals aligns with access enforcement controls.

Document Content
Matched Section
Section: 1.3 ROLES AND RESPONSIBILITIES
Content: Role Responsibility IT Management l Responsible for developing and maintaining operating procedures. l Responsible for implementation of the policy. Resource Administrator l Responsible for reviewing event logs periodically. l Responsible for installing available patches on the Information Resources in a timely fashion. l Responsible for installing and hardening the resulting software when deploying off-the-shell software. l Responsible for performing periodic back-ups of the Information Resources they have been assigned. Business Unit Security Officer l Responsible for assessing and providing exceptional approvals for the policy. l Responsible for ensuring that help desk and support personnel are adequately trained. l Responsible for immediately notifying any Test personnel and third parties who could be affected by an intrusion or malicious code activity.
AI Justification
The section outlines specific roles and responsibilities related to security and privacy, aligning with the need for clarity in understanding these responsibilities.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The text discusses the importance of documented procedures for security and privacy programs, which aligns with the need for policies and procedures addressing personally identifiable information processing.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Threat Hunting
Content: software installed and active. This software should be configured to continuously monitor the systems and files for characteristics of viruses, worms, spyware, malware, and Trojan Horses, should be capable of generating audit logs and should be installed in "auto-protect", "full-time" or "real-time" mode unless there is an agreed exception for performance reasons by the CIO, CISO or authorized representative.
AI Justification
The text discusses the need for software to monitor systems for malicious code, which aligns with the proactive nature of threat hunting as described in RA-10.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the importance of documented operating procedures and policies related to system and services acquisition, emphasizing the need for formal documentation and authorized access.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecting the master copies of material used to generate security-relevant portions of the system hardware, software, and firmware from unauthorized modification or destruction.
AI Justification
The text discusses the importance of configuration management activities and the need for strict control to maintain the integrity of system changes, which aligns directly with the requirements of SA-10.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: Maintaining the integrity of changes to the system, system component, or system service requires strict configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes.
AI Justification
The mention of maintaining the integrity of changes and tracking authorized changes aligns with the objectives of CM-2.

Document Content
Matched Section
Section: Configuration Management | Baseline Configuration
Content: The configuration items that are placed under configuration management include the formal model; the functional, high-level, and low-level design specifications; other design data; implementation documentation; source code and hardware schematics.
AI Justification
The text emphasizes the need for formal documentation and processes in configuration management, which aligns with PR.IP-1.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference Control Name
Content: Control: SA-15: Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes facilitates effective supply chain risk assessment and mitigation. Such integrity requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes.
AI Justification
The chunk discusses maintaining the integrity of changes to tools and processes, which aligns with developer configuration management.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference Control Name
Content: Control: SA-15: Development tools include programming languages and computer-aided design systems. Reviews of development processes include the use of maturity models to determine the potential effectiveness of such processes. Maintaining the integrity of changes to tools and processes facilitates effective supply chain risk assessment and mitigation. Such integrity requires configuration control throughout the system development life cycle to track authorized changes and prevent unauthorized changes.
AI Justification
The text emphasizes the need for configuration control to track authorized changes and prevent unauthorized changes.

Document Content
Matched Section
Section: Section i) Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus, worm, Trojan horse, malware, etc.
Content: Company personnel should be trained in the proper procedures for using virus detection software and responding to a virus, worm, Trojan horse, malware, etc. This training information should be included in the overall training and awareness program that is the responsibility of Information Security.
AI Justification
The text discusses the importance of training personnel in the proper procedures for using virus detection software, which aligns with the need for training as outlined in SA-16.

Document Content
Matched Section
Section: Technical Vulnerability Management
Content: The purpose of a patch management system is to highlight, classify and prioritize any missing patches on an asset.
AI Justification
The chunk discusses the management of technical vulnerabilities and the importance of a patch management system, which aligns with the need for support for system components, including software patches.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management.
AI Justification
The chunk discusses the importance of documented operating procedures and access controls, which align with the need for security and privacy functional requirements as outlined in SA-4.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The chunk emphasizes the need for restricted access to operating procedures and tools, which aligns with access control policies.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The chunk mentions restricting access to tools required for system audits, which aligns with access enforcement controls.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The chunk emphasizes the importance of documented operating procedures for test systems and applications, aligning with the need for system documentation to help personnel understand the implementation and operation of controls.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential.
AI Justification
The requirement for access to operating procedures to be available to authorized personnel aligns with the need for access control measures.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The restriction of access to tools required for system audits to authorized individuals aligns with access enforcement controls.

Document Content
Matched Section
Section: 1.2 REQUIREMENT Documented Operating Procedures
Content: d) Possession, distribution or use of password cracking software, hacking tools, software reverse engineering tools, and network diagnostic, monitoring and scanning tools is restricted to designated and authorized personnel in accordance with their job responsibilities.
AI Justification
The restriction on the possession, distribution, or use of certain tools aligns with the need for control over access to sensitive tools.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: a) Operating procedures for all Test systems and applications should be documented and maintained. Operating procedures should be treated as formal documents with changes authorized by IT management. Documented procedures should also be prepared for housekeeping activities associated with information processing and communication.
AI Justification
The text discusses the importance of documented operating procedures and policies related to system and communications protection, aligning with the requirements of SC-1.

Document Content
Matched Section
Section: Documented Operating Procedures
Content: b) Access to the operating procedures should be made available to authorized personnel and contain the classification of Confidential. c) Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text emphasizes the need for access control to operating procedures and tools, which aligns with the requirements of AC-1.
anonymized_9.0_IS_Cryptography_Policy_1.pdf NIST
107 matches found

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their role in security and privacy assurance.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of encryption for wireless connections and emphasizes the importance of authentication and encryption to prevent unauthorized access, which aligns with the principles of remote access controls.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The mention of enforcing access restrictions for wireless connections aligns with access enforcement principles.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Access Control Policy
AI Justification
The chunk mentions 'Access Control Policy', which directly aligns with the definition and purpose of AC-3 regarding access control mechanisms.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the protection of sensitive information during transmission, which aligns with the principles of information flow control.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Segregation of Duties
AI Justification
The text discusses the importance of separating duties to mitigate risks associated with authorized privileges, which aligns directly with the AC-5 control.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Separation of duties is enforced through the account management activities in AC-2
AI Justification
The mention of account management activities in relation to separation of duties indicates a connection to AC-2.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Separation of duties is enforced through the access control mechanisms in AC-3
AI Justification
The text references access control mechanisms as part of enforcing separation of duties, which aligns with AC-3.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Separation of duties is enforced through the identity management activities in IA-2
AI Justification
The mention of identity management activities in relation to separation of duties indicates a connection to IA-2.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The text discusses the provision of literacy training and awareness for system users, which aligns with the requirements of AT-2.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the necessity of role-based training tailored to the specific roles and responsibilities of individuals within an organization, aligning directly with the requirements of control AT-3.

Document Content
Matched Section
Section: iii. Non-repudiation services should be used to resolve a dispute between parties
Content: iii. Non-repudiation services should be used to resolve a dispute between parties, regarding the occurrence or nonoccurrence of an event or action involving the use of digital signatures or any associated encryption protocol.
AI Justification
The chunk discusses the use of non-repudiation services to resolve disputes and mentions mechanisms such as digital signatures and certificates, which aligns with the control's focus on non-repudiation.

Document Content
Matched Section
Section: Definition of Certificate
Content: A digital certificate provides identifying information, is forgery resistant and can be verified because it was issued by an official, trusted agency. The certificate contains the name of the certificate holder, a serial number, expiration dates, a copy of the certificate holder's public key (used for encrypting messages and digital signatures) and the digital signature of the certificate-issuing authority (CA) so that a recipient can verify that the certificate is real.
AI Justification
The chunk discusses digital certificates and their role in encryption, which aligns with the definition and purpose of PKI certificates.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of digital signatures and encryption to verify authenticity and integrity, which aligns with the need for validation in name resolution services.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission.
AI Justification
The chunk discusses the protection of sensitive information during transmission, which aligns with the need to protect session authenticity against threats like man-in-the-middle attacks.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of digital signature certificates and encryption technologies which relate to the assurance of authenticity and integrity of information, aligning with the principles of SC-20.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of using digital signature certificates for verifying authenticity aligns with the need for origin authentication and integrity verification as outlined in SC-20.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The reference to authentication and encryption for wireless connections relates to ensuring the integrity and authenticity of data in transit, which is a key aspect of SC-20.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission.
AI Justification
The policy emphasizes the protection of Test data through cryptographic controls, which aligns with the focus on confidentiality and integrity of information at rest.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The chunk discusses the use of encryption and authentication for wireless connections, which aligns with the need to protect wireless links from unauthorized access.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.
AI Justification
The text discusses managed interfaces, boundary protection, and the importance of restricting traffic to enhance security, which aligns with SC-7.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of policies and procedures related to system and information integrity, which aligns with the requirements of control SI-1.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of cryptographic technology, encryption-in-transit, and the verification of integrity and authenticity of transmitted information, which aligns with the control's focus on protecting transmitted information.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of using digital signature certificates to verify the authenticity or integrity of transmitted sensitive information directly relates to ensuring the confidentiality and integrity of transmitted data.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The use of authentication and network/transport layer encryption for wireless connections to prevent unauthorized access aligns with the control's focus on protecting the confidentiality and integrity of transmitted information.

Document Content
Matched Section
Section: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
Content: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
AI Justification
Testing encryption algorithms and keys when new applications are introduced ensures that the confidentiality and integrity of transmitted information are maintained.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the importance of reviewing cryptographic technology implementations and ensuring the integrity of sensitive information, which aligns with the control's focus on unauthorized changes and integrity-checking mechanisms.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of using digital signature certificates to verify the authenticity or integrity of sensitive information directly relates to the control's focus on integrity.

Document Content
Matched Section
Section: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
Content: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
AI Justification
The requirement for testing encryption algorithms and software solutions when new or revised applications are introduced relates to maintaining the integrity of software and information.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: NIST CSF Subcategory Control Reference Control Name PR.DS-2
AI Justification
The text discusses the importance of managing supply chain risks, which includes protecting data and ensuring the integrity of systems and components.

Document Content
Matched Section
Section: NIST SP 800-53 Rev 5
Content: NIST SP 800-53 Rev 5 SC-8 Transmission Confidentiality and Integrity
AI Justification
The mention of managing and monitoring supply chain risks relates to ensuring the confidentiality and integrity of transmitted data.

Document Content
Matched Section
Section: NIST SP 800-53 Rev 5
Content: NIST SP 800-53 Rev 5 SC-11 Trusted Path
AI Justification
The text emphasizes the need for trustworthy relationships and secure systems, which aligns with the concept of a trusted path.

Document Content
Matched Section
Section: IS Cryptography Policy
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The section discusses the confidentiality of the information and the restrictions on its use and disclosure, which aligns with the control's focus on preventing unauthorized disclosure.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of policies and procedures related to security and privacy, which aligns with the control's focus on establishing such policies and procedures for assessment, authorization, and monitoring.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: CA-6: Authorizations are official management decisions by senior officials to authorize operation of systems, authorize the use of common controls for inheritance by organizational systems, and explicitly accept the risk to organizational operations and assets, individuals, other organizations, and the Nation based on the implementation of agreed-upon controls.
AI Justification
The text discusses the authorization process by senior officials, which aligns directly with the CA-6 control regarding official management decisions to authorize systems and accept associated risks.

Document Content
Matched Section
Section: 1.1 PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of having policies and procedures for configuration management, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The chunk discusses the protection of sensitive information during storage, processing, and transmission, which aligns with understanding where information is being processed and stored.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The chunk discusses the use of digital signature certificates to verify the authenticity or integrity of sensitive information, which aligns with the requirement for software and firmware components to be signed with recognized certificates.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: CP-13: Use of alternative security mechanisms supports system resiliency, contingency planning, and continuity of operations. To ensure mission and business continuity, organizations can implement alternative or supplemental security mechanisms.
AI Justification
The chunk discusses the importance of alternative security mechanisms for ensuring mission and business continuity, which aligns directly with the intent of CP-13.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission.
AI Justification
The chunk discusses the use of cryptographic controls to protect sensitive information, which aligns with the requirements for managing cryptographic keys.

Document Content
Matched Section
Section: PURPOSE
Content: This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The mention of protecting information assets and the requirements for encryption aligns with the need for system-level information protection and backup integrity.

Document Content
Matched Section
Section: 1.5 ESTABLISHING TRUST RELATIONSHIPS
Content: For the purposes of this document, a trust relationship is defined as a link between two different computers, where one computer (the target) allows a user of another computer (the source) access, trusting that the source computer has adequately authenticated the user.
AI Justification
The section discusses establishing trust relationships and the importance of authentication mechanisms, which aligns with the need for adaptive authentication to assess suspicious behavior.

Document Content
Matched Section
Section: ESTABLISHING TRUST RELATIONSHIPS
Content: For the purposes of this document, a trust relationship is defined as a link between two different computers, where one computer (the target) allows a user of another computer (the source) access, trusting that the source computer has adequately authenticated the user. The most common method for establishing trust is the use of a key pair in which the user’s public key is placed on the target computer and allows a connection to take place based on the key exchange without requiring the user to supply a password.
AI Justification
The text discusses the identification and authentication of users, including the use of passwords and key pairs for establishing trust relationships, which aligns with the requirements of IA-2.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of digital signature certificates and encryption for authentication and data integrity, which aligns with the requirements for authenticators and their management.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The mention of using authentication and encryption for wireless connections aligns with the control's focus on safeguarding authenticators.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of digital signature certificates for verifying authenticity, which aligns with the identification and authentication methods described in control IA-9.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of digital signature certificates for verifying the authenticity of information relates directly to the identification and authentication methods outlined in IA-9.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The reference to authentication and encryption for wireless connections aligns with the control's focus on identification and authentication methods.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of incident response policies and procedures, including how exceptions to these policies should be handled, which aligns with the control's focus on establishing and managing incident response policies.

Document Content
Matched Section
Section: Incident Response | Incident Response Training
Content: Incident response training is associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training.
AI Justification
The chunk discusses the importance of incident response training tailored to the roles and responsibilities of personnel, which aligns with the need for role-based training.

Document Content
Matched Section
Section: Incident Response | Incident Response Training
Content: Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources.
AI Justification
The emphasis on training users to identify and report suspicious activities aligns with the need for security awareness and skills training.

Document Content
Matched Section
Section: Chunk: 1.9
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of maintenance policies and procedures, including the need for approval for exceptions and the establishment of security requirements.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: MA-5: Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems.
AI Justification
The text discusses the roles and access requirements for maintenance personnel, including the need for technical competence and access authorizations.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: MA-5: Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems.
AI Justification
The text mentions physical access for maintenance personnel, which aligns with the requirements of PE-2.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of media protection policies and procedures, emphasizing the need for collaboration between security and privacy programs, which aligns with the intent of MP-1.

Document Content
Matched Section
Section: 1.13 CONTROL REFERENCES
Content: Control: MP-3: Security marking refers to the application or use of human-readable security attributes. Digital media includes diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), flash drives, compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Controlled unclassified information is defined by the National Archives and Records Administration along with the appropriate safeguarding and dissemination requirements for such information and is codified in 32 CFR 2002. Security markings are generally not required for media that contains information determined by organizations to be in the public domain or to be publicly releasable. Some organizations may require markings for public information indicating that the information is publicly releasable. System media marking reflects applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.
AI Justification
The chunk discusses security marking and the application of security attributes to various types of media, which aligns directly with the control's focus on security marking.

Document Content
Matched Section
Section: 1.13 CONTROL REFERENCES
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. The type of media storage is commensurate with the security category or classification of the information on the media. Controlled areas are spaces that provide physical and procedural controls to meet the requirements established for protecting information and systems. Fewer controls may be needed for media that contains information determined to be in the public domain, publicly releasable, or have limited adverse impacts on organizations, operations, or individuals if accessed by other than authorized personnel. In these situations, physical access controls provide adequate protection.
AI Justification
The chunk discusses the physical control and accountability of stored media, which aligns with the requirements of MP-4.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the use of cryptographic technology and encryption methods to protect sensitive information during transport, which aligns with the requirements for protecting system media.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The mention of using encryption for wireless connections to prevent unauthorized access aligns with the control's focus on protecting media during transport.

Document Content
Matched Section
Section: 1.13 CONTROL REFERENCES
Content: NIST SP 800-53 Rev 5 Media Protection | Media Use
AI Justification
The chunk discusses the restrictions and protections related to the use of various types of media, including portable storage devices, which aligns with the requirements of MP-7.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The policy outlines the planning and procedural requirements for protecting sensitive information through cryptographic controls, aligning with the need for established policies and procedures in the PL family.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns with the definition and purpose of PL-11.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions.
AI Justification
The mention of security and privacy plans reflects the need for a specialized workforce to implement tailored controls.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: PL-4: Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use agreements (see PS-6). Organizations consider rules of behavior based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.
AI Justification
The text discusses rules of behavior as a type of access agreement for organizational users, which aligns directly with control PL-4.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
The control CP-3 relates to the establishment of contingency planning, which is part of the central management of controls and processes.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
PM-13 emphasizes the importance of managing the security workforce, aligning with the central management of controls.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
IR-2 involves training for incident response, which can be part of centrally managed processes.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance of an information security program plan, detailing its purpose, implementation, and updates, which aligns directly with control PM-1.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of protecting information assets and the use of cryptographic controls to ensure confidentiality, integrity, and authenticity, which aligns with the protection needs outlined in PM-11.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs.
AI Justification
The text discusses the establishment of insider threat programs as required by Executive Order 13587 and the National Insider Threat Policy, which aligns directly with control PM-12.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Insider threat programs can leverage the existence of incident handling teams that organizations may already have in place, such as computer security incident response teams.
AI Justification
The text mentions leveraging incident handling teams and the importance of monitoring activities, which aligns with the need for incident response training.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Human resources records are especially important in this effort, as there is compelling evidence to show that some types of insider crimes are often preceded by nontechnical behaviors in the workplace.
AI Justification
The text implies the need for monitoring employee activities and the importance of human resources records, which relates to screening processes.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Insider threat programs require organizations to prepare department or agency insider threat policies and implementation plans.
AI Justification
The text discusses the need for policies and implementation plans for insider threat programs, which relates to access control policies.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based training programs for individuals assigned security and privacy roles and responsibilities; and providing standards and guidelines for measuring and building individual qualifications for incumbents and applicants for security- and privacy-related positions.
AI Justification
The text discusses the importance of defining knowledge, skills, and abilities for security and privacy roles, which aligns directly with the control's focus on workforce development.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: A process for organization-wide security and privacy testing, training, and monitoring helps ensure that organizations provide oversight for testing, training, and monitoring activities and that those activities are coordinated.
AI Justification
The text discusses the importance of organization-wide security and privacy testing, training, and monitoring, which aligns directly with PM-14.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Security and privacy training activities, while focused on individual systems and specific roles, require coordination across all organizational elements.
AI Justification
The mention of security and privacy training activities requiring coordination across all organizational elements aligns with PM-13.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Ongoing contact with security and privacy groups and associations is important in an environment of rapidly changing technologies and threats.
AI Justification
The text discusses the importance of ongoing contact with security and privacy groups and associations, which aligns directly with the intent of control PM-15.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: PM-18: A privacy program plan is a formal document that provides an overview of an organization’s privacy program, including a description of the structure of the privacy program, the resources dedicated to the privacy program, the role of the senior agency official for privacy and other privacy officials and staff, the strategic goals and objectives of the privacy program, and the program management controls and common controls in place or planned for meeting applicable privacy requirements and managing privacy risks.
AI Justification
The text discusses the importance of a privacy program plan and its components, which aligns with the control's focus on establishing a formal privacy program.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
The text explicitly mentions the role of the senior agency information security officer as an organizational official, which aligns with the definition provided in control PM-2.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: PM-6: Measures of performance are outcome-based metrics used by an organization to measure the effectiveness or efficiency of the information security and privacy programs and the controls employed in support of the program.
AI Justification
The text discusses the importance of outcome-based metrics for measuring the effectiveness of security and privacy programs, which aligns directly with the definition of PM-6.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: PS-1: Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of personnel security policies and procedures and their role in security and privacy assurance.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Therefore, it is important that security and privacy programs collaborate on their development.
AI Justification
The text emphasizes the collaboration between security and privacy programs in developing policies and procedures.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Screening
AI Justification
The chunk discusses screening and personnel responsibilities, which aligns with the requirements for personnel screening and rescreening activities.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
The text discusses actions required for personnel transfers or reassignments, which aligns with the control's focus on defining actions for such situations.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Program Management | Security & Privacy Workforce
AI Justification
The mention of personnel transfers and reassignments relates to the terms and conditions under which employees operate within the organization.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Exit interviews ensure that terminated individuals understand the security constraints imposed by being former employees and that proper accountability is achieved for system-related property.
AI Justification
The text discusses the importance of exit interviews and the management of system-related property for terminated employees, aligning with the control's focus on responsibilities during termination.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Exit interviews are important for individuals with security clearances.
AI Justification
The mention of security clearances and the importance of exit interviews for individuals with such clearances aligns with the screening process outlined in this control.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: proper accountability is achieved for system-related property.
AI Justification
The control addresses the accountability for system-related property during the termination process, which is relevant to the handling of assets.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of policies and procedures for processing personally identifiable information, which aligns with the control's focus on transparency and risk management in handling such data.

Document Content
Matched Section
Section: PURPOSE
Content: Encryption of sensitive information helps preserve the confidentiality, integrity, and authenticity of the information.
AI Justification
The text emphasizes the use of cryptographic controls to protect sensitive information, which aligns with the need for proper management of cryptographic keys.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The text discusses the importance of policies and procedures related to risk assessment, which aligns with the RA-1 control that emphasizes the need for such policies within organizations.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Threat hunting is an active means of cyber defense in contrast to traditional protection measures, such as firewalls, intrusion detection and prevention systems, quarantining malicious code in sandboxes, and Security Information and Event Management technologies and systems.
AI Justification
The text discusses proactive measures for identifying and mitigating advanced threats, which aligns with the objectives of threat hunting.

Document Content
Matched Section
Section: Vulnerability Monitoring and Analysis
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the processes involved in identifying and addressing vulnerabilities.

Document Content
Matched Section
Section: 1.9 Exception
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and services acquisition, including the need for approval for exceptions and the definition of security requirements.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: This policy and related document apply to all: Software Projects developing new IT Applications, i.e., the initial release has not been deployed at publication date, Technology Initiatives updating any other relevant IT Applications.
AI Justification
The chunk discusses the scope and applicability of policies related to software projects and technology initiatives, which aligns with the need for developmental testing and evaluation to ensure security and privacy requirements are met.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Control: SA-21: Developer screening is directed at external developers. Internal developer screening is addressed by PS-3. Because the system, system component, or system service may be used in critical activities essential to the national or economic security interests of the United States, organizations have a strong interest in ensuring that developers are trustworthy.
AI Justification
The text discusses the importance of screening developers, particularly external developers, to ensure trustworthiness, which aligns directly with the SA-21 control.

Document Content
Matched Section
Section: iii. Non-repudiation services should be used to resolve a dispute between parties
Content: iii. Non-repudiation services should be used to resolve a dispute between parties, regarding the occurrence or nonoccurrence of an event or action involving the use of digital signatures or any associated encryption protocol. Non-repudiation may be achieved through multiple mechanisms, for example but is not limited to, digital certificates, biometrics, confirmation messages, timestamps, etc.
AI Justification
The chunk discusses non-repudiation services and cryptographic operations, which align with enhancing the trustworthiness of systems as described in control SA-23.

Document Content
Matched Section
Section: Key Lifecycle Management Procedures
Content: Systems Owners should document procedures for key lifecycle management including key generation, key use, key storage, key archival, key revocation, and key deletion.
AI Justification
The chunk discusses the need for documentation related to key lifecycle management, which aligns with the requirement for system documentation to help personnel understand the implementation and operation of controls.

Document Content
Matched Section
Section: 1.5 ESTABLISHING TRUST RELATIONSHIPS
Content: For the purposes of this document, a trust relationship is defined as a link between two different computers, where one computer (the target) allows a user of another computer (the source) access, trusting that the source computer has adequately authenticated the user.
AI Justification
The text discusses establishing trust relationships between computers, which aligns with the management of external system services and the associated risks.

Document Content
Matched Section
Section: PURPOSE
Content: The purpose of this policy is to ensure that Test data is protected by means of cryptographic controls during storage, processing, and transmission. This policy defines the requirements for the use of cryptographic techniques to protect Information Assets and sensitive application systems that store, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The chunk discusses the importance of policies and procedures related to cryptographic controls for protecting sensitive information, which aligns with the SC-1 control that emphasizes the need for a system and communications protection policy.

Document Content
Matched Section
Section: 1.4 KEY MANAGEMENT
Content: a. Key management procedures for secure key generation, ownership, distribution, archival, storage and revocation should be established to protect the keys throughout their lifecycle.
AI Justification
The chunk outlines key management procedures, including secure key generation, ownership, distribution, and protection against unauthorized use, which aligns with the requirements of SC-12.

Document Content
Matched Section
Section: 1.4 KEY MANAGEMENT
Content: e. Information systems should employ automated mechanisms with supporting or manual procedures for cryptographic key establishment and key management.
AI Justification
The mention of automated mechanisms for cryptographic key establishment and management directly corresponds to the control's focus on key management processes.

Document Content
Matched Section
Section: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
Content: vi. Cryptographic technology implementations should be reviewed periodically by the System Owners commensurate with data sensitivity and results should be submitted to the Information Security team.
AI Justification
The chunk discusses the implementation and review of cryptographic technologies, including digital signatures and encryption, which aligns with the control's focus on cryptography for protecting sensitive information.

Document Content
Matched Section
Section: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
Content: vii. Digital signature certificates should be used to verify the authenticity or integrity of stored or transmitted sensitive or critical information in accordance to Test Cryptographic Standards.
AI Justification
The mention of using digital signature certificates to verify authenticity aligns with the control's emphasis on the provision and implementation of digital signatures.

Document Content
Matched Section
Section: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
Content: viii. Authentication and network/transport layer encryption (e.g., encryption-in-transit) should be used for Wireless connections to prevent unauthorized access to information systems.
AI Justification
The requirement for authentication and encryption for wireless connections directly relates to the control's focus on using cryptography to prevent unauthorized access.

Document Content
Matched Section
Section: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
Content: ix. Encryption algorithms, keys, and software solutions should be tested by System Owners when new or when revisions to existing applications are introduced.
AI Justification
Testing encryption algorithms and keys aligns with the control's emphasis on ensuring the integrity and effectiveness of cryptographic solutions.

Document Content
Matched Section
Section: x. Legal and Compliance team should handle all legal requests for access to encryption keys in the event encrypted information is needed in unencrypted form.
Content: x. Legal and Compliance team should handle all legal requests for access to encryption keys in the event encrypted information is needed in unencrypted form.
AI Justification
The handling of legal requests for access to encryption keys is relevant to the control's focus on compliance with laws and regulations regarding cryptography.
anonymized_7.2_IS_End_User_Device_Standard.pdf NIST
64 matches found

Document Content
Matched Section
Section: Access control policy and procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies reflecting the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to access control policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of access control policies and procedures, including their development, implementation, and the conditions under which exceptions can be made.

Document Content
Matched Section
Section: Devices should be password-protected and encrypted.
Content: Devices should be password-protected and encrypted.
AI Justification
The chunk discusses the importance of password protection and encryption for devices, which aligns with the concept of device locks as a temporary measure to prevent unauthorized access.

Document Content
Matched Section
Section: Remote access should be configured to use a strong authentication system connection (e.g, SSL VPN) in conjunction with multi factor authentication.
Content: Remote access should be configured to use a strong authentication system connection (e.g, SSL VPN) in conjunction with multi factor authentication.
AI Justification
The chunk discusses the configuration of remote access using strong authentication and multi-factor authentication, which aligns with the requirements for secure remote access outlined in AC-17.

Document Content
Matched Section
Section: Overview, Scope & Applicability
Content: Workstations, computers, laptops, mobile computing devices, portable data storage devices (such as floppy disks, USB external drives, and writeable CDs and DVDs) are considered “desktop” or “end user device” equipment.
AI Justification
The text discusses mobile computing devices and outlines the security controls and policies necessary for their protection and management, which aligns with the requirements of AC-19.

Document Content
Matched Section
Section: Account Management and Local Administrative Rights
Content: Standard users should not have local administrative rights without approval of Information Security.
AI Justification
The chunk discusses the management of local accounts and the need for approval for administrative rights, which aligns with the requirements for identifying authorized users and specifying access privileges.

Document Content
Matched Section
Section: Access Control Policy
Content: Standard users should not have local administrative rights without approval of Information Security.
AI Justification
The mention of the need for approval for administrative rights indicates a policy governing access control, which is essential for managing user privileges.

Document Content
Matched Section
Section: Overview, Scope & Applicability
Content: The purpose of this Policy document is to: i. Describe general security controls concerning desktop and end-user device security. ii. Define desktop and end-user device security access controls.
AI Justification
The section discusses access controls related to desktop and end-user devices, which aligns with the concept of access control policies that govern access between users and devices.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, including their development and the factors influencing them, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Devices should be password-protected and encrypted.
Content: Devices should be password-protected and encrypted.
AI Justification
The text discusses the need for password protection and encryption of devices, which aligns with the protection of information at rest, ensuring confidentiality and integrity.

Document Content
Matched Section
Section: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
Content: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
AI Justification
The mention of using approved removable storage devices that support password protection and encryption aligns with protecting information at rest.

Document Content
Matched Section
Section: Section 10 and 11 regarding approved end-user devices and the prohibition of unauthorized networking devices.
Content: Only approved end-user devices may be attached to the LAN (per wire or WIFI) in any Test office. Approved devices include Test issued workstations, laptops, and printers. Personal (end-used owned) devices may not be attached to the corporate network without permission from the IT department. In particular, the use of any unauthorized networking devices, including wireless access points or wireless routers, is expressly forbidden.
AI Justification
The section discusses the prohibition of unauthorized networking devices, including wireless access points, which aligns with the need to protect wireless links from unauthorized access.

Document Content
Matched Section
Section: Overview, Scope & Applicability
Content: The purpose of this Policy document is to: i. Describe general security controls concerning desktop and end-user device security. ii. Define desktop and end-user device security access controls.
AI Justification
The chunk discusses the scope and applicability of security controls concerning desktop and end-user devices, which aligns with the usage restrictions on system components.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions and functions to implement stronger security requirements, which aligns with the need for additional strength of mechanism for domain separation and policy enforcement as stated in SC-50.

Document Content
Matched Section
Section: Voice Communications Equipment Protection
Content: Voice Communications Equipment should be protected in the following ways: a. They should be kept in a locked room. b. Management software should be protected by username and password logon. c. They should be configured to prevent hacking. d. They should have system-controlled dial-out access (premium rate numbers barred). e. They should have controlled dial-in access from direct exchange lines for support/maintenance. f. They should have Call Loggers to monitor (and alarm) unusual call patterns.
AI Justification
The chunk discusses protecting voice communications equipment, which aligns with the need to protect the confidentiality and integrity of transmitted information.

Document Content
Matched Section
Section: 1.4
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of system and information integrity policies and procedures, including their development and the factors influencing them, which aligns with the requirements of control SI-1.

Document Content
Matched Section
Section: 7.2 End User Device Standard
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The text discusses information management and retention requirements, emphasizing the full life cycle of information and the need for coordination with records management personnel.

Document Content
Matched Section
Section: Section 4: All PCs and laptops should be equipped with up-to-date and fully operational anti-virus software.
Content: All PCs and laptops should be equipped with up-to-date and fully operational anti-virus software. Disabling or interfering with anti-virus software is prohibited.
AI Justification
The text discusses the importance of having up-to-date anti-virus software on all PCs and laptops to protect against malicious code, which aligns with the control's focus on protecting systems from malicious code insertions.

Document Content
Matched Section
Section: Overview, Scope & Applicability
Content: The purpose of this Policy document is to: iii. Explain monitoring activities that support desktop and end-user device security.
AI Justification
The text discusses monitoring activities that support desktop and end-user device security, which aligns with the definition of system monitoring as described in control SI-4.

Document Content
Matched Section
Section: Section 4: System Entry and Exit Points
Content: Personal firewalls software should be installed and subject to update from a central policy server; users should not be able to disable or change the configuration of this firewall.
AI Justification
The chunk discusses the importance of personal firewalls and remote access configurations, which are part of system entry and exit points.

Document Content
Matched Section
Section: Media Protection | Media Sanitization
Content: Control: SR-12: Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle).
AI Justification
The control aligns with the need for proper disposal methods to prevent sensitive information from being compromised.

Document Content
Matched Section
Section: Voice Communications Equipment protection measures
Content: They should have Call Loggers to monitor (and alarm) unusual call patterns.
AI Justification
The mention of Call Loggers to monitor unusual call patterns aligns with the need for logging and monitoring as described in AU-6.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of assessment, authorization, and monitoring policies and procedures, which aligns directly with control CA-1.

Document Content
Matched Section
Section: Authorization and Approval Procedures
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the maintenance of a record of approved requests and the authorization process involving senior officials, which aligns with the requirements for authorizations as outlined in CA-6.

Document Content
Matched Section
Section: Overview and Scope & Applicability
Content: The purpose of this Policy document is to: i. Describe general security controls concerning desktop and end-user device security. ii. Define desktop and end-user device security access controls. iii. Explain monitoring activities that support desktop and end-user device security.
AI Justification
The section discusses monitoring activities that support desktop and end-user device security, which aligns with the continuous monitoring requirements outlined in CA-7.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of configuration management policies and procedures, including their development and implementation within organizations.

Document Content
Matched Section
Section: Section 9: Equipment and media containing confidential information should be retained in a secured location while unattended.
Content: 9. Equipment and media containing confidential information should be retained in a secured location while unattended.
AI Justification
The text discusses the importance of controlling access to systems for changes, which aligns with the need for qualified individuals to initiate changes as stated in CM-5.

Document Content
Matched Section
Section: Section 4.6 - Configuration Settings
Content: Personal firewalls software should be installed and subject to update from a central policy server; users should not be able to disable or change the configuration of this firewall.
AI Justification
The text discusses the importance of configuration settings for security and privacy, which aligns with the definition of CM-6.

Document Content
Matched Section
Section: Section 4.6 - Access Control Measures
Content: Employees should take appropriate measures, whenever possible, to protect and secure laptops that contain sensitive information when not in use (i.e., laptops should be secured in a locked desk or cabinet at night, office doors should be locked at night, etc.).
AI Justification
The mention of securing laptops and mobile devices aligns with access control measures outlined in AC-19.

Document Content
Matched Section
Section: System Component Inventory
Content: System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories that include components from all organizational systems. In such situations, organizations ensure that the inventories include system-specific information required for component accountability.
AI Justification
The text discusses the importance of maintaining an inventory of system components, including details necessary for accountability and preventing duplicate accounting.

Document Content
Matched Section
Section: Contingency planning policy and procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of contingency planning policies and procedures, their development, and the collaboration between security and privacy programs, aligning directly with CP-1.

Document Content
Matched Section
Section: Test restricts remote access to many types of confidential information.
Content: Test restricts remote access to many types of confidential information. Users should take measures to ensure that such information is not stored locally on a device outside of a Test approved application.
AI Justification
The text discusses restricting remote access to confidential information, which aligns with the control's focus on managing remote access to systems and information.

Document Content
Matched Section
Section: Data on laptops should be backed up to a server rather than to a USB storage device except in cases where this is not feasible.
Content: Data on laptops should be backed up to a server rather than to a USB storage device except in cases where this is not feasible (e.g. during an extended business trip).
AI Justification
The mention of backing up data and the requirements for using approved devices aligns with the control's focus on system backups and organizational requirements for information protection.

Document Content
Matched Section
Section: Devices should be password-protected and encrypted.
Content: Devices should be password-protected and encrypted.
AI Justification
The requirement for password protection and encryption of devices aligns with the control's focus on protecting information stored on devices.

Document Content
Matched Section
Section: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
Content: Only USB sticks and other removable devices that have been approved by Test IT, and that support password-protection and encryption, should be used.
AI Justification
The mention of protecting data on removable storage devices aligns with the control's focus on protecting information during transport.

Document Content
Matched Section
Section: Laptops
Content: There should be a screen saver configured to enforce re-input of the user's password after a period of inactivity, not to exceed 60 minutes.
AI Justification
The section discusses the need for re-input of the user's password after a period of inactivity, which aligns with the re-authentication requirements outlined in IA-11.

Document Content
Matched Section
Section: 9. Equipment and media containing confidential information should be retained in a secured location while unattended. 10. Only approved end-user devices may be attached to the LAN (per wire or WIFI) in any Test office.
Content: 10. Only approved end-user devices may be attached to the LAN (per wire or WIFI) in any Test office. Approved devices include Test issued workstations, laptops, and printers. Personal (end-used owned) devices may not be attached to the corporate network without permission from the IT department.
AI Justification
The chunk discusses the requirement for approved end-user devices to be attached to the LAN and the use of Network Access Control (NAC) technology to monitor compliance, which aligns with the need for unique device identification and authentication.

Document Content
Matched Section
Section: 1.1.3 Laptops
Content: The only enabled local accounts should be administrative accounts; the administrative account should have a password.
AI Justification
The chunk discusses the management of local accounts and the requirement for administrative accounts to have passwords, which aligns with the requirements for authenticator management.

Document Content
Matched Section
Section: 1.1.3 Laptops
Content: Standard users should not have local administrative rights without approval of Information Security.
AI Justification
The mention of standard users not having local administrative rights aligns with the access enforcement control.

Document Content
Matched Section
Section: 1.1.3 Laptops
Content: Standard users should not have local administrative rights without approval of Information Security.
AI Justification
The requirement that standard users should not have local administrative rights supports the principle of least privilege.

Document Content
Matched Section
Section: 1.1.3 Laptops
Content: The only enabled local accounts should be administrative accounts; the administrative account should have a password.
AI Justification
The mention of enforcing password protection and the management of local accounts relates to the establishment of rules of behavior for users.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Control: IR-1: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of incident response policy and procedures.
AI Justification
The text discusses the importance of incident response policies and procedures, including their development and the factors influencing them, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Media protection policy and procedures
Content: Control: MP-1: Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of media protection policy and procedures.
AI Justification
The text discusses the importance of media protection policies and procedures, including their development and the factors influencing them, which aligns directly with the control's focus.

Document Content
Matched Section
Section: Media Protection | Media Access
Content: Denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers is an example of restricting access to non-digital media. Limiting access to the design specifications stored on compact discs in the media library to individuals on the system development team is an example of restricting access to digital media.
AI Justification
The text discusses restricting access to both digital and non-digital media, which aligns directly with the control's focus on media access.

Document Content
Matched Section
Section: Media Protection | Media Marking
Content: Security marking refers to the application or use of human-readable security attributes. Digital media includes diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), flash drives, compact discs, and digital versatile discs. Non-digital media includes paper and microfilm.
AI Justification
The text discusses the application of security markings on digital and non-digital media, which aligns directly with the requirements of MP-3.

Document Content
Matched Section
Section: Media Protection | Media Storage
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. The type of media storage is commensurate with the security category or classification of the information on the media.
AI Justification
The text discusses the physical control and secure storage of both digital and non-digital media, which aligns directly with the requirements of MP-4.

Document Content
Matched Section
Section: Media Protection | Media Transport
Content: Control to protect media during transport include cryptography and locked containers. Cryptographic mechanisms can provide confidentiality and integrity protections depending on the mechanisms implemented. Activities associated with media transport include releasing media for transport, ensuring that media enters the appropriate transport processes, and the actual transport.
AI Justification
The text discusses the protection of media during transport, including the use of cryptography, locked containers, and maintaining accountability of media, which directly aligns with the requirements of control MP-5.

Document Content
Matched Section
Section: Media Protection | Media Sanitization
Content: Media sanitization applies to all digital and non-digital system media subject to disposal or reuse, whether or not the media is considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, workstations, network components, mobile devices, and non-digital media (e.g., paper and microfilm). The sanitization process removes information from system media such that the information cannot be retrieved or reconstructed.
AI Justification
The text discusses the importance of media sanitization techniques and their application to both digital and non-digital media, aligning directly with the control's focus.

Document Content
Matched Section
Section: Media Protection | Media Use
Content: Media use protections also apply to mobile devices with information storage capabilities. In contrast to MP-2, which restricts user access to media, MP-7 restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives.
AI Justification
The text discusses the restrictions and protections related to the use of various types of media, including portable storage devices, which aligns directly with the requirements of MP-7.

Document Content
Matched Section
Section: Media Protection | Media Downgrading
Content: MP-8: Media downgrading applies to digital and non-digital media subject to release outside of the organization, whether the media is considered removable or not. When applied to system media, the downgrading process removes information from the media, typically by security category or classification level, such that the information cannot be retrieved or reconstructed. Downgrading of media includes redacting information to enable wider release and distribution. Downgrading ensures that empty space on the media is devoid of information.
AI Justification
The chunk explicitly references the process of media downgrading, which aligns directly with the control's definition and requirements.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of physical and environmental protection policies and procedures, including their development and the factors influencing them.

Document Content
Matched Section
Section: Overview and Scope & Applicability
Content: Workstations, computers, laptops, mobile computing devices, portable data storage devices (such as floppy disks, USB external drives, and writeable CDs and DVDs) are considered 'desktop' or 'end user device' equipment.
AI Justification
The chunk discusses the identification and classification of desktop and end-user devices, which aligns with the marking of hardware components as per PE-22.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of planning policies and procedures for security and privacy, aligning with the requirements of PL-1.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the establishment of control baselines and the flexibility for divisions to define stronger or weaker security requirements based on their specific needs, which aligns with the concept of control baselines.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of an information security program plan, detailing its purpose, implementation, and updates, which aligns with the requirements outlined in control PM-1.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the need for defining protection requirements based on organizational mission and business needs, which aligns with the control's focus on technology-independent capabilities to counter threats.

Document Content
Matched Section
Section: Overview, Scope & Applicability
Content: The purpose of this Policy document is to: ii. Define desktop and end-user device security access controls. iii. Explain monitoring activities that support desktop and end-user device security.
AI Justification
The chunk discusses monitoring activities that support desktop and end-user device security, which aligns with the need for oversight in testing, training, and monitoring as outlined in PM-14.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of personnel security policies and procedures, including their development and the factors that influence them, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: ENFORCEMENT/COMPLIANCE
Content: Test Senior Management should define consequences for violations of all information security related policies, procedures, processes, or standards. Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The text outlines the consequences for violations of information security policies, which aligns with the requirement for organizational sanctions to reflect applicable laws and policies.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information processing and transparency, aligning with the requirements of control PT-1.

Document Content
Matched Section
Section: Chunk: 1.4
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including their development and the need for collaboration between security and privacy programs.

Document Content
Matched Section
Section: Continuous Vulnerability Management
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the processes involved in identifying and addressing vulnerabilities.

Document Content
Matched Section
Section: 1.4
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to system and services acquisition, emphasizing collaboration between security and privacy programs, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the derivation of security and privacy requirements, which aligns with the control's focus on defining functional requirements based on high-level security and privacy objectives.

Document Content
Matched Section
Section: 1.4 EXCEPTION
Content: The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, which aligns with the SC-1 control requirements.
anonymized_15.1_IS_Lazard_CSIRT-CSIRP_Framework_Standard.pdf NIST
33 matches found

Document Content
Matched Section
Section: Recovery
Content: In recovery, system administrators restore systems to normal operation and (if applicable) remediate vulnerabilities to prevent similar incidents.
AI Justification
The recovery process aims to restore systems to a known operational state, which aligns with the principle of maintaining confidentiality, integrity, and availability during system failures.

Document Content
Matched Section
Section: Containment strategies vary based on the type of incident.
Content: Containment strategies vary based on the type of incident. For example, the strategy for containing email-borne malware infection is quite different from that of a network-based DDoS attack.
AI Justification
The text discusses the need for containment strategies for incidents such as DDoS attacks, which aligns with the control's focus on managing denial-of-service events.

Document Content
Matched Section
Section: Test Cyber Security Incident Response Framework
Content: The containment phase begins with Information Security holding an initial analysis meeting (as required, could be face-to-face or over the phone). Information Security will review playbooks and consult with IT Service Owners and Business Owners as required.
AI Justification
The text discusses the importance of policies and procedures related to system and information integrity, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: Evidence Gathering and Chain of Custody Documentation
Content: the chain of custody should be documented in writing and detail the transfer including each party’s signature. A detailed log should be kept for all evidence, including the following: Identifying information (e.g., the location, serial number, model number, hostname, media access control (MAC) addresses, and IP addresses of a computer) Name, title, and phone number of each individual who collected or handled the evidence during the investigation Time and date (including time zone) of each occurrence of evidence handling Locations where the evidence was stored.
AI Justification
The text discusses the importance of documenting the chain of custody and maintaining detailed logs for evidence, which aligns with information management and retention requirements.

Document Content
Matched Section
Section: Containment Plan of Action
Content: Based on the initial interactions from step C1, Information Security determines the containment plan of action in order to constrain the incident. For example, in case of system compromise or malware propagation, put in place an IT quarantine and perform forensics images.
AI Justification
The text discusses the containment of incidents related to malware propagation and system compromise, which aligns with the control's focus on protecting against malicious code.

Document Content
Matched Section
Section: Cyber Security Incident Response Framework
Content: A human contacts Helpdesk or the SOC to report a possible cybersecurity event. An endpoint system (e.g an antivirus) has detected a malware. A network management system or an external service provider raises an alert. A third party reports an alarm or an incident which can impact Test. A system administrator or a database administrator reports an alert on their system. The helpdesk receives the report of a possible cybersecurity event. The SOC receives the report of a possible cybersecurity event.
AI Justification
The chunk discusses various methods of reporting cybersecurity incidents, which aligns with the objectives of system monitoring as outlined in control SI-4.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: DOCUMENT CLASSIFICATION Confidential
AI Justification
The document explicitly states that the information contained is confidential and cannot be disclosed without permission, aligning with the control's focus on preventing unauthorized disclosure.

Document Content
Matched Section
Section: Evidence Collection and Preservation
Content: Although the primary reason for gathering evidence during an incident is to resolve the incident, the severity and sensitivity of the incident may also deem it necessary hold evidence for legal proceedings. In such cases, it is important to clearly document how all evidence, including compromised systems, has been preserved.
AI Justification
The chunk discusses the importance of documenting evidence and the procedures for collecting evidence during an incident, which aligns with the need for audit record review and analysis.

Document Content
Matched Section
Section: Eradication Plan and Approval Process
Content: Once Information Security has compiled the eradication action plan. They determine if any emergency change management is required in order to execute the plan.
AI Justification
The text discusses the creation and approval of an eradication action plan, which aligns with the need for plans of action and milestones to track remedial actions.

Document Content
Matched Section
Section: Internal Change Management implementation.
Content: The Cyber Security Specialist will initiate the change management process by requesting a change so that the External Service Provider can begin implementation.
AI Justification
The chunk discusses the change management process, including the requirement for change requests and the involvement of external service providers, which aligns with the systematic proposal and implementation of changes outlined in CM-3.

Document Content
Matched Section
Section: Change Management implementation.
Content: The Cyber Security Specialist will initiate the change management process by requesting a change so that the External Service Provider can begin implementation.
AI Justification
The text discusses the change management process and the requirement for logging change requests with external service providers, which aligns with the control's focus on managing changes to systems.

Document Content
Matched Section
Section: Contingency planning policy and procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures.
AI Justification
The text discusses the importance of contingency planning policies and procedures, which aligns with the control CP-1 that emphasizes the need for such policies in organizations.

Document Content
Matched Section
Section: Recovery
Content: In recovery, system administrators restore systems to normal operation and (if applicable) remediate vulnerabilities to prevent similar incidents. Recovery efforts, generally carried out by IT personnel, should not commence until approved by the Information Security team and a full backup of the impact systems have been taken for archival and evidential purposes.
AI Justification
The text discusses recovery activities, including restoring systems to normal operation and remediation efforts, which aligns with the control's focus on executing contingency plan activities to restore organizational mission and business functions.

Document Content
Matched Section
Section: Recovery
Content: In recovery, system administrators restore systems to normal operation and (if applicable) remediate vulnerabilities to prevent similar incidents. Recovery efforts, generally carried out by IT personnel, should not commence until approved by the Information Security team and a full backup of the impact systems have been taken for archival and evidential purposes.
AI Justification
The text discusses recovery processes and the importance of restoring systems to normal operation, which aligns with the need for alternative security mechanisms to ensure continuity of operations.

Document Content
Matched Section
Section: Contingency planning for systems is part of an overall program for achieving continuity of operations
Content: Control: CP-2: Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restoration and implementation of alternative mission or business processes when systems are compromised or breached.
AI Justification
The text discusses the need for developing strategies for incident containment, which aligns with the principles of contingency planning as outlined in CP-2.

Document Content
Matched Section
Section: Preparation
Content: Preparation can also be called the pre-incident phase. It involves the steps that are taken before an incident occurs. In other words, this is the time in which the incident responders prepare for the incident. This can include training, defining policies and procedures, gathering tools and necessary software, procuring necessary hardware equipment, etc. This phase includes everything that can aid in faster resolution of an incident including tabletop practice exercises designed to condition the responders react in an orderly, controlled and systematic approach to the onset of an incident.
AI Justification
The text discusses the importance of training and preparation for incident responders, which aligns with the need for contingency training linked to roles and responsibilities.

Document Content
Matched Section
Section: Preparation
Content: Preparation can also be called the pre-incident phase. It involves the steps that are taken before an incident occurs. In other words, this is the time in which the incident responders prepare for the incident. This can include training, defining policies and procedures, gathering tools and necessary software, procuring necessary hardware equipment, etc. This phase includes everything that can aid in faster resolution of an incident including tabletop practice exercises designed to condition the responders react in an orderly, controlled and systematic approach to the onset of an incident.
AI Justification
The chunk discusses preparation activities, including tabletop practice exercises, which align with the testing of contingency plans to ensure effectiveness and readiness.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Control: IR-1: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of incident response policy and procedures.
AI Justification
The text discusses the importance of incident response policies and procedures, including their development and collaboration between security and privacy programs.

Document Content
Matched Section
Section: Incident Verification
Content: Cybersecurity events are detected and reported through many different channels. Some are reported by end-users to the global help desk or by IT technicians and engineers, while others are reported by automated monitoring tools. The first step in any incident response plan is to assess the event and determine if it is an actionable event.
AI Justification
The text discusses the importance of training for various roles in incident response, aligning with the requirements for incident response training outlined in control IR-2.

Document Content
Matched Section
Section: Test Cyber Security Incident Response Framework
Content: Cybersecurity events are detected and reported through many different channels. Some are reported by end-users to the global help desk or by IT technicians and engineers, while others are reported by automated monitoring tools. The first step in any incident response plan is to assess the event and determine if it is an actionable event.
AI Justification
The text discusses the assessment of cybersecurity events and the classification of incidents, which aligns with the need to test incident response capabilities and determine their effectiveness.

Document Content
Matched Section
Section: Incident Verification and Classification
Content: The tendency of technologists is to look for a technical explanation for an event, rather than suspect something nefarious, e.g., looking for a firewall malfunction rather than suspecting a DDoS attack. Because of this tendency, it is critical that only authorized information security personnel make the determination that a suspected incident (adverse event) is in fact a non-actionable event.
AI Justification
The text discusses the importance of determining whether an adverse event is an information security incident and emphasizes the need for authorized personnel to make this determination, which aligns with the incident response capabilities outlined in control IR-4.

Document Content
Matched Section
Section: Post-mortem analysis of the way an incident was handled
Content: Post-mortem analysis of the way an incident was handled will often reveal a missing step or an procedure, providing impetus for change. Because of the changing nature of information technology changes in personnel, the incident response team should review all related documentation and inaccuracy in a and procedures for handling incidents at designated intervals.
AI Justification
The text discusses the need for post-mortem analysis and reviewing documentation related to incidents, which aligns with the requirement to document incidents and maintain records for evaluation.

Document Content
Matched Section
Section: Incident Tracking System (ITS) documentation requirements
Content: The incident tracking system should contain information on the following: The incident Severity, Category and Sensitivity as described above. The current status of the incident (new, in progress, forwarded for investigation, resolved, etc.). A summary of the incident. Indicators related to the incident. Other incidents related to this incident. Actions taken by all incident responders on this incident. Impact assessment(s) related to the incident. Contact information for other involved parties (e.g., system owners, system administrators). A list of evidence gathered during the incident investigation. Comments from incident responders.
AI Justification
The chunk describes the requirements for an Incident Tracking System, which aligns with the provision of incident response support resources as outlined in control IR-7.

Document Content
Matched Section
Section: Incident Response Capabilities
Content: What additional tools or resources are needed to detect, analyze, and mitigate future incidents? Post-mortem analysis of the way an incident was handled will often reveal a missing step or an procedure, providing impetus for change. Because of the changing nature of information technology changes in personnel, the incident response team should review all related documentation and inaccuracy in a and procedures for handling incidents at designated intervals.
AI Justification
The text discusses the need for tools and resources to improve incident detection and response, aligning with the need for a coordinated incident response approach.

Document Content
Matched Section
Section: Containment Plan of Action
Content: Based on the initial interactions from step C1, Information Security determines the containment plan of action in order to constrain the incident. For example, in case of system compromise or malware propagation, put in place an IT quarantine and perform forensics images.
AI Justification
The text discusses the containment phase of incident response, which aligns with the need to manage information spills and the corrective actions required based on the classification of the spilled information.

Document Content
Matched Section
Section: Exception duration and detailed explanation of why the exception is necessary
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the importance of maintenance policies and procedures in the context of security and privacy assurance, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Roles and Responsibilities of Cybersecurity Leadership
Content: (cid:127) Oversees communication with various corporate officers and stakeholders. (cid:127) Coordinating response strategies with other parts of the enterprise or constituency. (cid:127) Coordinating and collaborating with external parties such as vendors, ISPs, other security groups, and law enforcement.
AI Justification
The text discusses roles and responsibilities related to cybersecurity leadership, including the Deputy CISO and BISO, which aligns with the definition of an organizational official responsible for information security.

Document Content
Matched Section
Section: Documentation of personal data breaches and post-incident analysis
Content: Any personal data breaches shall be documented, comprising the facts relating to the personal data breach, its effects and the remedial action taken. That documentation shall enable the supervisory authority to verify compliance with GDPR requirements. Once the Security Operations team obtains the PIR report from the Cyber Security Specialist, they will begin post incident analysis by determining what methods taken throughout the process were successful/unsuccessful in order to determine how best to approach future incidents.
AI Justification
The text discusses the documentation of personal data breaches and the accountability of the Security Operations team in evaluating incidents, which aligns with promoting accountability and transparency in privacy operations.

Document Content
Matched Section
Section: Change Management implementation.
Content: Does the external service provider require a change request to be logged with them? If no, skip to step 8. If yes, contact External Service Provider to initiate the Service Provider change request process, continue to step 7.
AI Justification
The text discusses the involvement of external service providers in the change management process, indicating the need for proper management of external personnel and their privileges.

Document Content
Matched Section
Section: Incident Categorization
Content: The follow provides guidelines for CSIRT Incident Managers (IM) to classify the event category, criticality level, and sensitivity level for each incident. This information will be entered into the appropriate incident tracking system when an incident ticket is created. Consistent incident classification is required for the CSIRT to provide accurate reporting to management on a regular basis. In addition, the classifications will provide CSIRT IM’s with proper incident handling procedures and will form the basis of the interaction between the CSIRT and other departments such as IT and physical security.
AI Justification
The text discusses the categorization of incidents, which aligns with the security categorization process described in RA-2, focusing on the classification of incidents based on their severity and impact.

Document Content
Matched Section
Section: Preparation
Content: Preparation can also be called the pre-incident phase. It involves the steps that are taken before an incident occurs. In other words, this is the time in which the incident responders prepare for the incident. This can include training, defining policies and procedures, gathering tools and necessary software, procuring necessary hardware equipment, etc. This phase includes everything that can aid in faster resolution of an incident including tabletop practice exercises designed to condition the responders react in an orderly, controlled and systematic approach to the onset of an incident. A key part of this preparation process is developing predetermined levels of acceptable risk for specified incident categories, severities and sensitivities.
AI Justification
The chunk discusses the preparation phase before an incident, which includes developing predetermined levels of acceptable risk, aligning with the organization's risk response strategies.

Document Content
Matched Section
Section: Change Management implementation.
Content: Does the external service provider require a change request to be logged with them? If no, skip to step 8. If yes, contact External Service Provider to initiate the Service Provider change request process, continue to step 7.
AI Justification
The text discusses the management of external service providers and the requirements for change requests, which aligns with the control's focus on external system services and the associated responsibilities.

Document Content
Matched Section
Section: Initial Analysis Meeting and Containment Plan of Action
Content: The containment phase begins with Information Security holding an initial analysis meeting (as required, could be face-to-face or over the phone). Information Security will review playbooks and consult with IT Service Owners and Business Owners as required.
AI Justification
The text discusses the importance of policies and procedures in managing security and privacy, which aligns with the requirements of SC-1 for establishing a system and communications protection policy.
anonymized_14.1_IS_Supplier_Relationship_Standards.pdf NIST
49 matches found

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of access control policies and procedures, including the need for approval for exceptions and the definition of minimum security requirements.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The text discusses the due diligence process for assessing supplier controls, which aligns with the principles of information sharing and the need to evaluate the confidentiality, integrity, and availability of information.

Document Content
Matched Section
Section: ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The section discusses enforcement of policies and the consequences of violations, which aligns with the concept of access control policies that govern user behavior and access.

Document Content
Matched Section
Section: Critical/High (inherent) risk and Medium (inherent) risk sections
Content: (cid:127) Critical/High (inherent) risk – suppliers should complete full information security due diligence questionnaire to be reviewed by InfoSec/ (3rd Party Risk Team) Alternatively, an audit report or certification such as ISO 27001 or SOC2/2, SOC3 report may be used in place of the questionnaire to evaluate the adequacy of controls in case the supplier refuses to complete a questionnaire. (cid:127) Medium (inherent) risk – suppliers should complete either a full information security due diligence questionnaire, or a subset of the full worksheet focused on the medium risks, to be reviewed by InfoSec/ (3rd Party Risk Team). Alternatively, an audit report or certification such
AI Justification
The text discusses the need for suppliers to complete information security due diligence, which aligns with the OPSEC process of protecting critical information and assessing risks related to organizational activities.

Document Content
Matched Section
Section: Control: SC-7
Content: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs. Restricting or prohibiting interfaces within organizational systems includes restricting external web traffic to designated web servers within managed interfaces, prohibiting external traffic that appears to be spoofing internal addresses, and prohibiting internal traffic that appears to be spoofing external addresses.
AI Justification
The text discusses managed interfaces, boundary protection, and the importance of restricting traffic to enhance security, which aligns with the SC-7 control.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Retention of documentation
Content: Supplier service provider information security questionnaires, compliance reports, penetration test reports, and other due diligence documentation should be retained and documented.
AI Justification
The text discusses the retention of due diligence documentation, which aligns with the need to manage information retention appropriately to mitigate risks.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data. InfoSec/ (3rd Party Risk Team) should be able to review the completed questionnaire from suppliers and service providers and assess whether the supplier controls sufficiently mitigate the information security inherent risks.
AI Justification
The text discusses the importance of managing supply chain risks, including the development of due diligence worksheets to assess supplier controls, which aligns with the requirements of SR-2.

Document Content
Matched Section
Section: 1.3 SUPPLIER INVENTORY
Content: An inventory of supplier service providers should be maintained, and the inventory should include at least: a) Supplier risk level b) Types of data shared with the supplier c) Brief description of services d) Main point of contact at the supplier e) How access is granted to the supplier f) List of supplier security controls in place g) List of supplier security policies.
AI Justification
The chunk discusses maintaining an inventory of supplier service providers, which aligns with the supply chain elements and processes outlined in control SR-3.

Document Content
Matched Section
Section: 1.3 SUPPLIER INVENTORY
Content: An inventory of supplier service providers should be maintained, and the inventory should include at least: a) Supplier risk level b) Types of data shared with the supplier c) Brief description of services d) Main point of contact at the supplier e) How access is granted to the supplier f) List of supplier security controls in place g) List of supplier security policies.
AI Justification
The text discusses the importance of maintaining an inventory of supplier service providers, which aligns with the principles of Supply Chain OPSEC by identifying critical information and assessing risks associated with suppliers.

Document Content
Matched Section
Section: Supplier contracts and performance monitoring
Content: All Supplier contracts should include specific performance measurement requirements, metrics and Service Level Agreements. Supplier performance should be monitored and evaluated on a regular basis by Test IT or other departments. The Supplier should inform Test of any suspected or actual security breaches or unauthorized access to a Test system or data within a specific time period and also include information whether an unauthorized access to Test Data may have occurred, Test or Test’s client data may have been exposed and may have been subject in a ransomware situation.
AI Justification
The chunk emphasizes the importance of supplier contracts including performance metrics and the obligation for suppliers to notify Test of any security breaches, which aligns with the need for communication and early notification of compromises in the supply chain.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to assessment, authorization, and monitoring, and how exceptions to these policies must be approved, aligning with the CA-1 control.

Document Content
Matched Section
Section: DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data. InfoSec/ (3rd Party Risk Team) should be able to review the completed questionnaire from suppliers and service providers and assess whether the supplier controls sufficiently mitigate the information security inherent risks.
AI Justification
The text discusses the assessment of supplier controls to ensure they mitigate information security risks, which aligns with the requirement for organizations to assess controls as part of their security and privacy requirements.

Document Content
Matched Section
Section: SUSPECTED AND ACTUAL DATA BREACH AND NOTIFICATION
Content: Continuous updates should be provided when and if new information, new evidence was disclosed or material changes occurred, at least on a 2-week basis.
AI Justification
The text discusses the need for continuous updates and monitoring in the context of data breaches, which aligns with the principles of continuous monitoring outlined in CA-7.

Document Content
Matched Section
Section: Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the need for policies and procedures regarding exceptions to security requirements, which aligns with the overarching theme of configuration management policies.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The text discusses the need for due diligence in assessing supplier controls, which aligns with conducting impact analyses to understand security ramifications.

Document Content
Matched Section
Section: 1.3 SUPPLIER INVENTORY
Content: An inventory of supplier service providers should be maintained, and the inventory should include at least: a) Supplier risk level b) Types of data shared with the supplier c) Brief description of services d) Main point of contact at the supplier e) How access is granted to the supplier f) List of supplier security controls in place g) List of supplier security policies.
AI Justification
The chunk discusses maintaining an inventory of supplier service providers, which aligns with the concept of having a centralized inventory for accountability of system components as described in CM-8.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having a contingency planning policy and procedures that address security and privacy assurance, which aligns with CP-1.

Document Content
Matched Section
Section: Detailed explanation of why the exception is necessary.
Content: A record of all approved requests should be maintained by the CISO or his/her designee and be available on request. In emergency situations, exceptions to this policy can be approved by the business unit’s IT Director, the CIO, and the CISO or his/her designee without following the above procedures.
AI Justification
The text discusses the necessity of incident response policies and procedures, including how exceptions can be approved in emergency situations, which aligns with the requirements of control IR-1.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of media protection policies and procedures, including the process for handling exceptions to these policies, which aligns with the requirements of control MP-1.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for physical and environmental protection, including the process for exceptions to these policies.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the need for exceptions to the policy and the process for obtaining approval, which aligns with the planning and implementation of policies and procedures.

Document Content
Matched Section
Section: Control: PM-1
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance of an information security program plan, detailing its purpose, implementation, and updates, which aligns directly with control PM-1.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The text discusses the need for controls to maintain confidentiality, integrity, and availability of critical IT systems and data, which aligns with the protection needs outlined in PM-11.

Document Content
Matched Section
Section: Risk Management Activities
Content: Alternatively, if risks are to be accepted without mitigation, it is the Responsible Executive’s decision, which should be documented, along with a rationale.
AI Justification
The text discusses the role of the Responsible Executive in documenting decisions regarding risk acceptance, which aligns with the accountability aspect of risk management.

Document Content
Matched Section
Section: diligence questionnaire, or a subset of the full worksheet focused on the Low risks
Content: The information security due diligence assessment should document whether Critical, High, Medium, Low risk issues exist with the supplier based on the supplier responses, or whether risks are sufficiently mitigated by the supplier (i.e., residual risk after considering the supplier responses).
AI Justification
The text discusses the assessment of risks associated with suppliers and the documentation of risk-mitigation actions, which aligns with the principles of supply chain risk management.

Document Content
Matched Section
Section: Continuous monitoring at the organization level
Content: on regular basis to determine if it is still appropriate to accept the risks or if additional actions, controls, or safeguards should be taken to mitigate the risks.
AI Justification
The text discusses the need for ongoing assessment of risks and controls, which aligns with the concept of continuous monitoring as described in PM-31.

Document Content
Matched Section
Section: Continuous monitoring requirements
Content: Supplier service provider information security questionnaires, compliance reports, penetration test reports, and other due diligence documentation should be retained and documented.
AI Justification
The mention of retaining and documenting compliance reports and due diligence documentation aligns with the continuous monitoring requirements outlined in CA-7.

Document Content
Matched Section
Section: diligence questionnaire, or a subset of the full worksheet focused on the Low risks
Content: The information security due diligence assessment should document whether Critical, High, Medium, Low risk issues exist with the supplier based on the supplier responses, or whether risks are sufficiently mitigated by the supplier (i.e., residual risk after considering the supplier responses). If residual risk is High or Critical, InfoSec/ (3rd Party Risk Team) should document the risk-mitigation actions to be taken by the supplier and/or Test.
AI Justification
The text discusses documenting risk-mitigation actions and tracking them, which aligns with the requirements for plans of action and milestones.

Document Content
Matched Section
Section: Risk Management Strategy and Supplier Risk Assessment
Content: The information security due diligence assessment should document whether Critical, High, Medium, Low risk issues exist with the supplier based on the supplier responses, or whether risks are sufficiently mitigated by the supplier (i.e., residual risk after considering the supplier responses).
AI Justification
The chunk discusses the assessment of risks associated with suppliers and the documentation of risk mitigation actions, which aligns with the organization's risk management strategy.

Document Content
Matched Section
Section: Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of personnel security policies and procedures, including the process for exceptions to these policies, which aligns with the requirements of PS-1.

Document Content
Matched Section
Section: 1.8 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The section outlines the disciplinary actions that may be taken against users who violate policies, which aligns with the control's focus on sanctions reflecting applicable laws and organizational policies.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information (PII) processing and transparency, which aligns with the PT-1 control.

Document Content
Matched Section
Section: 1.11 CONTROL REFERENCES
Content: NIST SP 800-53 Rev 5 RA-2 Risk Assessment | Security Categorization
AI Justification
The text discusses the process of security categorization, which aligns directly with the control RA-2 that focuses on describing potential adverse impacts and conducting security categorization as part of risk assessment.

Document Content
Matched Section
Section: Risk assessments consider threats, vulnerabilities, likelihood, and impact to organizational operations and assets, individuals, other organizations, and the Nation.
Content: The information security due diligence assessment should document whether Critical, High, Medium, Low risk issues exist with the supplier based on the supplier responses, or whether risks are sufficiently mitigated by the supplier (i.e., residual risk after considering the supplier responses).
AI Justification
The text discusses conducting risk assessments related to suppliers and their risk levels, which aligns with the requirements of RA-3.

Document Content
Matched Section
Section: Risk Assessment and Response
Content: The information security due diligence assessment should document whether Critical, High, Medium, Low risk issues exist with the supplier based on the supplier responses, or whether risks are sufficiently mitigated by the supplier (i.e., residual risk after considering the supplier responses). If residual risk is High or Critical, InfoSec/ (3rd Party Risk Team) should document the risk-mitigation actions to be taken by the supplier and/or Test.
AI Justification
The text discusses the assessment of risks associated with suppliers and the actions to be taken based on the level of risk identified, including mitigation and acceptance of risks.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The text discusses the importance of criticality analysis in assessing the risks associated with system components and their impact on organizational missions, which aligns with the principles of RA-9.

Document Content
Matched Section
Section: System and services acquisition policy and procedures
Content: Control: SA-1: System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of policies and procedures for system and services acquisition, emphasizing collaboration between security and privacy programs.

Document Content
Matched Section
Section: System and services acquisition policy and procedures
Content: Control: SA-1: System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations.
AI Justification
The text mentions the need for policies and procedures that may include external information system services, aligning with the control's focus.

Document Content
Matched Section
Section: System and services acquisition policy and procedures
Content: Control: SA-1: System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations.
AI Justification
The text implies the need for policies that protect supply chains, which aligns with the focus of this control.

Document Content
Matched Section
Section: 1.1 SUPPLIER PROVISIONS
Content: All Supplier contracts and agreements should include, or adhere, at least to the following provisions or requirements as appropriate, based on the function provided.
AI Justification
The text discusses the importance of including specific provisions in supplier contracts related to security, confidentiality, and integrity, which aligns with the need for developmental testing and evaluation to ensure that security controls are implemented correctly.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The text discusses the need for due diligence in assessing supplier controls, which aligns with the resource allocation for information security and privacy, including funding for system acquisition and risk management.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data.
AI Justification
The chunk discusses the due diligence process for suppliers and service providers, which aligns with the need for screening and assessing the trustworthiness of external developers.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: The Supplier Relationship Manager and Relationship Technology Manager should coordinate with InfoSec/ (3rd Party Risk Team) and is responsible for ensuring the supplier or service provider completes the due diligence worksheets or assessments.
AI Justification
The chunk implies the need for assessing the trustworthiness of individuals involved in critical IT systems, which relates to personnel screening.

Document Content
Matched Section
Section: Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the derivation of security and privacy requirements and the flexibility in implementing controls based on organizational needs, which aligns with the essence of SA-4.

Document Content
Matched Section
Section: Control: SA-8: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle.
Content: Control: SA-8: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle (see SA-3). Organizations can apply systems security and privacy engineering principles to new systems under development or to systems undergoing upgrades.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns directly with control SA-8.

Document Content
Matched Section
Section: System security engineering principles can also be used to protect against certain supply chain risks, including incorporating tamper-resistant hardware into a design.
Content: System security engineering principles can also be used to protect against certain supply chain risks, including incorporating tamper-resistant hardware into a design.
AI Justification
The mention of applying systems security and privacy engineering principles to protect against supply chain risks aligns with control SA-9, which addresses external information system services.

Document Content
Matched Section
Section: 1.4 DUE DILIGENCE SUPPLIER SECURITY RISK REQUIREMENTS
Content: InfoSec/ (3rd Party Risk Team) should develop a due diligence worksheet or questionnaire designed to identify the existence of controls to maintain the confidentiality, integrity, and availability of critical IT systems and data. InfoSec/ (3rd Party Risk Team) should be able to review the completed questionnaire from suppliers and service providers and assess whether the supplier controls sufficiently mitigate the information security inherent risks.
AI Justification
The text discusses the need for due diligence in assessing supplier controls, which aligns with the requirements for managing risks associated with external service providers as outlined in SA-9.

Document Content
Matched Section
Section: 1.7 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, including the process for exceptions to these policies.
anonymized_8.0_IS_Access_Control_Identity_Management_Policy_1.pdf NIST
135 matches found

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: Information Access Controls
Content: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The mention of ensuring that information access controls are implemented aligns with the need for account management practices.

Document Content
Matched Section
Section: Physical Access Management
Content: h. Should ensure that physical access to assets is managed and protected.
AI Justification
The requirement to manage and protect physical access to assets relates to access enforcement measures.

Document Content
Matched Section
Section: User accounts, including privileged user accounts, should be locked immediately when an employee is terminated for cause.
Content: User accounts, including privileged user accounts, should be locked immediately when an employee is terminated for cause.
AI Justification
The section discusses the locking of user accounts, which aligns with the concept of device locks as a temporary measure to prevent unauthorized access.

Document Content
Matched Section
Section: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
Content: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses the necessity of strong two-factor authentication, encryption for confidentiality, and secure communication channels for remote access, which aligns with the requirements outlined in AC-17.

Document Content
Matched Section
Section: Controls such as file access limitation, time limit for access and automatic expiration of third-party accounts on specific date are required.
Content: Controls such as file access limitation, time limit for access and automatic expiration of third-party accounts on specific date are required.
AI Justification
The mention of controls such as file access limitation and automatic expiration of third-party accounts aligns with the access enforcement requirements of AC-3.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The text discusses the importance of security controls for mobile computing and remote access, which aligns with the definition and requirements for mobile devices outlined in AC-19.

Document Content
Matched Section
Section: Adequate security for mobile devices goes beyond the requirements specified in AC-19. Many safeguards for mobile devices are reflected in other controls. AC-20 addresses mobile devices that are not organization-controlled.
Content: Adequate security for mobile devices goes beyond the requirements specified in AC-19. Many safeguards for mobile devices are reflected in other controls. AC-20 addresses mobile devices that are not organization-controlled.
AI Justification
The mention of mobile devices not being organization-controlled relates to the need for specific controls and safeguards for such devices, which is covered under AC-20.

Document Content
Matched Section
Section: Definition of User, Privileged User, User Account, Service Account, and Privileged Account
Content: User An individual who utilizes the Information Resources they are authorized to access. Privileged User A user that is authorized (and therefore, trusted) to perform security-relevant functions that ordinary users are not authorized to perform. User Account User accounts, also known as human accounts, are defined as those that match the OpSysID field in employee HR records. Service Account Service accounts, also known as non-human accounts, are all other accounts that do not fit the description of a User Account. Service accounts include, but are not limited to: (cid:127) Database accounts (Oracle, SAP ASE, MS SQL Server, MongoDB, etc.), both local and those in the WDS. (cid:127) NIX accounts, both local and those in the WDS and Unix Directory Service (UDS). (cid:127) Windows accounts, both local and those in the WDS. (cid:127) Application Administration Accounts Privileged Account Privileged User Accounts are accounts that are created for use by
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of different types of accounts, which aligns with the requirements of control AC-2.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy1. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The chunk discusses access control principles that align with the need to restrict and manage access to sensitive information, similar to the information sharing control which emphasizes the importance of managing access based on classification and sensitivity.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers). Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The chunk discusses controlling access to information systems and assets for authorized users, which aligns with the requirements of AC-22 regarding access control and management of information.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy1. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The chunk discusses access control decisions and the principles of restricting and granting access based on business requirements and least privilege, which aligns with the concept of access control decisions.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers).
AI Justification
The text discusses controlling access to information systems and assets, which is relevant to data mining protection as it involves safeguarding sensitive information from unauthorized access.

Document Content
Matched Section
Section: Access Control Policy
Content: Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The text outlines the need for a policy to control access to information resources, which aligns with the requirements of an access control policy.

Document Content
Matched Section
Section: Access Control Policy
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The text mentions limiting access based on roles and the periodic review of access privileges, which aligns with account management practices.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers). Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The text discusses the requirements for controlling access to information systems and assets based on user roles, which aligns with the principles of access control policies as described in AC-25.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities; g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements; h. Should ensure that physical access to assets is managed and protected.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities. g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements. h. Should ensure that physical access to assets is managed and protected.
AI Justification
The chunk discusses the implementation of information access controls and the management of physical access to assets, which aligns with the principles of access control policies.

Document Content
Matched Section
Section: General User Account
Content: User accounts and privileged user account entitlements should be reviewed no less than biannually by the: User’s supervisor. Privileged accounts with enterprise or domain admin rights should also be reviewed by Information Security.
AI Justification
The text discusses the importance of user account management and periodic review of user account entitlements, which aligns with the principles of separation of duties to mitigate risks associated with privileged access.

Document Content
Matched Section
Section: General User Account
Content: Effective user and service account management and periodic review of user account entitlements is not only a regulatory requirement (i.e., Sarbanes-Oxley Act, and General Data Protection Regulation), but it is an essential part of Test’s information security posture.
AI Justification
The mention of effective user and service account management and periodic review aligns with account management practices.

Document Content
Matched Section
Section: Privileged (Application Administration) Account
Content: a. Administrative access to Test computing resources should only be used only for official Test business. b. Use of administrative access should be consistent with an individual’s role or job.
AI Justification
The text discusses the principle of least privilege by emphasizing that administrative access should only be used for official business and should align with an individual's role, which directly relates to the control's focus on limiting access to the minimum necessary.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Comprehensive role-based training addresses management, operational, and technical roles and responsibilities covering physical, personnel, and technical controls.
AI Justification
The text discusses the determination of training content based on roles and responsibilities, which aligns directly with the requirements of AT-3.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The text discusses the provision of literacy training and awareness for system users, which aligns with the requirements of AT-2.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Literacy training after the initial training described in AT-2a.1 is conducted at a minimum frequency consistent with applicable laws, directives, regulations, and policies. Subsequent literacy training may be satisfied by one or more short ad hoc sessions and include topical information on recent attack schemes, changes to organizational security and privacy policies, revised security and privacy expectations, or a subset of topics from the initial training.
AI Justification
The text mentions the need for ongoing literacy training and updates based on various factors, which aligns with the requirements of AT-3.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The chunk discusses ensuring security controls while using mobile computing, which relates directly to the management and restrictions of mobile code as outlined in SC-18.

Document Content
Matched Section
Section: System & Communications Protection | Secure Name/address Resolution Service (authoritative Source)
Content: System & Communications Protection | Secure Name/address Resolution Service (authoritative Source)
AI Justification
The chunk discusses the importance of authoritative source information for network address resolution, which aligns with the requirements of SC-20.

Document Content
Matched Section
Section: User access to networks and network services
Content: Appropriate controls for User access to networks and network services should be deployed to ensure that: Appropriate interfaces are created to segregate Test’s networks from the networks owned by other organizations and public networks.
AI Justification
The chunk discusses appropriate controls for user access to networks, which aligns with the need for separation of user functions from system management functions as described in SC-2.

Document Content
Matched Section
Section: Control over User access to information services
Content: Control over User access to information services is enforced.
AI Justification
The chunk emphasizes the enforcement of control over user access to information services, which aligns with the access enforcement requirements.

Document Content
Matched Section
Section: Users are provided access only to those services
Content: Users are provided access only to those services that they are specifically authorized to use.
AI Justification
The chunk mentions that users are provided access only to those services they are specifically authorized to use, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: Appropriate authentication mechanisms are applied
Content: Appropriate authentication mechanisms are applied for Users of information systems.
AI Justification
The chunk discusses the application of appropriate authentication mechanisms for users, which aligns with the identification and authentication control.

Document Content
Matched Section
Section: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
Content: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses the need for strong authentication and secure communications channels, which aligns with protecting session authenticity.

Document Content
Matched Section
Section: Encryption is to be used to protect the confidentiality of remote access sessions.
Content: Encryption is to be used to protect the confidentiality of remote access sessions.
AI Justification
The mention of encryption to protect the confidentiality of remote access sessions aligns with the need to protect information during transmission.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The text discusses the need for access controls based on business and security requirements, aligning with the principles of access control policies.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The text emphasizes the implementation of access controls to prevent unauthorized access, which aligns with access enforcement principles.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The mention of deploying access controls on the principle of least privilege directly aligns with this control.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The chunk discusses the need for security controls in mobile computing, which aligns with the risks associated with sensor capabilities in mobile devices.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers).
AI Justification
The policy outlines requirements for controlling access to information systems and assets, ensuring that access is limited based on roles and responsibilities.

Document Content
Matched Section
Section: Access Control Policy
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function. Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The policy discusses the management of access privileges, including authorizing, modifying, and revoking access, which aligns with account management practices.

Document Content
Matched Section
Section: Access Control Policy
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The policy emphasizes the need for controlled access to information resources, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: Access Control Policy
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The policy specifies that access should be limited to the minimum necessary, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: Access Control Policy
Content: It also includes the periodic review of information system access privileges.
AI Justification
The policy includes periodic review of access privileges, which is relevant to system use notifications and ensuring users are aware of their access rights.

Document Content
Matched Section
Section: a. Appropriate controls for User access to networks and network services should be deployed to ensure that:
Content: a. Appropriate controls for User access to networks and network services should be deployed to ensure that: i. Appropriate interfaces are created to segregate Test’s networks from the networks owned by other organizations and public networks.
AI Justification
The text discusses the segregation and segmentation of networks to ensure network integrity, which aligns with the control's focus on managed interfaces and boundary protection.

Document Content
Matched Section
Section: iv. Control over User access to information services is enforced.
Content: iv. Control over User access to information services is enforced.
AI Justification
The text emphasizes the enforcement of control over user access to information services, which aligns with the access enforcement control.

Document Content
Matched Section
Section: vi. Authorization process is developed and implemented to ensure that only Users who are authorized may access the network segments and services.
Content: vi. Authorization process is developed and implemented to ensure that only Users who are authorized may access the network segments and services.
AI Justification
The text mentions the authorization process and ensuring that only authorized users can access network segments and services, which aligns with account management principles.

Document Content
Matched Section
Section: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
Content: Encryption is to be used to protect the confidentiality of remote access sessions.
AI Justification
The chunk discusses the use of encryption to protect the confidentiality of remote access sessions, which aligns with the control's focus on protecting transmitted information.

Document Content
Matched Section
Section: 1.7 WORDING and 1.8 GLOSSARY
Content: The following words have a specific meaning in the context of the Information Security Policy and subordinate documents. Words Meaning “WILL” It is mandatory to implement the action defined in the requirement. “WILL NOT The action defined in the requirement is absolutely prohibited. “SHOULD” It is mandatory to implement the action defined in the requirement, unless there is a business justification not to implement it, or it is currently a technological impossibility to implement it. “SHOULD NOT” The action defined in the requirement is prohibited, unless there is a business justification not to implement it, or it is currently a technological impossibility to implement it.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, which aligns directly with the control SI-1.

Document Content
Matched Section
Section: Information management and retention requirements cover the full life cycle of information
Content: Control: SI-12: Information management and retention requirements cover the full life cycle of information, in some cases extending beyond system disposal. Information to be retained may also include policies, procedures, plans, reports, data output from control implementation, and other types of administrative information.
AI Justification
The text discusses the importance of managing and retaining information throughout its lifecycle, which aligns with the requirements of SI-12.

Document Content
Matched Section
Section: Information Resources which are necessary for their work, and the restrictions should be time limited.
Content: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The text discusses the need for secure technologies and monitoring for remote access, which aligns with the need to protect against malicious code and unauthorized access.

Document Content
Matched Section
Section: Encryption is to be used to protect the confidentiality of remote access sessions.
Content: Controls such as file access limitation, time limit for access and automatic expiration of third-party accounts on specific date are required.
AI Justification
The mention of encryption to protect the confidentiality of remote access sessions aligns with the need to prevent unauthorized access and protect against malicious code.

Document Content
Matched Section
Section: Secure technologies supporting pre-approved accounts and monitoring is to be used for remote access.
Content: Secure technologies supporting pre-approved accounts and monitoring is to be used for remote access.
AI Justification
The requirement for secure technologies and monitoring for remote access is relevant to the control of malicious code and unauthorized access.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: Network Monitoring & Defense
AI Justification
The chunk discusses network monitoring and defense, which aligns with the control's focus on system monitoring, including both internal and external monitoring.

Document Content
Matched Section
Section: Access to Networks & Network Services
Content: Access to Networks & Network Services
AI Justification
The mention of access to networks and network services relates to access control enforcement.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The reference to configuration management suggests a focus on ensuring that only necessary functionalities are enabled, which is part of least functionality principles.

Document Content
Matched Section
Section: Service Provider Management
Content: The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization.
AI Justification
The text discusses managing supply chain risks, which includes relationships with external providers and the risks associated with them.

Document Content
Matched Section
Section: Application Software Security
Content: Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware, and poor manufacturing and development practices in the supply chain.
AI Justification
The text mentions the insertion of malicious software and hardware, which relates to application security concerns.

Document Content
Matched Section
Section: The privileged account holders should be prevented from manipulating the logs generated from information processing facilities.
Content: The privileged account holders should be prevented from manipulating the logs generated from information processing facilities.
AI Justification
The text discusses the importance of logging events and preventing manipulation of logs, which aligns with the requirements for auditing and monitoring events.

Document Content
Matched Section
Section: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users.
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers). Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The policy outlines requirements for controlling access to information systems and assets, ensuring that only authorized users have access based on their roles.

Document Content
Matched Section
Section: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function. Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The policy includes provisions for authorizing, modifying, and revoking access, which is essential for effective account management.

Document Content
Matched Section
Section: Access to Information Resources should be controlled through a managed process.
Content: Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The policy mandates that access to information resources is controlled and enforced based on defined roles.

Document Content
Matched Section
Section: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The policy emphasizes limiting access to the minimum necessary for job functions, aligning with the principle of least privilege.

Document Content
Matched Section
Section: It also includes the periodic review of information system access privileges.
Content: It also includes the periodic review of information system access privileges.
AI Justification
The policy implies a need for monitoring access and managing privileges, which relates to handling unsuccessful login attempts.

Document Content
Matched Section
Section: Audit and Accountability
Content: The privileged account holders should be prevented from manipulating the logs generated from information processing facilities.
AI Justification
The text discusses the need to prevent privileged account holders from manipulating logs, which aligns with the control's focus on protecting audit information and ensuring that only authorized individuals can access and manipulate audit logs.

Document Content
Matched Section
Section: Assessment, authorization, and monitoring policy and procedures
Content: Control: CA-1: Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of policies and procedures related to security and privacy assurance, which aligns with the CA-1 control focusing on assessment, authorization, and monitoring.

Document Content
Matched Section
Section: Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
Content: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The mention of ensuring information access controls aligns with the need for an access control policy and procedures.

Document Content
Matched Section
Section: Ensure that physical access to assets is managed and protected.
Content: h. Should ensure that physical access to assets is managed and protected.
AI Justification
The text regarding managing and protecting physical access to assets aligns with the physical and environmental protection controls.

Document Content
Matched Section
Section: External connections to Test networks or Information Resources
Content: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses the need for strong authentication and encryption for external connections, which aligns with the requirements for secure information exchange as outlined in CA-3.

Document Content
Matched Section
Section: Encryption is to be used to protect the confidentiality of remote access sessions.
Content: Encryption is to be used to protect the confidentiality of remote access sessions.
AI Justification
The mention of encryption to protect the confidentiality of remote access sessions aligns with the control's focus on securing information exchanges.

Document Content
Matched Section
Section: Account Remediation Project Plans
Content: that are not configured in EPV and develop a project plan and timeframe to bring these accounts into compliance with this policy. i. IS should approve all account remediation project plans developed by the appropriate IT account management team. ii. IT account management teams tasked with the account remediation should provide IS with weekly project progress reports.
AI Justification
The text discusses the development of a project plan and timeframe for account remediation, which aligns with the need for plans of action and milestones to track remedial actions.

Document Content
Matched Section
Section: Network Monitoring & Defense
Content: Network Monitoring & Defense
AI Justification
The chunk discusses network monitoring and defense, which aligns with the continuous monitoring of systems to support risk management decisions.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The mention of configuration management in the context of network services suggests a need for monitoring configurations to ensure least functionality.

Document Content
Matched Section
Section: Configuration Management Policy and Procedures
Content: Control: CM-1: Configuration management policy and procedures address the controls in the CM family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of configuration management policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission/business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to configuration management policy and procedures include, but are not limited to, assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of configuration management policies and procedures, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Access Control Policy
Content: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The chunk mentions ensuring that information access controls are implemented, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Physical and Environmental Security Policy
Content: h. Should ensure that physical access to assets is managed and protected. Please see 10.0 Physical and Environmental Security Policy for more information.
AI Justification
The text references managing and protecting physical access to assets, which aligns with the physical and environmental security control.

Document Content
Matched Section
Section: Awareness and Training Policy
Content: i. Privileged users should understand their roles and responsibilities.
AI Justification
The mention of privileged users understanding their roles and responsibilities aligns with the need for awareness and training regarding security roles.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The text discusses ensuring security controls for mobile computing and remote access, which aligns with the need for access control measures for mobile devices.

Document Content
Matched Section
Section: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
Content: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The mention of implementing information access controls to meet legal and regulatory requirements aligns with the need for a comprehensive access control policy.

Document Content
Matched Section
Section: h. Should ensure that physical access to assets is managed and protected.
Content: h. Should ensure that physical access to assets is managed and protected.
AI Justification
The text emphasizes managing and protecting physical access to assets, which is directly related to physical access control measures.

Document Content
Matched Section
Section: i. Privileged users should understand their roles and responsibilities.
Content: i. Privileged users should understand their roles and responsibilities.
AI Justification
The mention of privileged users understanding their roles and responsibilities relates to the need for security awareness and training.

Document Content
Matched Section
Section: Identification & Authentication | Adaptive Authentication
Content: Control: IA-10: Adversaries may compromise individual authentication mechanisms employed by organizations and subsequently attempt to impersonate legitimate users. To address this threat, organizations may employ specific techniques or mechanisms and establish protocols to assess suspicious behavior. Suspicious behavior may include accessing information that individuals do not typically access as part of their duties, roles, or responsibilities; accessing greater quantities of information than individuals would routinely access; or attempting to access information from suspicious network addresses. When pre-established conditions or triggers occur, organizations can require individuals to provide additional authentication information. Another potential use for adaptive authentication is to increase the strength of mechanism based on the number or types of records being accessed. Adaptive authentication does not replace and is not used to avoid the use of multi-factor authentication mechanisms but can augment implementations of multi-factor authentication.
AI Justification
The text discusses the use of adaptive authentication to strengthen authentication mechanisms based on user behavior and access patterns, which aligns directly with control IA-10.

Document Content
Matched Section
Section: Identification & Authentication | Re-Authentication
Content: Control: IA-10: Adversaries may compromise individual authentication mechanisms employed by organizations and subsequently attempt to impersonate legitimate users. To address this threat, organizations may employ specific techniques or mechanisms and establish protocols to assess suspicious behavior. Suspicious behavior may include accessing information that individuals do not typically access as part of their duties, roles, or responsibilities; accessing greater quantities of information than individuals would routinely access; or attempting to access information from suspicious network addresses. When pre-established conditions or triggers occur, organizations can require individuals to provide additional authentication information. Another potential use for adaptive authentication is to increase the strength of mechanism based on the number or types of records being accessed. Adaptive authentication does not replace and is not used to avoid the use of multi-factor authentication mechanisms but can augment implementations of multi-factor authentication.
AI Justification
The mention of requiring additional authentication information under certain conditions aligns with the concept of re-authentication, which is covered by control IA-11.

Document Content
Matched Section
Section: Identification & Authentication | Identity Proofing
Content: Control: IA-10: Adversaries may compromise individual authentication mechanisms employed by organizations and subsequently attempt to impersonate legitimate users. To address this threat, organizations may employ specific techniques or mechanisms and establish protocols to assess suspicious behavior. Suspicious behavior may include accessing information that individuals do not typically access as part of their duties, roles, or responsibilities; accessing greater quantities of information than individuals would routinely access; or attempting to access information from suspicious network addresses. When pre-established conditions or triggers occur, organizations can require individuals to provide additional authentication information. Another potential use for adaptive authentication is to increase the strength of mechanism based on the number or types of records being accessed. Adaptive authentication does not replace and is not used to avoid the use of multi-factor authentication mechanisms but can augment implementations of multi-factor authentication.
AI Justification
The discussion of assessing suspicious behavior and the need for additional authentication can relate to identity proofing processes, which are part of control IA-12.

Document Content
Matched Section
Section: Identification & Authentication | Identity Proofing
Content: IA-12: Identity proofing is the process of collecting, validating, and verifying a user’s identity information for the purposes of establishing credentials for accessing a system. Identity proofing is intended to mitigate threats to the registration of users and the establishment of their accounts.
AI Justification
The chunk discusses the process of collecting, validating, and verifying a user's identity information, which aligns directly with the definition of identity proofing.

Document Content
Matched Section
Section: User access to networks and network services
Content: Appropriate controls for User access to networks and network services should be deployed to ensure that: Appropriate authentication mechanisms are applied for Users of information systems.
AI Justification
The chunk discusses appropriate authentication mechanisms for users of information systems, which aligns with the identification and authentication requirements outlined in IA-2.

Document Content
Matched Section
Section: Identifier (SSID)
Content: SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
AI Justification
The chunk discusses the SSID as a unique identifier for devices connecting to a WLAN, which aligns with the requirement for unique device identification and authentication.

Document Content
Matched Section
Section: Term Definition
Content: User accounts, also known as human accounts, are defined as those that match the OpSysID field in employee HR records.
AI Justification
The chunk discusses user accounts and their management, which relates to the identification and management of individual identifiers as outlined in IA-4.

Document Content
Matched Section
Section: Term Definition
Content: User accounts, also known as human accounts, are defined as those that match the OpSysID field in employee HR records.
AI Justification
The text mentions user accounts and the distinction between user accounts and service accounts, which aligns with account management practices.

Document Content
Matched Section
Section: Identification & Authentication | Adaptive Authentication
Content: Control: IA-5: Authenticators include passwords, cryptographic devices, biometrics, certificates, one-time password devices, and ID badges. Device authenticators include certificates and passwords. Initial authenticator content is the actual content of the authenticator (e.g., the initial password). In contrast, the requirements for authenticator content contain specific criteria or characteristics (e.g., minimum password length).
AI Justification
The text discusses various types of authenticators and their management, which aligns directly with the requirements outlined in IA-5.

Document Content
Matched Section
Section: Identification & Authentication | Adaptive Authentication
Content: Identification & Authentication | Adaptive Authentication
AI Justification
The mention of various authenticator characteristics and management aligns with the principles of adaptive authentication.

Document Content
Matched Section
Section: Identification & Authentication | Re-Authentication
Content: Identification & Authentication | Re-Authentication
AI Justification
The text implies the need for re-authentication through the management of authenticators and their characteristics.

Document Content
Matched Section
Section: Authentication Factors
Content: For Test’s implementation authentication, factors one through five are preferred (p), with authentication factors one through three being required(r). The authentication factors are as follows: a. Script or program name. (r)(p) b. Requesting system. (r)(p) c. Script or program location on the requesting system. (r)(p) d. Script or program execution location on the requesting system. (p) e. ID making the request. (p) f. Script or program checksum. If any of the above preset authentication factor checks fail, the credentials will not be surrendered to the requesting script or program.
AI Justification
The chunk discusses the implementation of authentication factors required for access, which aligns with the need for authentication mechanisms to verify operator roles.

Document Content
Matched Section
Section: Identification & Authentication | Adaptive Authentication
Content: Identification & Authentication | Adaptive Authentication IA-11 Identification & Authentication | Re-Authentication IA-12 Identification & Authentication | Identity Proofing
AI Justification
The chunk discusses identification and authentication methods and their application in various services, which aligns with the control's focus on these aspects.

Document Content
Matched Section
Section: Identification & Authentication | Adaptive Authentication
Content: IA-11 Identification & Authentication | Adaptive Authentication
AI Justification
The section discusses the need for strong authentication techniques, which aligns with the concept of adaptive authentication that adjusts based on risk factors.

Document Content
Matched Section
Section: Identification & Authentication | Re-Authentication
Content: IA-12 Identification & Authentication | Re-Authentication
AI Justification
The mention of strong authentication techniques and the need for secure methods aligns with the principles of re-authentication to ensure ongoing identity verification.

Document Content
Matched Section
Section: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users.
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers). Test should define, document, implement, and maintain policies to control access to their Information Resources.
AI Justification
The policy outlines requirements for controlling access to information systems and assets, which aligns with the Access Control Policy control.

Document Content
Matched Section
Section: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function. Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The policy discusses the management of access based on roles and the periodic review of access privileges, which aligns with Account Management.

Document Content
Matched Section
Section: Access Control Policy
Content: The purpose of this policy is to provide requirements controlling access to Test information systems and assets for authorized Users (employees, contractors and suppliers).
AI Justification
The text discusses controlling access to information systems and assets, which aligns with the concept of protecting both digital and non-digital media.

Document Content
Matched Section
Section: Access Control Policy
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The text emphasizes the need for policies to control access based on roles, which aligns with access control principles.

Document Content
Matched Section
Section: Access Control Policy
Content: Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The text mentions authorizing, modifying, and revoking access, which is a key aspect of account management.

Document Content
Matched Section
Section: Access Control Policy
Content: This policy assigns and describes roles and responsibilities for access needs by minimizing risks and maximizing the protection levels for Test’s Information Resources.
AI Justification
The text discusses limiting access to the minimum necessary, which is a principle of access enforcement.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: h. Should ensure that physical access to assets is managed and protected. Please see 10.0 Physical and Environmental Security Policy for more information.
AI Justification
The text discusses the importance of physical access management and the establishment of policies and procedures related to physical and environmental protection.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities; g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements; h. Should ensure that physical access to assets is managed and protected.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities. g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements. h. Should ensure that physical access to assets is managed and protected.
AI Justification
The chunk discusses the importance of managing and protecting physical access to assets, which aligns with the need for environmental controls in facilities housing system resources.

Document Content
Matched Section
Section: User access to networks and network services
Content: Appropriate controls for User access to networks and network services should be deployed to ensure that: ... Authorization process is developed and implemented to ensure that only Users who are authorized may access the network segments and services.
AI Justification
The chunk discusses appropriate controls for user access, including authorization processes and restrictions on access to services, which aligns with the need to enforce authorizations for entry and exit of system components.

Document Content
Matched Section
Section: Protecting Against External & Environmental Threats
Content: Protecting Against External & Environmental Threats
AI Justification
The chunk discusses protecting against external and environmental threats, which aligns with the control's focus on various physical and environmental hazards.

Document Content
Matched Section
Section: Section f, g, and h regarding physical access and security controls.
Content: Ensure that the security controls are in place while using mobile computing and remote access facilities. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements. Should ensure that physical access to assets is managed and protected.
AI Justification
The chunk discusses ensuring physical access to assets, which aligns with the need to manage and protect asset locations as mentioned in PE-20.

Document Content
Matched Section
Section: Securing Offices, Rooms & Facilities
Content: Securing Offices, Rooms & Facilities Protecting Against External & Environmental Threats Access Control Management ISO/IEC 27001:2013 Physical Security Perimeter Physical Entry Controls PR.AC-2 CIS CSC 6 A.11.1.1 A.11.1.2 A.11.1.3 A.11.1.4 A.11.1.5 A.11.1.6 A.11.2.1 Working in Secure Areas Delivery & Loading Areas Equipment Siting & Protection A.11.2.3 Cabling Security A.11.2.5 Removal of Assets Security of Kit & Assets off Premises Secure Disposal & Re-Use of Equipment A.11.2.6 A.11.2.7 A.11.2.8 Unattended User Equipment NIST SP 800-53 Rev 5
AI Justification
The chunk discusses various aspects of physical access control, including securing offices and facilities, which aligns with the requirements of PE-3.

Document Content
Matched Section
Section: Securing Offices, Rooms & Facilities
Content: Securing Offices, Rooms & Facilities Protecting Against External & Environmental Threats Access Control Management ISO/IEC 27001:2013 Physical Security Perimeter Physical Entry Controls Working in Secure Areas Delivery & Loading Areas Equipment Siting & Protection Cabling Security Removal of Assets Security of Kit & Assets off Premises Secure Disposal & Re-Use of Equipment Unattended User Equipment NIST SP 800-53 Rev 5
AI Justification
The chunk discusses securing offices and facilities, which includes considerations for physical security and protection against environmental threats, aligning with the need to protect power equipment and cabling.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements h. Should ensure that physical access to assets is managed and protected. Please see 10.0 Physical and Environmental Security Policy for more information3. i. Privileged users should understand their roles and responsibilities.
AI Justification
The chunk discusses the importance of ensuring that privileged users understand their roles and responsibilities, which aligns with the establishment of rules of behavior for users.

Document Content
Matched Section
Section: Role Responsibility Information Technology
Content: l Is responsible for implementing access as per the request post validation of Information owner approval. l Is responsible for maintaining the updated list of authorized Information owners. l Is responsible for initiating periodic reviews of access rights with Information owners. l Is responsible for changing and revoking access as per approved requests. l Is responsible for granting or denying permissions for remote control software installations on the systems. l Is responsible for the review and approval of wireless access points and modems. l Is responsible for conducting risk assessment wherever required.
AI Justification
The chunk outlines responsibilities related to access control, including validation of information owner approval, maintaining an updated list of authorized information owners, and conducting risk assessments, which aligns with the need for an organization-wide risk management process.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: System & Communications Protection | Network Disconnect System & Communications Protection | Secure Name/address Resolution Service (authoritative Source) Account Management Security Awareness & Skills Training Application Software Security ISO/IEC 27001:2013 Information Security Roles & Responsibilities Information Security Awareness, Education and Training NIST SP 800-53 Rev 5 Awareness & Training | Role-based Training Program Management | Security & Privacy Workforce SC-10 SC-20 PR.AT-2 CIS CSC 5 14 16 A.6.1.1 A.7.2.2 AT-3 PM-13 PR.DS-5 CIS CSC 3 6 13 Data Protection Access Control Management Network Monitoring & Defense
AI Justification
The chunk references workforce development and training programs, which aligns with the requirements of PM-13.

Document Content
Matched Section
Section: Personnel Security | Position Risk Designation
Content: Control: PS-2: Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel security program. The Position Designation System (PDS) assesses the duties and responsibilities of a position to determine the degree of potential damage to the efficiency or integrity of the service due to misconduct of an incumbent of a position and establishes the risk level of that position.
AI Justification
The text discusses the importance of position risk designations and how they reflect OPM policy, which aligns with the control's focus on position risk designation.

Document Content
Matched Section
Section: User accounts management upon employment status changes
Content: User accounts, including privileged user accounts, entitlements (roles, rights and privileges) should be reviewed immediately upon any significant change to the user’s employment status.
AI Justification
The chunk discusses the immediate review and locking of user accounts upon employment status changes, which aligns with the accountability and security constraints mentioned in PS-4.

Document Content
Matched Section
Section: Immediate locking of user accounts upon termination
Content: User accounts, including privileged user accounts, should be locked immediately when an employee is terminated for cause.
AI Justification
The requirement to lock user accounts immediately upon termination for cause directly relates to the accountability for system-related property as outlined in PS-4.

Document Content
Matched Section
Section: Timely execution of user account management after termination
Content: User accounts, including privileged user accounts, should be locked (disabled) within 24 hours of an employee leaving the firm on their scheduled termination date.
AI Justification
The timely locking and deletion of user accounts after termination ensures proper accountability for system-related property.

Document Content
Matched Section
Section: User accounts, including privileged user accounts, entitlements (roles, rights and privileges) should be reviewed immediately upon any significant change to the user’s employment status.
Content: User accounts, including privileged user accounts, entitlements (roles, rights and privileges) should be reviewed immediately upon any significant change to the user’s employment status. Employment status changes include, but are not limited to: Promotions and job function changes. Departmental and business unit transfers.
AI Justification
The chunk discusses the review and management of user accounts upon significant changes to employment status, which aligns with the requirements for personnel transfers.

Document Content
Matched Section
Section: Role Responsibility
Content: l Is responsible for implementing access as per the request post validation of Information owner approval. l Is responsible for maintaining the updated list of authorized Information owners. l Is responsible for initiating periodic reviews of access rights with Information owners. l Is responsible for changing and revoking access as per approved requests. l Is responsible for granting or denying permissions for remote control software installations on the systems. l Is responsible for the review and approval of wireless access points and modems. l Is responsible for conducting risk assessment wherever required. User l Is responsible for ensuring security of access rights. l Is responsible for reporting suspicious activity and account compromise to the Information security team in a timely manner.
AI Justification
The text outlines specific responsibilities related to access control and security, which aligns with the specification of roles and responsibilities.

Document Content
Matched Section
Section: Control: PT-1
Content: Personally identifiable information processing and transparency policy and procedures address the controls in the PT family that are implemented within systems and organizations.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information, which aligns with the PT-1 control.

Document Content
Matched Section
Section: g. Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
Content: Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The mention of ensuring information access controls aligns with the Access Control Policy.

Document Content
Matched Section
Section: h. Should ensure that physical access to assets is managed and protected.
Content: Should ensure that physical access to assets is managed and protected.
AI Justification
The mention of managing and protecting physical access to assets aligns with the Physical and Environmental Security Policy.

Document Content
Matched Section
Section: Security Categorization Process
Content: Security categorization processes facilitate the development of inventories of information assets and, along with CM-8, mappings to specific system components where information is processed, stored, or transmitted.
AI Justification
The text discusses the importance of security categorization in understanding the potential adverse impacts of compromised information and systems, which aligns with the RA-2 control.

Document Content
Matched Section
Section: Access Control Policy
Content: Organizations conduct the security categorization process as an organization-wide activity with the direct involvement of chief information officers, senior agency information security officers, senior agency officials for privacy, system owners, mission and business owners, and information owners or stewards.
AI Justification
The mention of access control policies in the context of security categorization and the involvement of various stakeholders aligns with the need for an access control policy.

Document Content
Matched Section
Section: Vulnerability Monitoring & Analysis
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, the need for comprehensive scanning, and the use of various tools and methodologies to identify vulnerabilities.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The text discusses the importance of implementing information access controls to meet legal and regulatory requirements, which aligns with access control policies.

Document Content
Matched Section
Section: i. Privileged users should understand their roles and responsibilities.
Content: i. Privileged users should understand their roles and responsibilities.
AI Justification
The mention of privileged users understanding their roles and responsibilities aligns with account management practices.

Document Content
Matched Section
Section: h. Should ensure that physical access to assets is managed and protected.
Content: h. Should ensure that physical access to assets is managed and protected.
AI Justification
The text refers to managing and protecting physical access to assets, which is relevant to physical and environmental security controls.

Document Content
Matched Section
Section: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
Content: All external connections to Test networks or Information Resources require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses the necessity of enhancing systems with strong authentication and secure communication channels, which aligns with the need to maximize trustworthiness as described in SA-23.

Document Content
Matched Section
Section: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
Content: f. Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The text discusses the implementation of information access controls to meet legal and regulatory requirements, which aligns with access control policies.

Document Content
Matched Section
Section: i. Privileged users should understand their roles and responsibilities.
Content: i. Privileged users should understand their roles and responsibilities.
AI Justification
The mention of privileged users understanding their roles and responsibilities aligns with account management practices.

Document Content
Matched Section
Section: h. Should ensure that physical access to assets is managed and protected.
Content: h. Should ensure that physical access to assets is managed and protected.
AI Justification
The text refers to managing and protecting physical access to assets, which is a key aspect of physical and environmental protection.

Document Content
Matched Section
Section: Control: SA-8
Content: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle (see SA-3). Organizations can apply systems security and privacy engineering principles to new systems under development or to systems undergoing upgrades.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns with the control's focus on integrating security principles into system development.

Document Content
Matched Section
Section: Control Name: Access Control Policy
Content: Examples of system security engineering principles include: developing layered protections; establishing security and privacy policies, architecture, and controls as the foundation for design and development.
AI Justification
The text mentions establishing security and privacy policies, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: System and communications protection policy and procedures
Content: Ensure that the security controls are in place while using mobile computing and remote access facilities.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, which aligns with the control SC-1.

Document Content
Matched Section
Section: Information access controls
Content: Ensure that information access controls are implemented to meet applicable or relevant contractual, legal and regulatory requirements.
AI Justification
The mention of implementing information access controls to meet contractual, legal, and regulatory requirements aligns with the need for an access control policy.

Document Content
Matched Section
Section: Physical access to assets
Content: Should ensure that physical access to assets is managed and protected.
AI Justification
The reference to managing and protecting physical access to assets aligns with the physical and environmental protection controls.

Document Content
Matched Section
Section: Privileged users understanding roles and responsibilities
Content: Privileged users should understand their roles and responsibilities.
AI Justification
The need for privileged users to understand their roles and responsibilities aligns with the requirement for security awareness and training.

Document Content
Matched Section
Section: Encryption is to be used to protect the confidentiality of remote access sessions.
Content: Encryption is to be used to protect the confidentiality of remote access sessions.
AI Justification
The chunk discusses the use of encryption to protect the confidentiality of remote access sessions, which aligns with the control's focus on employing cryptography for security solutions.

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: Access to Information Resources should be controlled, based on the business and security requirements and in keeping with the asset’s classification in accordance to Test’s 8.0 IS Asset Management Policy. Access controls should be deployed on the principle of least privilege to protect the information from unauthorized access.
AI Justification
The text discusses access control and the management of information resources, which aligns with the concept of security and privacy attributes as they relate to controlling access based on classification and business requirements.
anonymized_9.1_IS_Cryptography_Standards.pdf NIST
96 matches found

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their role in security and privacy assurance.

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text aligns with the need for an access control policy that addresses security and privacy concerns.

Document Content
Matched Section
Section: Remote access controls apply to systems other than public web servers or systems designed for public access.
Content: Remote access controls apply to systems other than public web servers or systems designed for public access.
AI Justification
The text discusses remote access and the need for access controls, which aligns with the Access Control Policy.

Document Content
Matched Section
Section: Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections.
Content: Organizations use encrypted virtual private networks (VPNs) to enhance confidentiality and integrity for remote connections.
AI Justification
The mention of remote access and the use of VPNs indicates a need for controls over access to networks and network services.

Document Content
Matched Section
Section: The use of encrypted VPNs provides sufficient assurance to the organization that it can effectively treat such connections as internal networks.
Content: The use of encrypted VPNs provides sufficient assurance to the organization that it can effectively treat such connections as internal networks if the cryptographic mechanisms used are implemented in accordance with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The text emphasizes the importance of cryptographic mechanisms in securing remote access, which aligns with the policy on cryptographic controls.

Document Content
Matched Section
Section: Access Control Policy
Content: Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and the management of different types of accounts, which aligns with the principles of an access control policy.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: Users requiring administrative privileges on system accounts receive additional scrutiny by organizational personnel responsible for approving such accounts and privileged access.
AI Justification
The text mentions additional scrutiny for users requiring administrative privileges and the roles responsible for approving such accounts, which aligns with managing privileged access rights.

Document Content
Matched Section
Section: Information Access Restriction
Content: Types of accounts that organizations may wish to prohibit due to increased risk include shared, group, emergency, anonymous, temporary, and guest accounts.
AI Justification
The text refers to restrictions on account types and conditions for disabling accounts, which relates to restricting access to information based on account type.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.9.1.1 Access Control Policy
AI Justification
The control aligns with the need for policies governing access to sensitive information, including restrictions based on formal determinations.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.9.4.1 Information Access Restriction
AI Justification
This control is relevant as it addresses the restrictions on sharing sensitive information based on its classification.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.13.2.4 Confidentiality or Non-Disclosure Agreements
AI Justification
The mention of non-disclosure agreements (NDA) directly relates to this control, emphasizing the need for confidentiality in information sharing.

Document Content
Matched Section
Section: Access Control | Information Flow Enforcement
Content: AC-4 Access Control | Information Flow Enforcement
AI Justification
The chunk discusses the enforcement of access control decisions, which aligns with the concept of information flow enforcement.

Document Content
Matched Section
Section: Access Control | Separation of Duties and Least Privilege
Content: Access Control | Separation of Duties Access Control | Least Privilege
AI Justification
The chunk discusses access control principles, including separation of duties and least privilege, which are fundamental aspects of access control policies.

Document Content
Matched Section
Section: Control: AC-4: Information flow control
Content: Control: AC-4: Information flow control regulates where information can travel within a system and between systems (in contrast to who is allowed to access the information) and without regard to subsequent accesses to that information.
AI Justification
The text discusses the regulation of information flow and access control mechanisms, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Organizations commonly employ information flow control policies and enforcement mechanisms
Content: Organizations commonly employ information flow control policies and enforcement mechanisms to control the flow of information between designated sources and destinations within systems and between connected systems.
AI Justification
The text emphasizes the importance of policies and enforcement mechanisms for controlling the flow of information, which aligns with information transfer policies.

Document Content
Matched Section
Section: Access Control | Separation of Duties
Content: Access Control | Separation of Duties
AI Justification
The chunk explicitly mentions 'Separation of Duties' which aligns directly with control AC-5 that addresses the potential for abuse of authorized privileges.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Access Control | Least Privilege
AI Justification
The mention of 'Least Privilege' in the chunk suggests a focus on minimizing access rights, which is aligned with control AC-6.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of awareness and training policies and procedures, aligning directly with control AT-1.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Procedures can be directed at the individual or role that is the object of the procedure.
AI Justification
The mention of procedures directed at individuals or roles aligns with the need for role-based training as specified in AT-3.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The text discusses the provision of literacy training and awareness for system users, which aligns with the requirements of AT-2.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Subsequent literacy training may be satisfied by one or more short ad hoc sessions and include topical information on recent attack schemes, changes to organizational security and privacy policies, revised security and privacy expectations, or a subset of topics from the initial training.
AI Justification
The mention of tailored training based on organizational requirements and user roles aligns with AT-3.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the determination of training content based on roles and responsibilities, aligning with the requirements of AT-3.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the implementation of security requirements and mechanisms, including the process for requesting exceptions to policies, which aligns with the need for audit and accountability policies.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process. Moreover, the business process protection requirement, i.e. Confidentiality, Integrity, and Non-Repudiation, should be documented, typically within a project’s (non-functional) requirements, before cryptographic mechanisms, algorithm, or associated tools and services are implemented.
AI Justification
The text discusses the importance of non-repudiation in ensuring that actions related to information assets are verifiable and cannot be denied by the individuals involved.

Document Content
Matched Section
Section: Control: SC-2
Content: System management functionality includes functions that are necessary to administer databases, network components, workstations, or servers. These functions typically require privileged user access.
AI Justification
The text discusses the necessity of privileged user access for system management functions, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Control: SC-2
Content: The separation of user functions from system management functions is physical or logical.
AI Justification
The separation of user functions from system management functions implies a need for managing privileged access rights.

Document Content
Matched Section
Section: Control: SC-2
Content: Separation of system management functions from user functions includes web administrative interfaces that employ separate authentication methods for users of any other system resources.
AI Justification
The mention of separate authentication methods for administrative interfaces indicates the use of privileged utility programs.

Document Content
Matched Section
Section: Confidential, Restricted information or applications that require transactional integrity
Content: Confidential, Restricted information or applications that require transactional integrity such as, but not exclusive to, trading and client-identifying information should leverage cryptographic protection.
AI Justification
The text discusses the need for cryptographic protection to ensure transactional integrity and protect sensitive information, which aligns with the requirement for session authenticity protection.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The text discusses the importance of ensuring data confidentiality and integrity for information assets, which aligns with the focus of SC-28 on protecting information at rest.

Document Content
Matched Section
Section: Access Control | Information Flow Enforcement
Content: AC-4 Access Control | Information Flow Enforcement
AI Justification
The control focuses on enforcing policies related to information flow, which aligns with the need to prevent bypassing policy enforcement mechanisms.

Document Content
Matched Section
Section: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture.
Content: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture.
AI Justification
The text discusses managed interfaces and boundary protection, which directly relates to access control measures for networks and services.

Document Content
Matched Section
Section: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary.
Content: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).
AI Justification
The mention of boundary protection and network components indicates the implementation of controls to manage network security.

Document Content
Matched Section
Section: Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs.
Content: Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs.
AI Justification
The text refers to subnetworks and demilitarized zones (DMZs), which are relevant to network segregation practices.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The chunk discusses the importance of ensuring data confidentiality and integrity during the storage, processing, or exchange of information assets, which aligns with the requirements of SC-8.

Document Content
Matched Section
Section: System and Information Integrity Policy and Procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including the ability to define stronger or lower security requirements based on risk, which aligns with the intent of SI-1.

Document Content
Matched Section
Section: Access Control | Separation of Duties
Content: Control: SI-12: Information management and retention requirements cover the full life cycle of information, in some cases extending beyond system disposal. Information to be retained may also include policies, procedures, plans, reports, data output from control implementation, and other types of administrative information.
AI Justification
The text discusses information management and retention requirements, which aligns directly with the control's focus on the full life cycle of information.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Access Control | Least Privilege AC-5 AC-6
AI Justification
The mention of access control and separation of duties relates to the principle of least privilege, which is a key aspect of AC-6.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The text discusses the importance of ensuring data integrity and the use of cryptographic mechanisms to protect information assets, which aligns with the control's focus on preventing unauthorized changes and ensuring integrity.

Document Content
Matched Section
Section: Policy and Procedures for Supply Chain Risk Management
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of policies and procedures related to security and privacy, including the implementation of stronger or lower security requirements based on risk, which aligns with the principles of supply chain risk management.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The section discusses the confidentiality of the document and the restrictions on its use and disclosure, which aligns with the control's focus on preventing unauthorized disclosure of information.

Document Content
Matched Section
Section: Assessment, authorization, and monitoring policy and procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of policies and procedures in addressing security and privacy assurance, aligning with the CA-1 control which emphasizes the need for such policies in the CA family.

Document Content
Matched Section
Section: Configuration Management Policy and Procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of configuration management policies and procedures, including the ability to implement stronger or weaker security requirements based on risk, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.9.1.1 Access Control Policy
AI Justification
The control emphasizes the need for qualified and authorized individuals to access systems, aligning with the Access Control Policy.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.9.4.1 Information Access Restriction
AI Justification
The control discusses access restrictions, which is relevant to the Information Access Restriction control.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures.
AI Justification
The text discusses the establishment of policies and procedures related to contingency planning, including the need for collaboration between security and privacy programs, which aligns with CP-1.

Document Content
Matched Section
Section: Contingency Planning | Contingency Training
Content: Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training.
AI Justification
The text discusses the importance of contingency training linked to roles and responsibilities, which aligns directly with the CP-3 control.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Training for contingency roles or responsibilities reflects the specific continuity requirements in the contingency plan.
AI Justification
The mention of role-specific training in the context of contingency operations aligns with the AT-3 control regarding role-based training.

Document Content
Matched Section
Section: Identification and authentication policy and procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, including how they should be developed and the conditions under which exceptions can be made.

Document Content
Matched Section
Section: Identification and Authentication Requirements
Content: Organizations can satisfy the identification and authentication requirements by complying with the requirements in HSPD 12. Organizational users include employees or individuals who organizations consider to have an equivalent status to employees (e.g., contractors and guest researchers). Unique identification and authentication of users applies to all accesses other than those that are explicitly identified in AC-14 and that occur through the authorized use of group authenticators without individual authentication.
AI Justification
The text discusses the identification and authentication requirements for users accessing organizational systems, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Access Types
Content: Access to organizational systems is defined as either local access or network access. Local access is any access to organizational systems by users or processes acting on behalf of users, where access is obtained through direct connections without the use of networks. Network access is access to organizational systems by users (or processes acting on behalf of users) where access is obtained through network connections (i.e., nonlocal accesses).
AI Justification
The text describes different types of access (local, network, and remote) to organizational systems, which is relevant to access control for networks and services.

Document Content
Matched Section
Section: Identification and Authentication Requirements
Content: Unique identification and authentication of users applies to all accesses other than those that are explicitly identified in AC-14 and that occur through the authorized use of group authenticators without individual authentication.
AI Justification
The text emphasizes the need for unique identification and authentication, which relates to restricting access to information based on user identity.

Document Content
Matched Section
Section: NIST CSF Subcategory Control Reference
Content: A.9.1.1 Access Control Policy
AI Justification
The chunk discusses the identification and authentication of users, which is a key aspect of access control policies.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Control: IR-1: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of incident response policies and procedures, including how they should be developed and updated based on various factors, which aligns with the intent of control IR-1.

Document Content
Matched Section
Section: Incident Response | Incident Response Training
Content: Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources.
AI Justification
The chunk discusses the importance of incident response training tailored to different roles within an organization, which aligns directly with the requirements of control IR-2.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: For example, users may only need to know who to call or how to recognize an incident; system administrators may require additional training on how to handle incidents.
AI Justification
The mention of role-based training in the context of incident response aligns with control AT-3, which emphasizes the need for training based on specific roles.

Document Content
Matched Section
Section: Maintenance policy and procedures
Content: Control: MA-1: Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of maintenance policy and procedures.
AI Justification
The text discusses the importance of maintenance policies and procedures in addressing security and privacy assurance, aligning with the control's focus on maintenance policy and procedures.

Document Content
Matched Section
Section: Access Control | Separation of Duties
Content: Control: MA-5: Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems.
AI Justification
The text discusses the need for access control and the separation of duties among maintenance personnel and other individuals who may require access to systems.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Individuals not previously identified as authorized maintenance personnel—such as information technology manufacturers, vendors, systems integrators, and consultants—may require privileged access to organizational systems, such as when they are required to conduct maintenance activities with little or no notice.
AI Justification
The mention of temporary credentials and access authorizations aligns with the principle of least privilege, ensuring individuals only have access necessary for their tasks.

Document Content
Matched Section
Section: Personnel Security | Monitoring Physical Access
Content: Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals.
AI Justification
The text implies the need for agreements or authorizations for maintenance personnel and other individuals accessing the systems, which aligns with access agreements.

Document Content
Matched Section
Section: Control References
Content: Control: MP-1: Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of media protection policy and procedures.
AI Justification
The text discusses the importance of media protection policies and procedures, their development, and the collaboration between security and privacy programs, which aligns directly with the intent of control MP-1.

Document Content
Matched Section
Section: Control References
Content: Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure.
AI Justification
The mention of procedures that describe how policies or controls are implemented aligns with the requirements of MP-2, which focuses on media access controls.

Document Content
Matched Section
Section: Control References
Content: The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations.
AI Justification
The text implies the need for policies that may cover various aspects of media protection, which can include marketing considerations as outlined in MP-3.

Document Content
Matched Section
Section: Control References
Content: Events that may precipitate an update to media protection policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The discussion of procedures and policies related to media protection suggests alignment with MP-4, which focuses on the storage of media.

Document Content
Matched Section
Section: Media Protection
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media.
AI Justification
The text discusses the physical control and accountability of stored media, which aligns with the requirements of MP-4.

Document Content
Matched Section
Section: Media Protection
Content: Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library.
AI Justification
The mention of procedures for checking out and returning media relates to the transport of media, aligning with MP-5.

Document Content
Matched Section
Section: Media Protection
Content: maintaining accountability for stored media.
AI Justification
The control of media and ensuring accountability implies the need for sanitization processes, which aligns with MP-6.

Document Content
Matched Section
Section: System and Communications Protection
Content: Secure storage includes a locked drawer, desk, or cabinet or a controlled media library.
AI Justification
The text discusses secure storage and physical access controls, which relate to protecting information at rest.

Document Content
Matched Section
Section: Media Protection | Media Use
Content: Media use protections also apply to mobile devices with information storage capabilities. In contrast to MP-2, which restricts user access to media, MP-7 restricts the use of certain types of media on systems, for example, restricting or prohibiting the use of flash drives or external hard disk drives.
AI Justification
The text discusses the restrictions and protections related to the use of various types of media, including portable storage devices, which aligns directly with the control's focus on media use.

Document Content
Matched Section
Section: Media Protection | Media Downgrading
Content: MP-8: Media downgrading applies to digital and non-digital media subject to release outside of the organization, whether the media is considered removable or not. When applied to system media, the downgrading process removes information from the media, typically by security category or classification level, such that the information cannot be retrieved or reconstructed. Downgrading of media includes redacting information to enable wider release and distribution. Downgrading ensures that empty space on the media is devoid of information.
AI Justification
The chunk directly references the control MP-8, which pertains to the downgrading of media to ensure information cannot be retrieved or reconstructed.

Document Content
Matched Section
Section: Physical and Environmental Protection Policy and Procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of having policies and procedures for physical and environmental protection, including the ability to define stronger or lower security requirements based on risk, which aligns with the intent of PE-1.

Document Content
Matched Section
Section: Access Control | Separation of Duties and Access Control | Least Privilege
Content: Access Control | Separation of Duties Access Control | Least Privilege AC-5 AC-6 AU-13 PE-19 PS-6 SC-7 SI-4 1.7 Audit & Accountability | Monitoring for Information Disclosure Physical & Environmental Protection | Information Leakage Personnel Security | Monitoring Physical Access System & Communications Protection | Boundary Protection System & Information Integrity | System Monitoring
AI Justification
The chunk discusses various aspects of access control, including physical access for employees and visitors, which aligns with the requirements of PE-3.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of policies and procedures for security and privacy, including the process for requesting exceptions to these policies, which aligns with the planning and procedural aspects of control PL-1.

Document Content
Matched Section
Section: Control baselines and stakeholder needs
Content: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest.
AI Justification
The text discusses the importance of control baselines and access control measures that are essential for protecting privacy and information systems.

Document Content
Matched Section
Section: Control: PL-11
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions. Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions, the environments where their systems operate, the threats and vulnerabilities that can affect their systems, and any other conditions or situations that can impact their mission or business success.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns directly with the control's focus on customizing baseline controls.

Document Content
Matched Section
Section: Rules of behavior represent a type of access agreement for organizational users.
Content: Rules of behavior represent a type of access agreement for organizational users. Other types of access agreements include nondisclosure agreements, conflict-of-interest agreements, and acceptable use agreements (see PS-6). Organizations consider rules of behavior based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.
AI Justification
The text discusses rules of behavior which are a fundamental aspect of access control policies, particularly in defining user roles and responsibilities.

Document Content
Matched Section
Section: Organizations consider rules of behavior based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.
Content: Organizations consider rules of behavior based on individual user roles and responsibilities and differentiate between rules that apply to privileged users and rules that apply to general users.
AI Justification
The text mentions differentiating between rules that apply to privileged users and general users, which aligns with the management of privileged access rights.

Document Content
Matched Section
Section: Access Control Policy
Content: A.9.1.1 Access Control Policy
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls and processes.

Document Content
Matched Section
Section: Information Security Program Plan
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance of an information security program plan, detailing its purpose, implementation, and updates, which aligns directly with the control's description.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The text discusses the need for protection capabilities that counter threats to information confidentiality, integrity, and availability, aligning with the requirements outlined in control PM-11.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based training programs for individuals assigned security and privacy roles and responsibilities; and providing standards and guidelines for measuring and building individual qualifications for incumbents and applicants for security- and privacy-related positions.
AI Justification
The chunk discusses the importance of training programs and workforce development in security and privacy roles, which aligns directly with the objectives outlined in PM-13.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: developing role-based training programs for individuals assigned security and privacy roles and responsibilities
AI Justification
The mention of developing role-based training programs for individuals assigned security and privacy roles aligns with the objectives of AT-3.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Information Security Awareness, Education and Training
AI Justification
The chunk discusses the importance of training and awareness in information security, which aligns with the need for role-based training.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: A process for organization-wide security and privacy testing, training, and monitoring helps ensure that organizations provide oversight for testing, training, and monitoring activities and that those activities are coordinated.
AI Justification
The chunk emphasizes the need for organization-wide security and privacy testing, training, and monitoring, which aligns with the PM-14 control.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary...
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information. 3. Detailed explanation of why the exception is necessary. 4. Detailed mitigation information, if available.
AI Justification
The text discusses the establishment of security policies and procedures, including the ability to define stronger or lower protection levels based on risk, which aligns with the need for personnel security policies.

Document Content
Matched Section
Section: Personnel screening and rescreening activities
Content: Personnel screening and rescreening activities reflect applicable laws, executive orders, directives, regulations, policies, standards, guidelines, and specific criteria established for the risk designations of assigned positions.
AI Justification
The control directly relates to personnel screening and rescreening activities, which is the primary focus of the provided text.

Document Content
Matched Section
Section: Risk assessment policy and procedures
Content: Control: RA-1: Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the establishment of policies and procedures for risk assessment, including the need for collaboration between security and privacy programs, which aligns with the intent of RA-1.

Document Content
Matched Section
Section: Security Categorization Process
Content: Security categorization processes facilitate the development of inventories of information assets and, along with CM-8, mappings to specific system components where information is processed, stored, or transmitted.
AI Justification
The text discusses the process of security categorization and its importance in understanding potential adverse impacts on organizational operations and assets.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of policies and procedures related to security and privacy, which aligns with the requirements of SA-1 regarding system and services acquisition.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Information Security Awareness, Education and Training
AI Justification
The chunk discusses the importance of training for personnel, which aligns with the requirement for role-based training to ensure effectiveness in security controls.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The text discusses enhancing trustworthiness through cryptographic mechanisms, which aligns with the need for system enhancements to support mission-essential services.

Document Content
Matched Section
Section: PURPOSE
Content: Moreover, the business process protection requirement, i.e. Confidentiality, Integrity, and Non-Repudiation, should be documented, typically within a project’s (non-functional) requirements, before cryptographic mechanisms, algorithm, or associated tools and services are implemented.
AI Justification
The mention of cryptographic mechanisms and the need for confidentiality, integrity, and non-repudiation aligns with the requirements for managing cryptographic keys.

Document Content
Matched Section
Section: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization.
Content: Controls can be viewed as descriptions of the safeguards and protection capabilities appropriate for achieving the particular security and privacy objectives of the organization and for reflecting the security and privacy requirements of stakeholders.
AI Justification
The text discusses the importance of controls in achieving security and privacy objectives, which aligns with the need for an access control policy.

Document Content
Matched Section
Section: Requirements can include mandated configuration settings that specify allowed functions, ports, protocols, and services.
Content: Requirements can include mandated configuration settings that specify allowed functions, ports, protocols, and services.
AI Justification
The mention of documentation and configuration settings implies the need for proper labeling and handling of information.

Document Content
Matched Section
Section: System and communications protection policy and procedures
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of security policies and procedures, including the ability to define stronger or lower security requirements based on risk, which aligns with the need for a comprehensive system and communications protection policy.

Document Content
Matched Section
Section: PURPOSE
Content: To ensure appropriate use of cryptography, the system owners should confirm the Data Confidentiality and Data Integrity of the Information Assets being stored, processed, or exchanged in the fulfillment of the given business process.
AI Justification
The chunk discusses the importance of ensuring data confidentiality and integrity through cryptographic mechanisms, which aligns with the requirements for cryptographic key management.

Document Content
Matched Section
Section: 1.1 APPLICABILITY and 1.2 SUPPORTED CRYPTOGRAPHIC ALGORITHMS
Content: This document is applicable to all digital content that is protected or is required to be protected by use of cryptographic techniques within Test. The supported cryptographic algorithms (ciphers) will align with industry standards. Most standards will align with the U.S. NIST Standards including FIPS and exceptions will be reviewed for countries that offer separate standards than is commonly adopted.
AI Justification
The text discusses the use of cryptographic techniques to protect digital content and aligns with the control's focus on employing cryptography for security solutions.
anonymized_14.1.0.1_IS_Supplier_Relationship_Guidelines.pdf NIST
81 matches found

Document Content
Matched Section
Section: Access Control Policy and Procedures
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the requirements for suppliers and contractors to assess access levels and comply with access control policies, which aligns with the need for an access control policy and procedures.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the assessment of access allowed to individual users and emphasizes the need for individual access rather than shared credentials, aligning with the principles of account management.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The chunk discusses the nature of access allowed to individual users and emphasizes the need for access control measures, which aligns with the principles of information sharing and access restrictions.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the assessment of access allowed to individual users and emphasizes the necessity of justifiable access, which aligns with the concept of access control decisions.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the requirement for suppliers and contractors to assess access levels and ensure that access is limited to necessary data, aligning with the principles of access control policies.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy. Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The text discusses the requirement for suppliers and contractors to assess access levels for individual users and emphasizes the need for access control policies that ensure only necessary access is granted.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The chunk discusses the requirement for individual staff members to have access only to the data necessary for their duties, which aligns with the principle of separation of duties to prevent abuse of access privileges.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
AI Justification
The mention of preventing the use of shared credentials and the need for regular reviews of authorized access aligns with account management practices.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies.
AI Justification
The text discusses the importance of training for contractor personnel in security policies, which aligns with the awareness and training policy requirements.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies. b) Security training, including new threats and vulnerabilities, should be required for all developers and system administration staff. c) All personnel with access to Test data should have information security training for their respective roles. d) Refresher training should be required annually. e) All development (contractor)-staff should be trained in secure coding principles and best practices. Training materials are updated on an ongoing basis to include new threats and vulnerabilities. Annual evidence showing that training had been conducted and successfully completed should be provided.
AI Justification
The text discusses the requirement for training contractor personnel in security policies and the need for ongoing updates to training materials, which aligns with the control's focus on literacy training and awareness.

Document Content
Matched Section
Section: SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies. b) Security training, including new threats and vulnerabilities, should be required for all developers and system administration staff. c) All personnel with access to Test data should have information security training for their respective roles. d) Refresher training should be required annually. e) All development (contractor)-staff should be trained in secure coding principles and best practices. Training materials are updated on an ongoing basis to include new threats and vulnerabilities. Annual evidence showing that training had been conducted and successfully completed should be provided.
AI Justification
The text emphasizes the importance of role-based training for personnel, including contractors, to ensure they are knowledgeable about security policies and practices relevant to their roles.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the requirements for suppliers and contractors to assess access and comply with access control policies, which aligns with the need for an access control policy and procedures.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The mention of ensuring that individual staff members only have access to necessary data and preventing shared credentials aligns with account management principles.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
AI Justification
The text emphasizes the need for regular reviews of authorized access, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The text outlines the need for physical security measures to protect information, which aligns with physical and environmental protection policies.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the requirement for suppliers and contractors to assess access and ensure that individual staff members only have access to necessary data, which aligns with access control policies.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The mention of preventing the use of shared credentials and detecting default passwords aligns with account management practices.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
AI Justification
The requirement for regular reviews to ensure authorized access is necessary aligns with access enforcement controls.

Document Content
Matched Section
Section: Communications Security
Content: a) Supplier and/or contractor should secure all backup media during transportation and in storage.
AI Justification
The chunk discusses various aspects of securing sensitive information, including access restrictions and secure disposal, which align with the protection of information at rest.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text emphasizes the need for access control measures and the justification for access based on duties, which aligns with the Access Control Policy.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The mention of preventing shared credentials and the need for physical security measures aligns with the intent of SC-46 to enforce logical and physical policy mechanisms.

Document Content
Matched Section
Section: IV. Communications Security
Content: a) Supplier and/or contractor should secure all backup media during transportation and in storage. b) Supplier and/or contractor should catalog all media so that a missing storage unit (and which unit it is) shall be easily identified. c) Media should not be labeled in such a way that it discloses the data it contains or its owner company in a manner that is easily identified by an outsider.
AI Justification
The chunk discusses various aspects of communications security, including the protection of sensitive information during transportation and storage, which aligns with the need to protect the confidentiality and integrity of transmitted information.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the need for a supply chain risk management policy and procedures.

Document Content
Matched Section
Section: Data Protection and Disposal Procedures
Content: All Confidential hard copy data that is no longer required should be shredded by use of a crosscut shredder.
AI Justification
The chunk discusses the proper disposal of confidential hard copy data, which aligns with the control's focus on data disposal at any stage of the system development life cycle.

Document Content
Matched Section
Section: Scope and Applicability
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the need to manage supply chain risks as outlined in SR-2.

Document Content
Matched Section
Section: Scope and Applicability
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls and the review process by the organization, which aligns with the assessment and review of supplier risk.

Document Content
Matched Section
Section: Scope
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the principles of Supply Chain OPSEC.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: DOCUMENT CLASSIFICATION Confidential The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The document classification and restrictions on copying, using, or disclosing information align with the control's focus on preventing unauthorized disclosure.

Document Content
Matched Section
Section: Perimeter security and restrictions on access to sensitive areas
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms)
AI Justification
The chunk discusses the importance of securing sensitive areas and managing access to information, which aligns with understanding where information is processed and stored.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The chunk discusses the requirement for individuals to have access only to the data necessary for their duties, which aligns with access enforcement principles.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The mention of physical security measures indicates a focus on controlling physical access to systems and information.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the importance of contingency planning policies and procedures, emphasizing their role in security and privacy assurance, which aligns with CP-1.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies.
AI Justification
The chunk discusses the need for training related to security policies and roles, which aligns with the requirement for contingency training linked to assigned roles and responsibilities.

Document Content
Matched Section
Section: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the importance of access control and the need for policies and procedures related to identification and authentication, which aligns with the IA-1 control.

Document Content
Matched Section
Section: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
Content: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
AI Justification
The text emphasizes the need for access control measures and policies, which aligns with the AC-1 control.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the need for individual staff members to have controlled access to data and emphasizes the importance of preventing shared credentials, which aligns with the need for re-authentication in certain situations.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the need for individuals to have access only to the data necessary for their duties, which aligns with the concept of adaptive authentication that assesses user behavior and access patterns.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The text discusses the requirement for individual user access and the prevention of shared credentials, which aligns with the identification and authentication requirements outlined in IA-2.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The mention of preventing the use of shared credentials and ensuring individual access aligns with the intent of AC-14, which addresses actions that may occur without individual authentication.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The text discusses the requirement for individual users to have access only to the data necessary for their duties, which aligns with the management of authenticators and the prevention of shared credentials.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Access control should be supported by regular reviews to ensure that all authorized access to Test data is strictly necessary and justifiable for the performance of a function.
AI Justification
The text emphasizes the need for access control measures and regular reviews to ensure authorized access is necessary, which aligns with access enforcement controls.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The chunk discusses the requirement for suppliers and contractors to assess access and ensure individual user identification, which aligns with the need for unique identification and authentication of non-organizational users.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The mention of preventing shared credentials and ensuring access is justifiable aligns with the control's focus on defining and enforcing access permissions based on user roles.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies.
AI Justification
The chunk discusses the necessity of training for contractor personnel in security policies, which aligns with the need for incident response training tailored to roles and responsibilities.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: c) All personnel with access to Test data should have information security training for their respective roles.
AI Justification
The mention of security training for all personnel with access to Test data aligns with the need for awareness training as part of incident response.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: b) Security training, including new threats and vulnerabilities, should be required for all developers and system administration staff.
AI Justification
The requirement for training specific to roles, such as developers and system administration staff, aligns with role-based training requirements.

Document Content
Matched Section
Section: Supplier and/or contractor is required to assess the nature of access allowed to an individual user
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control &Identity Management policy.
AI Justification
The chunk discusses the access control requirements for suppliers and contractors, which aligns with the need for maintenance personnel to have appropriate access based on their duties.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The mention of physical security measures aligns with the need for physical access controls for maintenance personnel.

Document Content
Matched Section
Section: Section IV. Communications Security
Content: a) Supplier and/or contractor should secure all backup media during transportation and in storage. b) Supplier and/or contractor should catalog all media so that a missing storage unit (and which unit it is) shall be easily identified. c) Media should not be labeled in such a way that it discloses the data it contains or its owner company in a manner that is easily identified by an outsider.
AI Justification
The chunk discusses restrictions on access to sensitive areas and secure disposal of records, which aligns with the control's focus on protecting both digital and non-digital media.

Document Content
Matched Section
Section: Media Protection and Communications Security
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms) c) Computer location (so that the screen may not be viewed by members of the public) storage of files (files not stored in public areas with access restricted to staff with a need to access files) d) Secure disposal of records (effective 'wiping' of data stored electronically, secure disposal of paper records).
AI Justification
The chunk discusses perimeter security, access restrictions to sensitive areas, secure disposal of records, and the secure handling of backup media, which aligns with the control's focus on protecting both digital and non-digital media.

Document Content
Matched Section
Section: IV. Communications Security
Content: a) Supplier and/or contractor should secure all backup media during transportation and in storage.
AI Justification
The chunk discusses the secure transport and storage of media, which aligns with the requirements for protecting system media during transport.

Document Content
Matched Section
Section: Secure disposal of records
Content: d) Secure disposal of records (effective 'wiping' of data stored electronically, secure disposal of paper records).
AI Justification
The chunk discusses secure disposal of records, including effective wiping of data stored electronically, which aligns with the media sanitization control.

Document Content
Matched Section
Section: Secure disposal of records
Content: Secure disposal of records (effective 'wiping' of data stored electronically, secure disposal of paper records).
AI Justification
The text discusses secure disposal of records and effective 'wiping' of data, which aligns with the concept of downgrading media to ensure sensitive information is not retrievable.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The text discusses the need for suppliers and contractors to implement physical security measures and access control policies, which aligns with the requirements of PE-1 regarding the establishment of policies and procedures for physical and environmental protection.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The text emphasizes the importance of access control policies and procedures, including the need for individual access based on necessity and the prevention of shared credentials, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: Perimeter security and restrictions on access to sensitive areas
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms)
AI Justification
The chunk discusses perimeter security and restrictions on access to sensitive areas, which aligns with the enforcement of authorizations for entry and exit of system components.

Document Content
Matched Section
Section: Perimeter security and access restrictions
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms)
AI Justification
The chunk discusses perimeter security and restrictions on access to sensitive areas, which are relevant to physical and environmental hazards.

Document Content
Matched Section
Section: Perimeter security and Communications Security
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms) c) Computer location (so that the screen may not be viewed by members of the public) storage of files (files not stored in public areas with access restricted to staff with a need to access files) d) Secure disposal of records (effective 'wiping' of data stored electronically, secure disposal of paper records). IV. Communications Security a) Supplier and/or contractor should secure all backup media during transportation and in storage. b) Supplier and/or contractor should catalog all media so that a missing storage unit (and which unit it is) shall be easily identified. c) Media should not be labeled in such a way that it discloses the data it contains or its owner company in a manner that is easily identified by an outsider.
AI Justification
The chunk discusses perimeter security measures, access restrictions, and secure disposal of records, which are all relevant to preventing information leakage.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The chunk discusses access control measures and the need for individuals to have appropriate access based on their roles, which aligns with the requirements for physical access authorizations.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed. The physical security measures include at minimum:
AI Justification
The chunk discusses the requirement for suppliers and contractors to assess access and implement physical security measures, aligning with the principles of physical access control.

Document Content
Matched Section
Section: Perimeter security and restrictions on access to sensitive areas
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms)
AI Justification
The chunk discusses perimeter security and restrictions on access to sensitive areas, which aligns with the need for physical security controls to prevent unauthorized access and potential tampering.

Document Content
Matched Section
Section: a) Perimeter security, b) Restrictions on access to sensitive areas within the building, c) Computer location
Content: a) Perimeter security (monitoring of access, office buildings locked and alarmed when not in use) b) Restrictions on access to sensitive areas within the building (such as server rooms) c) Computer location (so that the screen may not be viewed by members of the public)
AI Justification
The chunk discusses perimeter security, restrictions on access to sensitive areas, and computer location to prevent unauthorized viewing, which aligns with controlling physical access to output devices.

Document Content
Matched Section
Section: Physical & Environmental Security
Content: Suppliers and/or contractors should follow the following best practices of meeting and agreeing to implement the physical security measures which are necessary to ensure the security and integrity of any information processed.
AI Justification
The chunk discusses the requirement for suppliers and contractors to implement physical security measures, which aligns with the need for monitoring physical access to ensure security and integrity.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the need for security and privacy plans that describe the intended application of controls.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor is required to assess the nature of access allowed to an individual user and comply with the requirements in the Test IS 8.0 Access Control & Identity Management policy.
AI Justification
The chunk discusses the requirement for suppliers and contractors to assess access and comply with access control policies, which aligns with the establishment of rules of behavior for access agreements.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The mention of preventing the use of shared credentials and detecting default passwords aligns with the access control measures that should be in place to ensure proper use of the system.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the need for a formal information security program plan that outlines security requirements and management controls.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies.
AI Justification
The chunk emphasizes the importance of training personnel in security policies, new threats, and secure coding principles, which aligns with the need for defined knowledge, skills, and abilities for security roles.

Document Content
Matched Section
Section: Information Security & Privacy Awareness for contractor/consulting contractor
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies. b) Security training, including new threats and vulnerabilities, should be required for all developers and system administration staff. c) All personnel with access to Test data should have information security training for their respective roles. d) Refresher training should be required annually. e) All development (contractor)-staff should be trained in secure coding principles and best practices. Training materials are updated on an ongoing basis to include new threats and vulnerabilities. Annual evidence showing that training had been conducted and successfully completed should be provided.
AI Justification
The chunk discusses the requirement for security training for contractor personnel, which aligns with the need for organization-wide security and privacy training as mentioned in PM-14.

Document Content
Matched Section
Section: Scope and Applicability
Content: This Manual should be reviewed by the Chief Information Security Officer (CISO).
AI Justification
The text mentions the Chief Information Security Officer (CISO), which aligns with the role defined in control PM-2.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the importance of personnel security policies and procedures, emphasizing their role in security compliance and the responsibilities of suppliers and contractors.

Document Content
Matched Section
Section: Access Control & Identity Management policy
Content: Supplier and/or contractor agrees that individual staff members should only have access to data which they require to perform their duties, prevent use of shared credentials (multiple individuals using a single username and password) and detect the use of default passwords.
AI Justification
The text discusses the requirements for suppliers and contractors regarding access control, including the necessity for individuals to have access only to the data required for their duties, which aligns with the concept of access agreements.

Document Content
Matched Section
Section: Term Definitions and Related Documents
Content: Supplier and/or contractor A person or organization that provides something needed such as a product or service. Contractor A person or company that undertakes a contract to provide materials or labor to perform a service or do a job.
AI Justification
The chunk discusses the definitions of suppliers and contractors, which aligns with the control's focus on external providers and their personnel security requirements.

Document Content
Matched Section
Section: SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS
Content: Information Security & Privacy Awareness for contractor/consulting contractor a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies.
AI Justification
The chunk discusses the requirement for security training tailored to specific roles, which aligns with the specification of security and privacy roles in organizational position descriptions.

Document Content
Matched Section
Section: Privacy Impact Assessment
Content: A privacy impact assessment is an analysis of how personally identifiable information is handled to ensure that handling conforms to applicable privacy requirements, determine the privacy risks associated with an information system or activity, and evaluate ways to mitigate privacy risks.
AI Justification
The text discusses the process and importance of conducting a privacy impact assessment, which aligns directly with the requirements outlined in control RA-8.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the importance of policies and procedures in the context of system and services acquisition, aligning with the requirements of SA-1.

Document Content
Matched Section
Section: SUPPLIER AND/OR CONTRACTOR/CONTRCTOR SECURITY REQUIREMENTS
Content: a) Supplier and/or contractor personnel should be trained in Test security policies and are required to be knowledgeable about changes or updates to these policies. b) Security training, including new threats and vulnerabilities, should be required for all developers and system administration staff. c) All personnel with access to Test data should have information security training for their respective roles. d) Refresher training should be required annually. e) All development (contractor)-staff should be trained in secure coding principles and best practices. Training materials are updated on an ongoing basis to include new threats and vulnerabilities. Annual evidence showing that training had been conducted and successfully completed should be provided.
AI Justification
The chunk discusses the requirement for training for contractor personnel, including developers, which aligns with the need for training as specified in SA-16.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the need for derived security and privacy requirements as outlined in SA-4.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the responsibilities of suppliers and contractors in implementing security controls, which aligns with the control's focus on external service providers and the management of risks associated with them.

Document Content
Matched Section
Section: 1.0 SCOPE & APPLICABILITY
Content: To achieve security compliance, Supplier and/or contractors and/or contractors (“SUPPLIER AND/OR CONTRACTOR”, “3rd party”, “Contractor”, “Consulting Contractor”) and their subcontractors are wholly responsible for implementing all the security controls defined herein to protect the data they manage, host or process for any function or activity implemented on behalf of Test.
AI Justification
The text discusses the importance of policies and procedures related to system and communications protection, emphasizing the need for security and privacy programs to collaborate on these policies.

Document Content
Matched Section
Section: Data Protection and Security Measures
Content: a) All data provided by Test should be encrypted using AES-128 or stronger b) To protect data Integrity, data should be hashed using SHA-256 or stronger
AI Justification
The chunk specifies the use of encryption (AES-128 or stronger) and hashing (SHA-256 or stronger) for data protection, which aligns with the cryptographic measures described in SC-13.
anonymized_8.1_IS_Access_Control_Identity_Management_Standard_1.pdf NIST
126 matches found

Document Content
Matched Section
Section: Simultaneous logins to a system by one User ID from different network addresses or workstations should be prohibited unless specifically authorized by the Information Owner.
Content: j) Simultaneous logins to a system by one User ID from different network addresses or workstations should be prohibited unless specifically authorized by the Information Owner.
AI Justification
The chunk discusses prohibiting simultaneous logins from different network addresses or workstations, which aligns with the control's focus on managing concurrent sessions for system accounts.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: Information Access Restriction a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The text discusses the importance of access control policies and procedures, detailing how they should be developed and maintained, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know.
AI Justification
The section outlines the need for restricting access based on user roles and responsibilities, which aligns with the principles of account management.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: i. Access to information and application systems should be provided as per the User’s role and responsibilities with approval from the business manager.
AI Justification
The text specifies that access to information and application systems should be based on user roles and responsibilities, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know.
AI Justification
The requirement to restrict access rights based on business need aligns with the principle of least privilege.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: c) System administrator should maintain and update an access control matrix including privileges assigned to the Users.
AI Justification
The mention of maintaining and updating an access control matrix implies a need for monitoring access attempts, which relates to managing unsuccessful login attempts.

Document Content
Matched Section
Section: f) Ensure that screen lock is properly functioning on all access devices.
Content: f) Ensure that screen lock is properly functioning on all access devices. In case of failure, inform help desk. Users are prohibited from installing any software which prevents idle timeout screen lock from functioning properly.
AI Justification
The chunk discusses the importance of ensuring that screen lock functions properly on access devices, which aligns with the concept of device locks as a temporary measure to prevent unauthorized access.

Document Content
Matched Section
Section: Human Resources Department controls employee terminations
Content: The Human Resources Department controls employee terminations when a person leaves the firm. Please refer to 5.0 Human Resource Security Policy and Procedures. Termination notices are sent out using the termination date. Based on this information, the Network Administrators (System Administrators) should suspend the User privileges for perimeter-level security in AD. This perimeter level security is the primary security layer and disabling IDs at this level prohibits access to underlying databases and applications.
AI Justification
The text discusses the termination of user privileges and accounts, which aligns with the concept of session termination as it relates to user access and security.

Document Content
Matched Section
Section: Wireless technologies and access control mechanisms
Content: SSID is a case sensitive, 32 alphanumeric character unique identifier attached to the header of packets sent over a wireless local-area network (WLAN) that acts as a password when a mobile device tries to connect to the basic service set (BSS) -- a component of the IEEE 802.11 WLAN architecture.
AI Justification
The chunk discusses the concept of authorized access and mentions SSID, which is directly related to wireless technologies and their access controls.

Document Content
Matched Section
Section: Access Control for Portable and Mobile Devices
Content: Portable and mobile devices (e.g. laptops, workstations, personal digital assistants, mobile devices) should not be allowed to access organizational networks without first meeting the organizational security requirements including but not limited to scanning the devices for malicious code, updating
AI Justification
The section discusses the access control requirements for portable and mobile devices, including security measures that must be met before allowing access to organizational networks.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: All Users that require privileged access should also be provided their own personal accounts for normal business use. Privileged access accounts are to be stringently monitored through an approved Privileged Session Manager which allow recording of sessions and have logging/security agents which deliver information to a global SIEM.
AI Justification
The text discusses the management of accounts, including the need for personal accounts for privileged access, monitoring of privileged accounts, and the management of access rights through role-based access control lists.

Document Content
Matched Section
Section: User Access Authorization and Information Owner Responsibilities
Content: Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The text discusses the responsibilities of information owners and the need for access authorization, which aligns with the principles of information sharing and access control.

Document Content
Matched Section
Section: Data Mining Protection
Content: Data mining protection requires organizations to identify appropriate techniques to prevent and detect unnecessary or unauthorized data mining.
AI Justification
The text discusses data mining activities, their risks, and the need for organizations to implement protective measures against unauthorized data mining, which aligns with AC-23.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control - Information Access Restriction
Content: a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The section discusses the restriction of access to information based on authorization and the roles of users, which aligns with the concept of access control decisions.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control - Information Access Restriction
Content: c) System administrator should maintain and update an access control matrix including privileges assigned to the Users.
AI Justification
The mention of maintaining and updating an access control matrix aligns with the need for authorization decisions in access control.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control - Information Access Restriction
Content: d) Access rights should be reviewed at least every twelve (12) months.
AI Justification
The requirement to review access rights aligns with the ongoing evaluation of access control decisions.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: These standards apply to all Test networks, information systems, company data, employees, and contractors. This document is to be used in conjunction with specific procedures to facilitate the implementation of the access control policy and associated access controls.
AI Justification
The text discusses the implementation of access control policies and the management of access to information resources, which aligns with the requirements of AC-25 regarding enforcing access control policies.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The chunk outlines the need for restricting access to information based on user roles and responsibilities, which aligns with the concept of access control policies.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: c) System administrator should maintain and update an access control matrix including privileges assigned to the Users.
AI Justification
The mention of maintaining and updating an access control matrix aligns with the enforcement of access control policies.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: d) Access rights should be reviewed at least every twelve (12) months.
AI Justification
The requirement to review access rights at least every twelve months supports the ongoing enforcement of access control policies.

Document Content
Matched Section
Section: User access authorization forms and responsibilities of Information Security and information owners.
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The text discusses the responsibilities of Information Security and information owners in managing access requests and ensuring that access is consistent with security policies, which aligns with the principles of information flow control.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: c) Incompatible special privileges (e.g., system administration and auditing) should be segregated to ensure proper separation of duties.
AI Justification
The text discusses the segregation of incompatible special privileges to ensure proper separation of duties, which aligns with the intent of AC-5.

Document Content
Matched Section
Section: Management of Privileged Access Rights
Content: a) All Users that require privileged access should also be provided their own personal accounts for normal business use.
AI Justification
The text mentions account management activities related to privileged access, which aligns with AC-2.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: a) Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege. c) Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege.
AI Justification
The text discusses granting access based on the principle of least privilege and configuring roles and permissions accordingly.

Document Content
Matched Section
Section: g) All systems should require at a minimum a username and password. h) The maximum number of sequential failed password attempts is (5) times. After the threshold has been violated, the User's password or ID should be either suspended until reset by a resource administrator or disabled for a period of not less than thirty (30) minutes.
Content: g) All systems should require at a minimum a username and password. h) The maximum number of sequential failed password attempts is (5) times. After the threshold has been violated, the User's password or ID should be either suspended until reset by a resource administrator or disabled for a period of not less than thirty (30) minutes.
AI Justification
The text discusses limiting unsuccessful logon attempts and the actions taken when the maximum number of attempts is exceeded, which aligns directly with the requirements of AC-7.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: b) System or applications should display a general notice warning that it should only be accessed by authorized Users.
AI Justification
The chunk discusses the requirement for a general notice warning that the system should only be accessed by authorized users, which aligns with the need for system use notifications before logon.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The chunk discusses secure log-on procedures, including notifications related to user access and potential unauthorized attempts, which aligns with the need for users to recognize their last access.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The text discusses the importance of awareness and training policies and procedures in relation to security and privacy, which aligns with control AT-1.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Control: AT-2: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The chunk discusses the importance of literacy training and awareness for system users, which aligns with the requirement for organizations to provide training on security and privacy.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The chunk discusses secure log-on procedures, which are part of the broader audit and accountability policies and procedures that ensure proper access control and accountability within systems.

Document Content
Matched Section
Section: Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken. Records should be maintained for a minimum period of twelve (12) months.
Content: Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken. Records should be maintained for a minimum period of twelve (12) months.
AI Justification
The section discusses the maintenance of records related to account and privilege reviews, which aligns with the requirement to retain audit records until they are no longer needed.

Document Content
Matched Section
Section: Access Control for Portable and Mobile Devices
Content: Portable and mobile devices (e.g. laptops, workstations, personal digital assistants, mobile devices) should not be allowed to access organizational networks without first meeting the organizational security requirements including but not limited to scanning the devices for malicious code, updating
AI Justification
The chunk discusses the management and restrictions of program source code and emphasizes the importance of security measures for portable and mobile devices, which aligns with the control's focus on mobile code and its potential risks.

Document Content
Matched Section
Section: Control SC-20
Content: SC-20: Providing authoritative source information enables external clients, including remote Internet clients, to obtain origin authentication and integrity verification assurances for the host/service name to network address resolution information obtained through the service.
AI Justification
The chunk references the control SC-20, which focuses on providing authoritative source information for network address resolution, aligning directly with the content provided.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The chunk discusses secure log-on procedures which are essential for protecting session authenticity by ensuring that only authorized users can access the system, thereby preventing unauthorized access and potential session hijacking.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: a) Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege. b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels. c) Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege. d) Privilege access to any administrative consoles, management interfaces, application programming interfaces (API) or other management components are restricted to authorized users and require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses access control measures for cloud systems and services, emphasizing the principle of least privilege and strong two-factor authentication.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: a) Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege. b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels. c) Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege. d) Privilege access to any administrative consoles, management interfaces, application programming interfaces (API) or other management components are restricted to authorized users and require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk implies the need for strong access controls and separation of user functions from system management functions, which aligns with the requirements of SC-2.

Document Content
Matched Section
Section: Limitation of the use of utility programs and ensuring only authorized utilities are used.
Content: ii. Limitation of the use of utility programs to the minimum practical number of trusted, authorized Users. iii. Authorization for ad hoc use of utility programs. iv. Logging of all use of utility programs. v. Removing or disabling of all unnecessary utility programs. b) Only utilities authorized for the remote management of the servers, workstations and network devices should be used. c) IT team should ensure that vendor default utilities are disabled during new server, network device or workstation commissioning. d) Administrators of the servers and network devices need to ensure the utilities that are specifically enabled for an authorized activity, are disabled immediately after use. The activities carried out by using such utilities should be logged. e) Users given command line access to systems should, where feasible, be limited to the access or service needed. f) Compilers or other system development tools should not be installed in the production.
AI Justification
The text discusses limiting the use of utility programs and ensuring that only authorized utilities are used, which aligns with minimizing functionality and reducing exposure to attacks.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: a) Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege. b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels. c) Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege. d) Privilege access to any administrative consoles, management interfaces, application programming interfaces (API) or other management components are restricted to authorized users and require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The text discusses access control measures, including the principle of least privilege and strong two-factor authentication, which are key components of an access control policy.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: c) Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege.
AI Justification
The text emphasizes the need for appropriate roles and permissions, which aligns with account management practices.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The mention of strong two-factor authentication aligns with the identification and authentication control.

Document Content
Matched Section
Section: Access Control to Program Source Code
Content: Access to the program source of operational systems should be restricted to prevent any compromise of the application programs.
AI Justification
The text discusses the importance of precompiling code and restricting access to advanced operating system utilities, which aligns with the control's focus on maintaining the integrity of the operating environment.

Document Content
Matched Section
Section: Access Authorization and Information Security Responsibilities
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval.
AI Justification
The text discusses the responsibilities of Information Security and information owners in managing access to information resources, which aligns with the control's focus on preventing unauthorized information transfer.

Document Content
Matched Section
Section: Limitation of the use of utility programs and authorization for their use.
Content: ii. Limitation of the use of utility programs to the minimum practical number of trusted, authorized Users. iii. Authorization for ad hoc use of utility programs. iv. Logging of all use of utility programs. v. Removing or disabling of all unnecessary utility programs.
AI Justification
The chunk discusses limitations and authorizations for the use of utility programs, which aligns with the concept of usage restrictions for system components.

Document Content
Matched Section
Section: Boundary protection may be implemented as a common control for all or part of an organizational network.
Content: Boundary protection may be implemented as a common control for all or part of an organizational network such that the boundary to be protected is greater than a system-specific boundary (i.e., an authorization boundary).
AI Justification
The text discusses managed interfaces, boundary protection, and the importance of restricting traffic to enhance security, which aligns with SC-7.

Document Content
Matched Section
Section: Section g) to l) regarding login attempts and session management.
Content: g) All systems should require at a minimum a username and password. h) The maximum number of sequential failed password attempts is (5) times. After the threshold has been violated, the User's password or ID should be either suspended until reset by a resource administrator or disabled for a period of not less than thirty (30) minutes. i) Upon successful login, a message should be displayed for the date and time of last successful login and the number of unsuccessful attempts to use the account. j) Simultaneous logins to a system by one User ID from different network addresses or workstations should be prohibited unless specifically authorized by the Information Owner. k) Access control systems should ensure that session activity is terminated when a security-related parameter has been exceeded or violated. l) Information should be enabled to automatically time out an inactive session after a maximum.
AI Justification
The chunk discusses the handling of failed login attempts and the display of messages related to login success and failure, which aligns with the control's focus on managing error messages and conditions.

Document Content
Matched Section
Section: Access privileges and account reviews
Content: Access privileges granted to general Users should be reviewed by information owners at least every twelve (12) months. Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken. Records should be maintained for a minimum period of twelve (12) months.
AI Justification
The text discusses the review of access privileges and the maintenance of records related to account and privilege reviews, aligning with account management practices.

Document Content
Matched Section
Section: Record maintenance requirements
Content: Evidence of account and privilege reviews should document the date that the review occurred, who conducted the review, and what action (if any) was taken. Records should be maintained for a minimum period of twelve (12) months.
AI Justification
The requirement to maintain records for a minimum period of twelve months aligns with the need for an information security program that includes record retention.

Document Content
Matched Section
Section: The section discusses the handling of sensitive data, including passwords and confidential identifiers.
Content: This includes both masking within applications such as replacing sensitive data with ‘#’ or other character and masking within data storage using approved encryption methods.
AI Justification
The content discusses the importance of masking sensitive data and ensuring that identifiers are not exposed, which aligns with the concept of de-identification.

Document Content
Matched Section
Section: Access Control for Portable and Mobile Devices
Content: Portable and mobile devices (e.g. laptops, workstations, personal digital assistants, mobile devices) should not be allowed to access organizational networks without first meeting the organizational security requirements including but not limited to scanning the devices for malicious code, updating
AI Justification
The text discusses the importance of protecting organizational information from cyber-attacks and unauthorized access, which aligns with the objectives of SI-20.

Document Content
Matched Section
Section: User Accounts should have the least amount of privilege required to perform their business processes
Content: User Accounts should have the least amount of privilege required to perform their business processes, thereby limiting access to source code.
AI Justification
The mention of user accounts having the least amount of privilege required to perform their business processes aligns with the principles of access control.

Document Content
Matched Section
Section: An audit log should be maintained of all access to program source libraries.
Content: An audit log should be maintained of all access to program source libraries.
AI Justification
The requirement to maintain an audit log of all access to program source libraries aligns with the need for accountability and auditing.

Document Content
Matched Section
Section: strict change control procedures need to be followed for any modifications to the program source library.
Content: strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The mention of strict change control procedures for modifications to the program source library aligns with configuration management principles.

Document Content
Matched Section
Section: Access Control for Portable and Mobile Devices
Content: Portable and mobile devices (e.g. laptops, workstations, personal digital assistants, mobile devices) should not be allowed to access organizational networks without first meeting the organizational security requirements including but not limited to scanning the devices for malicious code.
AI Justification
The section discusses the need for scanning portable and mobile devices for malicious code before allowing them access to organizational networks, which aligns with the control's focus on protecting against malicious code.

Document Content
Matched Section
Section: Management of User Authentication
Content: Use of privileged access IDs should be logged by system monitoring applications. User activity reports, such as failed access attempts and any changes to User rights should monitored and reviewed detect misuse of privileged accounts.
AI Justification
The text discusses the importance of system monitoring, including logging privileged access and monitoring user activity, which aligns with the objectives of control SI-4.

Document Content
Matched Section
Section: e) An audit log should be maintained of all access to program source libraries.
Content: e) An audit log should be maintained of all access to program source libraries.
AI Justification
The chunk mentions the need to maintain an audit log of all access to program source libraries, which aligns with the requirement to consider audit logging and processing requirements.

Document Content
Matched Section
Section: Management of User Authentication
Content: Use of privileged access IDs should be logged by system monitoring applications. User activity reports, such as failed access attempts and any changes to User rights should monitored and reviewed detect misuse of privileged accounts.
AI Justification
The text discusses the need for logging privileged access IDs and monitoring user activity, which aligns with the requirements for audit information and protection of audit logs.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The log-on procedures outlined ensure that access is controlled and monitored, which aligns with the need for a comprehensive access control policy.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The procedures for log-on and two-factor authentication directly relate to the identification and authentication of users, ensuring that only authorized individuals can access the system.

Document Content
Matched Section
Section: Access Authorization Process
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The text discusses the process of access authorization, including the responsibilities of information owners and the retention of authorization forms, which aligns with the control's focus on official management decisions and accountability.

Document Content
Matched Section
Section: Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
Content: f) Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The text discusses the importance of configuration management policies and procedures, including version control and change control procedures for program source libraries.

Document Content
Matched Section
Section: User Accounts should have the least amount of privilege required to perform their business processes, thereby limiting access to source code.
Content: d) User Accounts should have the least amount of privilege required to perform their business processes, thereby limiting access to source code.
AI Justification
The text emphasizes the principle of least privilege for user accounts, which is a key aspect of access control policies.

Document Content
Matched Section
Section: An audit log should be maintained of all access to program source libraries.
Content: e) An audit log should be maintained of all access to program source libraries.
AI Justification
The mention of maintaining an audit log for access to program source libraries aligns with the requirements for audit logging controls.

Document Content
Matched Section
Section: User Access Authorization and Responsibilities
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement. e) Resource administrators are responsible for granting only the level of access that has been approved by the Information Owner. f) All accounts for third party access to Test networks or Information Resources should only be enabled upon approval of Test management and should be disabled upon completion of
AI Justification
The text discusses the responsibilities of Information Security and information owners in managing access requests and ensuring proper classification and retention of access authorization forms, which relates to understanding where information is processed and stored.

Document Content
Matched Section
Section: Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
Content: f) Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The chunk discusses the need for strict change control procedures and maintaining version control of programs, which aligns with the systematic proposal and implementation of configuration changes.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The chunk discusses restricting access to information based on user roles and responsibilities, which aligns with the access enforcement control.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know.
AI Justification
The chunk emphasizes the need for authorized personnel to access systems, which aligns with the control's focus on restricting changes to qualified individuals.

Document Content
Matched Section
Section: Logical access controls and vendor-supplied defaults
Content: f) Logical access controls should be applied to isolate sensitive applications, application data or systems. g) Vendor-supplied defaults should be changed during installation of third-party software on the network. This includes, but is not limited to the following: i. Passwords ii. Elimination of unnecessary accounts / User IDs (i.e., guest) iii. Scripts, drivers, features, subsystems, file systems, and unnecessary web servers iv. Simple Network Management Protocol [SNMP] community strings v. Service Set Identifier (SSID) vi. Enabling of the latest or current Wi-Fi protection technology, such as (WPA3), for
AI Justification
The chunk discusses the importance of changing vendor-supplied defaults and applying logical access controls, which are aspects of configuration settings that affect security posture.

Document Content
Matched Section
Section: f) Logical access controls should be applied to isolate sensitive applications, application data or systems. g) Vendor-supplied defaults should be changed during installation of third-party software on the network.
Content: f) Logical access controls should be applied to isolate sensitive applications, application data or systems. g) Vendor-supplied defaults should be changed during installation of third-party software on the network. This includes, but is not limited to the following: i. Passwords ii. Elimination of unnecessary accounts / User IDs (i.e., guest) iii. Scripts, drivers, features, subsystems, file systems, and unnecessary web servers iv. Simple Network Management Protocol [SNMP] community strings v. Service Set Identifier (SSID) vi. Enabling of the latest or current Wi-Fi protection technology, such as (WPA3), for
AI Justification
The chunk discusses the importance of changing vendor-supplied defaults and eliminating unnecessary accounts and services, which aligns with the principle of least functionality.

Document Content
Matched Section
Section: Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
Content: f) Configuration management database should maintain the version control of all programs and strict change control procedures need to be followed for any modifications to the program source library.
AI Justification
The chunk discusses the management of program source code libraries, updates, access control, and version control, which are all aspects of configuration management.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The log-on procedures and access control measures described align with the need for a comprehensive access control policy and procedures that govern user access and authentication.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The chunk discusses secure log-on procedures, which are directly related to identification and authentication policies and procedures.

Document Content
Matched Section
Section: User Credential Management and Security Practices
Content: Users should not use another person’s user credentials or allow another person to use theirs. Users should never use the 'Remember Password' feature in web browsers (e.g., Internet Explorer, Edge, Chrome, etc.). Passwords should not be inserted into email messages, help desk tickets, change requests or any other form of electronic communication. If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately. If the compromise was without the knowledge of the owner, the user should report the incident to the Test IT Department immediately. If available, Multi-Factor Authentication (MFA) should be used to augment credential security. MFA requires two forms of identification for successful login: Something you know – the employee’s username and password. Something you have – a device or access token. Something you are – verified by a biometric device.
AI Justification
The chunk discusses the importance of not sharing credentials and the use of Multi-Factor Authentication (MFA), which aligns with the need for adaptive authentication mechanisms to enhance security.

Document Content
Matched Section
Section: User Credential Management
Content: c) Users should not use another person’s user credentials or allow another person to use theirs. d) Users should never use the 'Remember Password' feature in web browsers (e.g., Internet Explorer, Edge, Chrome, etc.) e) Passwords should not be inserted into email messages, help desk tickets, change requests or any other form of electronic communication. f) If an account or password is suspected to have been compromised or to be known by someone other than the credential owner, users should change that password immediately. If the compromise was without the knowledge of the owner, the user should report the incident to the Test IT Department immediately. g) If available, Multi-Factor Authentication (MFA) should be used to augment credential security.
AI Justification
The chunk discusses the importance of not sharing credentials and the need for immediate password changes if a compromise is suspected, which aligns with re-authentication principles.

Document Content
Matched Section
Section: administering the network-level permissions granted to each new employee or contractor
Content: administering the network-level permissions granted to each new employee or contractor for perimeter-level security.
AI Justification
The text discusses the identification and authentication of users, including employees and contractors, which aligns with the requirements of IA-2.

Document Content
Matched Section
Section: Relevant functions that ordinary users are not authorized to perform.
Content: relevant functions that ordinary users are not authorized to perform.
AI Justification
The chunk discusses the authorization of users and the management of devices, which relates to the identification and authentication of devices as per the control.

Document Content
Matched Section
Section: Identification & Authentication | Identifier Management
Content: Identification & Authentication | Identifier Management
AI Justification
The text discusses the management of individual device identifiers and the prevention of reuse of identifiers, which aligns directly with the control's focus on common device identifiers.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege.
AI Justification
The text discusses access control measures for cloud systems and services, emphasizing the principle of least privilege and strong authentication methods.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The requirement for strong two-factor authentication aligns with the identification and authentication controls.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses the requirement for strong two-factor authentication for access to cloud systems and services, which aligns with the need for authentication mechanisms to verify authorized users.

Document Content
Matched Section
Section: a) The display and printing of passwords and account numbers should be masked, suppressed, or otherwise obfuscated
Content: a) The display and printing of passwords and account numbers should be masked, suppressed, or otherwise obfuscated such that unauthorized parties should not be able to observe and/or
AI Justification
The chunk discusses the need to mask or obfuscate passwords and account numbers to prevent unauthorized observation, which aligns with the control's focus on obscuring authentication feedback.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege. Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The chunk discusses access control measures, including strong two-factor authentication and the principle of least privilege, which aligns with the need for identification and authentication of users.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: Appropriate roles and permissions should be configured to ensure access is restricted based on job roles and least privilege.
AI Justification
The mention of restricting access based on job roles and least privilege aligns with the control that addresses permitted actions for users.

Document Content
Matched Section
Section: Policy statement requiring the exception.
Content: approved by the Department Manager and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information. 3. Detailed explanation of why the exception is necessary. 4. Detailed mitigation information, if available. A record of all approved requests should be maintained by the CISO or his/her designee and be available on request.
AI Justification
The text discusses the requirements and procedures for handling exceptions to policies, which aligns with incident response procedures and the need for documentation and approval processes.

Document Content
Matched Section
Section: g) All systems should require at a minimum a username and password.
Content: g) All systems should require at a minimum a username and password.
AI Justification
The chunk discusses requirements for user authentication, including username and password, which aligns with the identification and authentication control.

Document Content
Matched Section
Section: h) The maximum number of sequential failed password attempts is (5) times. After the threshold has been violated, the User's password or ID should be either suspended until reset by a resource administrator or disabled for a period of not less than thirty (30) minutes.
Content: h) The maximum number of sequential failed password attempts is (5) times. After the threshold has been violated, the User's password or ID should be either suspended until reset by a resource administrator or disabled for a period of not less than thirty (30) minutes.
AI Justification
The chunk mentions the management of authentication mechanisms, including the handling of failed login attempts and session timeouts, which aligns with authenticator management.

Document Content
Matched Section
Section: k) Access control systems should ensure that session activity is terminated when a security-related parameter has been exceeded or violated.
Content: k) Access control systems should ensure that session activity is terminated when a security-related parameter has been exceeded or violated.
AI Justification
The chunk discusses the termination of session activity when security-related parameters are violated, which aligns with session termination controls.

Document Content
Matched Section
Section: 1.6 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having a physical and environmental protection policy and procedures, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: a) Access to cloud systems and services should be granted to authorized Users based on the principle of least privilege.
AI Justification
The section discusses access control measures for cloud systems, emphasizing the need for authorization and restriction based on job roles, which aligns with enforcing authorizations for entry and exit.

Document Content
Matched Section
Section: Access Control for Cloud Systems and Services
Content: b) Access to cloud systems and services require strong two-factor authentication using Test approved method(s) over secure communications channels.
AI Justification
The text outlines the principles of least privilege and strong authentication, which are fundamental aspects of an access control policy.

Document Content
Matched Section
Section: Physical & Environmental Protection | Power Equipment & Cabling
Content: Physical & Environmental Protection | Power Equipment & Cabling
AI Justification
The chunk explicitly mentions 'Physical & Environmental Protection | Power Equipment & Cabling', which aligns directly with the control's focus on determining necessary protections for power equipment and cabling.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The log-on procedures outlined ensure that access to systems is controlled and restricted to authorized users, which aligns with the principles of access control policies.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication.
AI Justification
The procedures for log-on and the requirement for two-factor authentication directly relate to the identification and authentication of users, ensuring that only authorized individuals can access sensitive systems.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: These standards apply to all Test networks, information systems, company data, employees, and contractors. This document is to be used in conjunction with specific procedures to facilitate the implementation of the access control policy and associated access controls.
AI Justification
The text discusses the need to define, document, implement, and maintain policies to control access to information resources, which aligns with the requirements of an access control policy.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access.
AI Justification
The text mentions the need for a managed process that addresses authorizing, modifying, and revoking access, which aligns with account management controls.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The text emphasizes limiting access based on roles and the principle of least privilege, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: Access is based on an employee/contractor’s role and should be limited to the minimum necessary to perform their job function.
AI Justification
The text specifies that access should be limited to the minimum necessary, which is the essence of the least privilege principle.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: It also includes the periodic review of information system access privileges.
AI Justification
The mention of periodic review of access privileges implies a need for monitoring access attempts, which is related to managing unsuccessful login attempts.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: These standards apply to all Test networks, information systems, company data, employees, and contractors. This document is to be used in conjunction with specific procedures to facilitate the implementation of the access control policy and associated access controls.
AI Justification
The text discusses the need for defining, documenting, and implementing access control policies based on user roles, which aligns with the concept of rules of behavior for organizational users.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: Access to Information Resources should be controlled through a managed process that addresses authorizing and modifying and revoking access. It also includes the periodic review of information system access privileges.
AI Justification
The mention of controlling access through a managed process and periodic review of access privileges relates to the need for notifying users of their responsibilities regarding access.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: Information Access Restriction a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The section discusses the need for security and privacy architectures that include access control measures and the allocation of security functionalities, which aligns with the requirements of PL-8.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know.
AI Justification
The section outlines access restrictions based on user roles and responsibilities, which is a key aspect of access control policies.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: c) System administrator should maintain and update an access control matrix including privileges assigned to the Users.
AI Justification
The mention of maintaining and updating an access control matrix aligns with account management practices.

Document Content
Matched Section
Section: User access authorization processes
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The chunk discusses the processes for user access authorization, including the roles of information owners and the requirement for approval, which aligns with the need for an organization-wide risk management process and authorization.

Document Content
Matched Section
Section: User Access Authorization and Information Security Responsibilities
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval.
AI Justification
The text discusses the need for access authorization and the responsibilities of information owners, which aligns with the protection needs and the management of access to information resources.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs. The same standards and guidelines that apply to insider threat programs in classified environments can also be employed effectively to improve the security of controlled unclassified and other information in non-national security systems.
AI Justification
The text discusses the establishment and requirements of insider threat programs, which aligns directly with control PM-12.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Insider threat programs include controls to detect and prevent malicious insider activity through the centralized integration and analysis of both technical and nontechnical information to identify potential insider threat concerns.
AI Justification
The chunk mentions system monitoring as part of the insider threat program, which aligns with SI-4.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: In addition to the centralized integration and analysis capability, insider threat programs require organizations to prepare department or agency insider threat policies and implementation plans.
AI Justification
The text highlights the need for policies and implementation plans, which is in line with PR.IP-11.

Document Content
Matched Section
Section: Program Management | Security & Privacy Workforce
Content: Security and privacy workforce development and improvement programs include defining the knowledge, skills, and abilities needed to perform security and privacy duties and tasks; developing role-based training programs for individuals assigned security and privacy roles and responsibilities; and providing standards and guidelines for measuring and building individual qualifications for incumbents and applicants for security- and privacy-related positions.
AI Justification
The text discusses the importance of defining knowledge, skills, and abilities for security and privacy roles, as well as developing training programs, which aligns directly with PM-13.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The log-on procedures described ensure that access to systems is controlled and that only authorized users can log in, which aligns with the need for access control policies and procedures.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The procedures outlined for log-on, including two-factor authentication and error handling during user authorization, directly relate to the identification and authentication of users.

Document Content
Matched Section
Section: Personnel Security | Personnel Screening
Content: Personnel Security | Personnel Screeningn
AI Justification
The chunk explicitly mentions 'Personnel Security | Personnel Screening', which aligns with the requirements for personnel screening and rescreening activities as outlined in PS-3.

Document Content
Matched Section
Section: Personnel Security | Position Risk Designation
Content: Control: PS-2: Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel security program. The Position Designation System (PDS) assesses the duties and responsibilities of a position to determine the degree of potential damage to the efficiency or integrity of the service due to misconduct of an incumbent of a position and establishes the risk level of that position. The PDS assessment also determines if the duties and responsibilities of the position present the potential for position incumbents to bring about a material adverse effect on national security and the degree of that potential effect, which establishes the sensitivity level of a position. The results of the assessment determine what level of investigation is conducted for a position. Risk designations can guide and inform the types of authorizations that individuals receive when accessing organizational information and information systems. Position screening criteria include explicit information security role appointment requirements. Parts 1400 and 731 of Title 5, Code of Federal Regulations, establish the requirements for organizations to evaluate relevant covered positions for a position sensitivity and position risk designation commensurate with the duties and responsibilities of those positions.
AI Justification
The text discusses the importance of position risk designations and how they are determined based on the duties and responsibilities of a position, aligning directly with the PS-2 control.

Document Content
Matched Section
Section: Human Resource Security Policy and Procedures
Content: The Human Resources Department controls employee terminations when a person leaves the firm. Please refer to 5.0 Human Resource Security Policy and Procedures. Termination notices are sent out using the termination date. Based on this information, the Network Administrators (System Administrators) should suspend the User privileges for perimeter-level security in AD.
AI Justification
The text discusses the process of employee terminations and the responsibilities of various administrators in suspending user privileges, which aligns with the control's focus on managing system-related property and ensuring accountability during terminations.

Document Content
Matched Section
Section: Employee/Contractor’s managers should immediately notify the Human Resources Department in event of an employee/contractor’s resignation, transfer, or termination so that adequate steps may be taken to revoke the access rights of the employee and remove/adjust permissions/ disable him/her from all systems.
Content: Employee/Contractor’s managers should immediately notify the Human Resources Department in event of an employee/contractor’s resignation, transfer, or termination so that adequate steps may be taken to revoke the access rights of the employee and remove/adjust permissions/ disable him/her from all systems.
AI Justification
The chunk discusses the need for immediate notification to the Human Resources Department in the event of an employee's transfer, which aligns with the requirements for personnel transfer actions.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: System & Information Integrity | System Monitoringn
AI Justification
The chunk discusses various aspects of personnel security and related policies, which aligns with the specification of roles and responsibilities in organizational position descriptions.

Document Content
Matched Section
Section: Access Authorization Procedures
Content: for which the User is requesting access and should be submitted to Information Security for processing. Information Security is then responsible for forwarding the completed form to the appropriate information owner for final approval. c) All User access authorization forms should be retained for a period of at least two (2) years and be classified as Confidential. d) Information owners are responsible for reviewing and approving all requests for access to Information Resources and applications for which they are responsible. Information owners should review the business need for access and should ensure consistency with segregation of duties requirement.
AI Justification
The text discusses the importance of policies and procedures related to access authorization and the responsibilities of information owners, which aligns with the need for transparency and processing of personally identifiable information.

Document Content
Matched Section
Section: 1.6 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including the need for exceptions and the process for requesting them, which aligns with the control's focus on risk management strategies.

Document Content
Matched Section
Section: Access Control to Program Source Code
Content: Access to the program source of operational systems should be restricted to prevent any compromise of the application programs.
AI Justification
The chunk discusses the need for access control and restrictions on the program source code, which aligns with the principles of configuration management and protecting system integrity.

Document Content
Matched Section
Section: Access Control to Program Source Code
Content: Access to all tools (e.g., software, applications, documentation, work papers) required for system audits should be restricted to authorized individuals.
AI Justification
The text emphasizes the need to restrict access to tools and utilities, which aligns with access enforcement principles.

Document Content
Matched Section
Section: Access Control to Program Source Code
Content: Access to the program source of operational systems should be restricted to prevent any compromise of the application programs.
AI Justification
The text discusses the need for restrictions on access and execution rights for advanced operating system utilities, which aligns with the need to manage trustworthiness of system components.

Document Content
Matched Section
Section: Access Control to Program Source Code
Content: Access to the program source of operational systems should be restricted to prevent any compromise of the application programs.
AI Justification
The chunk emphasizes the need for restricted access to tools and utilities, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: Information Access Restriction a) Computers, databases, and applications that store User account and password information should restrict access to the information to authorized IT Operations Personnel.
AI Justification
The section discusses the need for access restrictions based on user roles and responsibilities, which aligns with the establishment of an access control policy.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: c) System administrator should maintain and update an access control matrix including privileges assigned to the Users.
AI Justification
The text emphasizes the need for maintaining and updating an access control matrix and reviewing access rights, which are key aspects of account management.

Document Content
Matched Section
Section: 1.2.3 System and Application Access Control
Content: b) The information and communication system privileges of all Users, systems, and independently operating programs such as agents, should be restricted based on the need to know.
AI Justification
The requirement to restrict access based on the need to know and user roles directly relates to access enforcement mechanisms.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication. e) Where available, controls should be implemented to detect an attempt to login to an information resource using an ID already in session and Information Security and/or the appropriate resource administrator should be notified. The User responsible for the ID should also be notified. Access control systems should only allow one login session per operating system per User. f) The ability to limit access by time of day and day of week should be provided, where such a mechanism is available.
AI Justification
The chunk discusses secure log-on procedures which are part of access control measures, ensuring that only authorized users can access systems and applications.

Document Content
Matched Section
Section: Secure Log-on Procedures
Content: a) Log on procedure should ensure that system or application identifiers are not displayed until the log-on procedure has been successfully completed. b) System or applications should display a general notice warning that it should only be accessed by authorized Users. c) In the event a system error occurs during the User authorization process, access should be denied. d) Systems containing sensitive information should use approved two-factor authentication.
AI Justification
The chunk emphasizes the importance of user authentication processes, including two-factor authentication and error handling during user authorization.
anonymized_3.0_IS_Information_Security_Policy_2.pdf NIST
140 matches found

Document Content
Matched Section
Section: Access control policy and procedures
Content: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of access control policies and procedures, aligning with the requirements of AC-1.

Document Content
Matched Section
Section: Risk Policy
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The mention of establishing controls to ensure identification, evaluation, and management of risk aligns with the requirements for a risk assessment policy.

Document Content
Matched Section
Section: Cloud Policy
Content: Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The mention of controls for safeguards and controls for applications and systems aligns with the requirements for remote access controls.

Document Content
Matched Section
Section: End-user Device Security Policy
Content: End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities.
AI Justification
The mention of controls for end-user devices aligns with the requirements for configuration settings.

Document Content
Matched Section
Section: Internet Security & Usage Policy
Content: Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
AI Justification
The mention of internet security controls aligns with the requirements for monitoring and protecting information systems.

Document Content
Matched Section
Section: Access Control
Content: Access Control – Establishes controls to manage access to information assets and information processing facilities via defined business requirements.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of different types of accounts, which aligns with the requirements of AC-2.

Document Content
Matched Section
Section: Access Control
Content: Access Control – Establishes controls to manage access to information assets and information processing facilities via defined business requirements.
AI Justification
The chunk discusses the establishment of controls to manage access to information assets, which aligns with the concept of access control decisions.

Document Content
Matched Section
Section: Access Control
Content: Access Control – Establishes controls to manage access to information assets and information processing facilities via defined business requirements.
AI Justification
The chunk discusses the establishment of controls to manage access to information assets, which aligns with the definition of access control policies that govern access between users and information assets.

Document Content
Matched Section
Section: Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations.
Content: Control: AT-1: Awareness and training policy and procedures address the controls in the AT family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of awareness and training policy and procedures.
AI Justification
The text discusses the importance of awareness and training policies and procedures in relation to security and privacy, aligning with the AT-1 control.

Document Content
Matched Section
Section: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The mention of establishing controls to ensure identification, evaluation, and management of risk aligns with the RA-1 control.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Information Security Awareness, Education and Training
AI Justification
The chunk discusses Information Security Awareness, Education, and Training, which aligns with the requirements for providing literacy training to system users as outlined in control AT-2.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Awareness & Training | Role-based Training
AI Justification
The mention of role-based training in the context of awareness and education aligns with control AT-3, which focuses on ensuring that training is tailored to the specific roles of users.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the determination of training content based on roles and responsibilities, aligning directly with the requirements of AT-3.

Document Content
Matched Section
Section: Information Security Aspects of Business Continuity Management
Content: Establishes controls to ensure continuous business operations and availability of information in the event of major failures or disasters.
AI Justification
The chunk discusses the importance of maintaining information security throughout the lifecycle of information systems, which aligns with the concept of ensuring systems can recover and maintain integrity in the event of failures.

Document Content
Matched Section
Section: Asset Management, Access Control, Cryptography
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets. (g) Access Control – Establishes controls to manage access to information assets and information processing facilities via defined business requirements. (h) Cryptography – Establishes controls for proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information.
AI Justification
The chunk discusses the establishment of controls for asset management, access control, and cryptography, which are relevant to protecting information at rest, particularly in terms of confidentiality and integrity.

Document Content
Matched Section
Section: Operations Security
Content: Operations Security – Establishes controls to ensure the secure operation of information processing facilities, protection from malwares, protection from loss of
AI Justification
The chunk discusses the establishment of controls to ensure the secure operation of information processing facilities, which aligns with the definition of Operations Security (OPSEC) as it involves protecting information related to sensitive organizational activities.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The chunk discusses the importance of maintaining communication paths and the establishment of controls for incident management, which aligns with the need for alternate communications paths as described in SC-47.

Document Content
Matched Section
Section: Information Security Aspects of Business Continuity Management
Content: Establishes controls to ensure continuous business operations and availability of information in the event of major failures or disasters.
AI Justification
The mention of ensuring continuous business operations and availability of information during major failures or disasters aligns with the need for contingency planning.

Document Content
Matched Section
Section: Network and Firewall Security Policy
Content: Network and Firewall Security Policy - Establishes the security-related controls and standards necessary to ensure the effective implementation and monitoring of network security, and to protect critical Company information that is transmitted via various Test networks, including public, internal, and trusted external networks.
AI Justification
The text discusses the implementation of network and firewall security policies, which align with the control's focus on managing interfaces and protecting organizational networks.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses the importance of policies and procedures related to system and information integrity, aligning directly with the requirements of SI-1.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The mention of security incidents and the need for updates to policies and procedures aligns with the need for flaw remediation.

Document Content
Matched Section
Section: Supply chain risk management policy and procedures
Content: Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organizations.
AI Justification
The text discusses the importance of supply chain risk management policies and procedures, aligning directly with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Security and privacy programs collaborate on the development of supply chain risk management policy and procedures
Content: Therefore, it is important that security and privacy programs collaborate on the development of supply chain risk management policy and procedures.
AI Justification
The mention of security and privacy programs collaborating on policy development aligns with the need for a structured program management approach.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The text discusses the importance of managing supply chain risks, which aligns with the control's focus on the risks associated with external providers and the need for a coordinated effort in managing these risks.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The chunk discusses the importance of integrating information security throughout the lifecycle of information systems, which aligns with the need to manage risks associated with supply chain elements and processes.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The mention of vendor risk management aligns with the supply chain processes and the need to maintain information security and service delivery.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses various strategies and tools for protecting the supply chain, which aligns with the control's focus on using the acquisition process to mitigate supply chain risks.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The chunk discusses vendor risk management and the establishment of controls to maintain information security, which aligns with the assessment and review of supplier risk as described in SR-6.

Document Content
Matched Section
Section: Operations Security
Content: Operations Security – Establishes controls to ensure the secure operation of information processing facilities, protection from malwares, protection from loss of
AI Justification
The text discusses the importance of protecting supply chain information and implementing safeguards, which aligns with the principles of Supply Chain OPSEC.

Document Content
Matched Section
Section: Access Control
Content: Access Control – Establishes controls to manage access to information assets and information processing facilities via defined business requirements.
AI Justification
The mention of managing access to information assets aligns with access control policies that protect sensitive information.

Document Content
Matched Section
Section: Asset Management
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling.
AI Justification
The text emphasizes the need for asset identification and handling, which is a key aspect of asset management.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The text discusses the importance of communication among supply chain entities and the need for early notification of compromises, which aligns with the control's focus on establishing agreements and procedures for effective communication.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The mention of managing information security incidents and communication on security events aligns with the need for effective incident handling procedures.

Document Content
Matched Section
Section: Definition of Confidentiality
Content: The protection of data against unintentional, unlawful, or unauthorized access, disclosure, or theft.
AI Justification
The chunk discusses the protection of data against unauthorized access and disclosure, which aligns with the control's focus on preventing unauthorized disclosure of information.

Document Content
Matched Section
Section: Definition of Information Security
Content: The practice of protecting information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction in order to provide confidentiality, integrity and availability (CIA).
AI Justification
The chunk emphasizes the importance of protecting information from unauthorized access, which is a key aspect of controlled access.

Document Content
Matched Section
Section: Assessment, authorization, and monitoring policy and procedures
Content: Control: CA-1: Assessment, authorization, and monitoring policy and procedures address the controls in the CA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the establishment of policies and procedures related to risk management, security, and privacy, which aligns with the requirements of CA-1.

Document Content
Matched Section
Section: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The mention of a risk policy that establishes controls for risk identification, evaluation, and management aligns with the need for a risk management strategy.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings
Content: Configuration Management | Configuration Settings
AI Justification
The text discusses the importance of configuration management policies and procedures, their development, and their relation to security and privacy assurance.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The mention of establishing procedures that describe how policies or controls are implemented aligns with the principle of least functionality.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Configuration Management | Configuration Management Plan
AI Justification
The text refers to the necessity of having a configuration management plan as part of the overall security and privacy policy.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings
Content: Configuration Management | Least Functionality Configuration Management | Configuration Management Plan
AI Justification
The chunk discusses various aspects of configuration management, which aligns with the requirements for baseline configurations as outlined in control CM-2.

Document Content
Matched Section
Section: An analysis of the general information security practices applicability to current technology, business and process requirements.
Content: An analysis of the general information security practices applicability to current technology, business and process requirements. (b) A gap analysis of general information security practices against current industry standards such as those published by National Institute for Standards and Technology (NIST), the International Organization for Standardization (ISO), major regulatory bodies or other similar organizations.
AI Justification
The text discusses conducting gap analyses and reviews of information security practices, which aligns with the need for impact analyses as described in CM-4.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings
Content: Configuration Management | Configuration Settings
AI Justification
The chunk discusses various aspects of configuration management, including systematic proposal, justification, implementation, and review of system changes, which aligns directly with the requirements of CM-3.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The mention of configuration management implies a focus on ensuring that systems operate with the least functionality necessary, which aligns with CM-7.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Configuration Management | Configuration Management Plan
AI Justification
The reference to a configuration management plan indicates the need for a structured approach to managing configurations, which aligns with CM-9.

Document Content
Matched Section
Section: System & Services Acquisition | Developer Configuration Management
Content: System & Services Acquisition | Developer Configuration Management
AI Justification
The mention of including representatives from development organizations on Configuration Control Boards aligns with the requirements of SA-10.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings
Content: Configuration Management | Configuration Settings
AI Justification
The text discusses the importance of configuration settings in hardware, software, and firmware components, which directly aligns with the definition and scope of control CM-6.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The mention of common secure configurations and the need to limit functionality aligns with the principles of CM-7, which emphasizes the least functionality necessary for the system.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The text discusses the importance of limiting component functionality to a single function per component and removing unnecessary software, which aligns with the principles of least functionality.

Document Content
Matched Section
Section: Asset Management – Establishes controls for asset identification, inventory, ownership and handling.
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets.
AI Justification
The chunk discusses asset identification and inventory, which aligns with the requirements for maintaining a centralized inventory of system components as outlined in CM-8.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual systems. Configuration management plans define processes and procedures for how configuration management is used to support system development life cycle activities.
AI Justification
The text discusses configuration management activities throughout the system development life cycle, including the creation and implementation of configuration management plans, which aligns directly with control CM-9.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of contingency planning policies and procedures in relation to security and privacy assurance, which aligns directly with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches.
AI Justification
The mention of procedures for security and privacy programs and the need for updates based on incidents aligns with the need for a contingency plan.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure.
AI Justification
The text implies the need for training related to the implementation of policies and procedures, which is relevant to contingency training.

Document Content
Matched Section
Section: Information Security Aspects of Business Continuity Management
Content: Establishes controls to ensure continuous business operations and availability of information in the event of major failures or disasters.
AI Justification
The chunk discusses the importance of maintaining information security and business continuity, which aligns with the need for alternative security mechanisms to support these objectives.

Document Content
Matched Section
Section: Information Security Aspects of Business Continuity Management
Content: Information Security Aspects of Business Continuity Management – Establishes controls to ensure continuous business operations and availability of information in the event of major failures or disasters.
AI Justification
The text discusses the importance of contingency planning for systems, including system restoration and alternative processes when systems are compromised, which aligns directly with CP-2.

Document Content
Matched Section
Section: Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations.
Content: Control: IA-1: Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of identification and authentication policy and procedures.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, their development, and their relationship with security and privacy programs.

Document Content
Matched Section
Section: Policies and procedures contribute to security and privacy assurance.
Content: Control: IA-1: Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The mention of policies and procedures that contribute to security assurance aligns with the need for access control policies.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The text discusses the importance of incident response policies and procedures, aligning directly with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Incident response training
Content: Incident response training is associated with the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail are included in such training.
AI Justification
The text discusses the need for incident response training tailored to different roles within the organization, which aligns with the requirements of control IR-2.

Document Content
Matched Section
Section: Events that may precipitate an update to incident response training content
Content: Events that may precipitate an update to incident response training content include, but are not limited to, incident response plan testing or response to an actual incident (lessons learned)...
AI Justification
The mention of incident response plan testing and updates to training content aligns with the testing aspect of control IR-3.

Document Content
Matched Section
Section: Incident response training
Content: Incident response training includes user training in identifying and reporting suspicious activities from external and internal sources.
AI Justification
The text implies the need for a structured incident response plan, which is a key aspect of control IR-8.

Document Content
Matched Section
Section: Evaluation of Policies Effectiveness
Content: The policies effectiveness, demonstrated by the nature, number and impact of recorded security incidents.
AI Justification
The chunk discusses the evaluation of policies effectiveness and the impact of recorded security incidents, which aligns with the testing of incident response capabilities.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The text discusses the importance of incident response capabilities and the need for coordination among various organizational entities, which aligns directly with the requirements of control IR-4.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The chunk discusses the establishment of controls for managing information security incidents, which aligns with the requirements for documenting incidents and maintaining records as described in IR-5.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The section discusses the establishment of controls for managing information security incidents, which aligns with the requirement for reporting incidents and their content.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The chunk discusses the establishment of controls for managing information security incidents, which aligns with the need for a coordinated approach to incident response as outlined in control IR-8.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The chunk discusses the management of information security incidents, which includes the handling of information spills and the necessary corrective actions based on classification and impact levels.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses the importance of maintenance policies and procedures in relation to security and privacy assurance, which aligns with the MA-1 control.

Document Content
Matched Section
Section: Media protection policy and procedures
Content: Control: MP-1: Media protection policy and procedures address the controls in the MP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of establishing media protection policies and procedures, which aligns with the control's focus on addressing media protection within organizations.

Document Content
Matched Section
Section: Risk Policy
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The mention of a risk policy that establishes controls for identifying, evaluating, and managing risk aligns with the need for a risk assessment framework.

Document Content
Matched Section
Section: Cloud Policy
Content: Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The policies mentioned for safeguarding applications and systems that handle confidential information align with access control requirements.

Document Content
Matched Section
Section: End-user Device Security Policy
Content: End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities.
AI Justification
The End-user Device Security Policy emphasizes controls for devices accessing information, which relates to account management and access control.

Document Content
Matched Section
Section: Internet Security & Usage Policy
Content: Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
AI Justification
The Internet Security & Usage Policy addresses acceptable usage and security controls, which is relevant to system and communications protection.

Document Content
Matched Section
Section: Asset Management and Access Control
Content: Asset Management – Establishes controls for asset identification, inventory, ownership and handling. Defines appropriate level of protection requirement and accountabilities for information assets.
AI Justification
The chunk discusses asset management and access control, which are relevant to the protection and handling of both digital and non-digital media.

Document Content
Matched Section
Section: Physical and Environmental Security
Content: Physical and Environmental Security – Establishes controls to prevent unauthorized physical access, damage and interference to the organization’s information assets and information processing facilities.
AI Justification
The mention of preventing unauthorized physical access aligns with the need for physical security controls outlined in the control.

Document Content
Matched Section
Section: Physical and Environmental Protection Policy and Procedures
Content: Control: PE-1: Physical and environmental protection policy and procedures address the controls in the PE family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of policies and procedures related to physical and environmental protection, aligning with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Risk Policy
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The mention of establishing controls to ensure identification, evaluation, and management of risk aligns with the need for a risk assessment policy.

Document Content
Matched Section
Section: Cloud Policy
Content: Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The policies mentioned for safeguarding Company Confidential and Company Restricted information align with access control requirements.

Document Content
Matched Section
Section: End-user Device Security Policy
Content: End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities.
AI Justification
The End-user Device Security Policy addresses controls for devices used by employees and vendors, which relates to account management.

Document Content
Matched Section
Section: Internet Security & Usage Policy
Content: Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
AI Justification
The Internet Security & Usage Policy addresses acceptable Internet usage and security controls, aligning with system and communications protection.

Document Content
Matched Section
Section: Physical and Environmental Security
Content: Establishes controls to prevent unauthorized physical access, damage and interference to the organization’s information assets and information processing facilities.
AI Justification
The section on Physical and Environmental Security discusses controls to prevent unauthorized physical access, which aligns with the need to enforce authorizations for entry and exit of system components.

Document Content
Matched Section
Section: Physical and Environmental Security
Content: Establishes controls to prevent unauthorized physical access, damage and interference to the organization’s information assets and information processing facilities.
AI Justification
The chunk discusses controls related to physical and environmental security, which aligns with the need for physical access authorizations.

Document Content
Matched Section
Section: Physical and Environmental Security
Content: Physical and Environmental Security – Establishes controls to prevent unauthorized physical access, damage and interference to the organization’s information assets and information processing facilities.
AI Justification
The chunk discusses the establishment of controls to prevent unauthorized physical access, which aligns with the requirements of PE-3.

Document Content
Matched Section
Section: Risk Policy, Cloud Policy, End-user Device Security Policy, Internet Security & Usage Policy
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives. Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information. End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities. Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
AI Justification
The chunk discusses various policies that establish controls related to information security, aligning with the need for planning policies and procedures.

Document Content
Matched Section
Section: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest.
Content: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest. Controls are chosen for baselines to either satisfy mandates imposed by laws, executive orders, directives, regulations, policies, standards, and guidelines or address threats common to all users of the baseline under the assumptions specific to the baseline.
AI Justification
The text discusses the importance of control baselines in addressing protection needs and mandates, which aligns with the definition provided in control PL-10.

Document Content
Matched Section
Section: Tailoring Actions and Control Baselines
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions. Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions, the environments where their systems operate, the threats and vulnerabilities that can affect their systems, and any other conditions or situations that can impact their mission or business success.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns with the control's focus on customizing baseline controls.

Document Content
Matched Section
Section: VII. Test adopts the NIST CSF and ISO 27001 standards as the foundation for the policies and following minimum policies shall be maintained to instill the baseline controls
Content: Acceptable Use – Establishes the acceptable use of information processing assets for all users.
AI Justification
The chunk discusses the establishment of policies related to acceptable use and information security, which aligns with the concept of rules of behavior for organizational users.

Document Content
Matched Section
Section: VII. Test adopts the NIST CSF and ISO 27001 standards as the foundation for the policies and following minimum policies shall be maintained to instill the baseline controls
Content: Acceptable Use – Establishes the acceptable use of information processing assets for all users.
AI Justification
The mention of acceptable use policies implies the need for controls that govern how users interact with information systems, which aligns with AC-8.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings
Content: Configuration Management | Configuration Settings
AI Justification
The text discusses central management of controls and processes, which aligns with the principles of configuration management.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Configuration Management | Configuration Management Plan
AI Justification
The mention of central management and the processes involved aligns with the requirements of CM-9.

Document Content
Matched Section
Section: Assessment, Authorization, and Monitoring | Control Assessments
Content: Assessment, Authorization, and Monitoring | Control Assessments
AI Justification
The text refers to assessments in support of authorizations, which aligns with CA-2.

Document Content
Matched Section
Section: Assessment, Authorization, and Monitoring | Continuous Monitoring
Content: Assessment, Authorization, and Monitoring | Continuous Monitoring
AI Justification
The mention of continuous monitoring in the context of centrally managed controls aligns with CA-7.

Document Content
Matched Section
Section: Information Security Program Plan
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance of an information security program plan and its role in managing security controls across the organization.

Document Content
Matched Section
Section: Privacy Program Plan
Content: Privacy program plans and supply chain risk management plans are addressed separately in PM-18 and SR-2, respectively.
AI Justification
The text mentions that privacy program plans are addressed separately, indicating a structured approach to managing privacy alongside security.

Document Content
Matched Section
Section: Supply Chain Risk Management Plan
Content: Privacy program plans and supply chain risk management plans are addressed separately in PM-18 and SR-2, respectively.
AI Justification
The text references supply chain risk management plans, indicating the need for controls in this area as part of the overall security program.

Document Content
Matched Section
Section: Definition of Protection Needs
Content: Protection needs are technology-independent capabilities that are required to counter threats to organizations, individuals, systems, and the Nation through the compromise of information (i.e., loss of confidentiality, integrity, availability, or privacy).
AI Justification
The text discusses the need for protection against threats to confidentiality, integrity, and availability, which aligns with the control's focus on defining protection needs based on organizational risk management strategies.

Document Content
Matched Section
Section: Governance and Documentation
Content: Mission and business process definitions and the associated protection requirements are documented in accordance with organizational policies and procedures.
AI Justification
The mention of documenting mission and business process definitions in accordance with organizational policies aligns with governance controls.

Document Content
Matched Section
Section: Information Security Awareness, Education and Training
Content: Information Security Awareness, Education and Training
AI Justification
The chunk discusses the importance of role-based training programs and the development of security and privacy capabilities, which aligns with the objectives of PM-13.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Awareness & Training | Role-based Training
AI Justification
The mention of role-based training programs in the chunk aligns with the objectives of AT-3, which focuses on providing training tailored to specific roles.

Document Content
Matched Section
Section: 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY
Content: The charter of the Information Security function is to: (a) Protect Test’s information assets from all threats, whether internal or external, deliberate or accidental. (b) Identify high probability and business impacting threats, and vulnerabilities that exist within Test. (c) Provide threat and vulnerability intelligence information including probabilities and potential business impacts to Test leadership. (d) Define and ensure appropriate implementation and operation of information security related controls that align with guidance from Test leadership. (e) Mitigate operational risks to Test information infrastructure and data assets by utilizing appropriate information security capabilities controls. (f) Maintain business continuity to counteract interruptions to business activities and to protect critical business processes from effects of major failures or disasters.
AI Justification
The text discusses the importance of security and privacy testing, training, and monitoring, which aligns with the control's focus on organization-wide oversight and coordination of these activities.

Document Content
Matched Section
Section: Role Responsibility
Content: CISO l Is responsible for developing, maintaining, and socializing an annual set of cybersecurity goals for the organization. l Is responsible for providing guidance at a strategic level on the organization’s cybersecurity program. l Is responsible for oversight and review of all information security policies, standards and best practices to ensure the organization remains compliant with all applicable regulations and legislation. l Is responsible for ensuring that the goals set forth in the cybersecurity program are in line with the business objectives of the organization. Global Risk Committee l Is responsible for developing, implementing, and maintaining processes to track cybersecurity related risk across the organization. l Is responsible for providing progress reports and metrics related to cybersecurity including but not limited to: (cid:127) Vulnerabilities (cid:127) Patching (cid:127) Attack Surface
AI Justification
The CISO and Global Risk Committee are responsible for overseeing and guiding cybersecurity goals and risk management activities, aligning with the control's focus on leadership in risk management.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The text discusses the establishment of controls related to vendor risk management and information security throughout the system lifecycle, which aligns with the principles of supply chain risk management.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The chunk discusses the integration of information security into the entire lifecycle of information systems, which aligns with the integration of security and privacy requirements into enterprise architecture as described in PM-7.

Document Content
Matched Section
Section: Section XI and XII regarding disciplinary actions and exceptions to policies.
Content: violation, non-adherence to this policy shall be viewed seriously and will be liable for disciplinary action that may include termination. XI. Access should be restricted to the information assets in keeping with business requirements and the associated risk.
AI Justification
The text discusses disciplinary actions for policy violations, which aligns with the concept of organizational sanctions as described in PS-8.

Document Content
Matched Section
Section: Information Security Roles & Responsibilities
Content: Information Security Roles & Responsibilities
AI Justification
The chunk discusses roles and responsibilities related to information security, which aligns with the specification of security and privacy roles in organizational position descriptions.

Document Content
Matched Section
Section: Awareness & Training | Role-based Training
Content: Awareness & Training | Role-based Training
AI Justification
The mention of role-based training indicates a focus on the training requirements associated with specific roles.

Document Content
Matched Section
Section: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
Content: Risk Policy - Establishes controls to ensure identification, evaluation and management of risk to secure business assets and support achievement of corporate objectives.
AI Justification
The text discusses the importance of risk assessment policies and procedures in addressing controls and ensuring security and privacy assurance.

Document Content
Matched Section
Section: Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information.
Content: Cloud Policy - Establishes controls that define the requirements for safeguards and controls for applications and systems that contain, process, or transmit Company Confidential and Company Restricted information.
AI Justification
The mention of safeguards and controls for applications and systems aligns with access control measures.

Document Content
Matched Section
Section: End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities.
Content: End-user Device Security Policy - Establishes controls that define the requirements for safeguards and controls for any computing device used by employees, vendors, and service providers who access information available through Test network facilities.
AI Justification
The End-user Device Security Policy addresses controls for devices accessing information, which relates to remote access security.

Document Content
Matched Section
Section: Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
Content: Internet Security & Usage Policy – Establishes controls that address acceptable Internet Usage Policies, and Internet Security Controls that should be implemented and followed in order to protect the confidentiality and integrity of information.
AI Justification
The Internet Security & Usage Policy addresses controls for internet usage and security, which is part of system and communications protection.

Document Content
Matched Section
Section: VII. Test adopts the NIST CSF and ISO 27001 standards as the foundation for the policies and following minimum policies shall be maintained to instill the baseline controls
Content: VII. Test adopts the NIST CSF and ISO 27001 standards as the foundation for the policies and following minimum policies shall be maintained to instill the baseline controls: (a) Acceptable Use – Establishes the acceptable use of information processing assets for all users. (b) Information Security Policy – Communicates management direction and support for information security in accordance with business requirements and relevant laws and regulations and sets expectations for associates. (c) Organization of Information Security – Establishes a management framework to initiate and control the implementation and operation of information security within the organization. (d) Human Resource Security - Establishes controls to reduce the risk of employee/contractor error, theft, fraud, or misuse of information assets. (e) Data Security – Establishes controls and framework for classifying, labelling and handling of information assets.
AI Justification
The section discusses the establishment of policies related to information security, including the classification and handling of information assets, which aligns with the security categorization process outlined in RA-2.

Document Content
Matched Section
Section: 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY
Content: (b) Identify high probability and business impacting threats, and vulnerabilities that exist within Test.
AI Justification
The section discusses identifying threats and vulnerabilities, which aligns with the requirements of conducting risk assessments as described in control RA-3.

Document Content
Matched Section
Section: Continuous Vulnerability Management
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the need for continuous monitoring and updates to vulnerability tools.

Document Content
Matched Section
Section: Assessment, Authorization, and Monitoring | Continuous Monitoring
Content: Vulnerability monitoring may also include continuous vulnerability monitoring tools that use instrumentation to continuously analyze components.
AI Justification
The text emphasizes the need for continuous vulnerability monitoring tools and processes to identify and address vulnerabilities promptly.

Document Content
Matched Section
Section: Assessment, Authorization, and Monitoring | Penetration Testing
Content: Control assessments, such as red team exercises, provide additional sources of potential vulnerabilities for which to scan.
AI Justification
The mention of control assessments, such as red team exercises, aligns with the need for penetration testing to identify vulnerabilities.

Document Content
Matched Section
Section: 1.3 MANAGEMENT DIRECTION FOR INFORMATION SECURITY
Content: The charter of the Information Security function is to: (a) Protect Test’s information assets from all threats, whether internal or external, deliberate or accidental. (b) Identify high probability and business impacting threats, and vulnerabilities that exist within Test.
AI Justification
The section discusses the importance of identifying critical components and functions, which aligns with the criticality analysis aspect of RA-9.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Control: SA-10: Organizations consider the quality and completeness of configuration management activities conducted by developers as direct evidence of applying effective security controls. Controls include protecting the master copies of material used to generate security-relevant portions of the system hardware, software, and firmware from unauthorized modification or destruction.
AI Justification
The text discusses the importance of configuration management activities conducted by developers and the need to maintain the integrity of changes throughout the system development life cycle.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses the importance of policies and procedures in system and services acquisition, aligning with the control's focus on establishing such policies.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The mention of establishing controls to ensure information security is integral to the development lifecycle aligns with the need for resource allocation in system acquisition.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text emphasizes the integration of information security throughout the system development lifecycle, which aligns with this control.

Document Content
Matched Section
Section: Configuration Management | Configuration Settings, Configuration Management | Least Functionality, Configuration Management | Configuration Management Plan, System & Services Acquisition | Developer Configuration Management
Content: Configuration Management | Configuration Settings Configuration Management | Least Functionality Configuration Management | Configuration Management Plan System & Services Acquisition | Developer Configuration Management
AI Justification
The chunk discusses configuration management and the integrity of changes, which aligns with the need for maintaining effective development processes and configuration control as outlined in SA-15.

Document Content
Matched Section
Section: Configuration Management | Least Functionality
Content: Configuration Management | Least Functionality
AI Justification
The mention of configuration management and maintaining integrity relates to the principle of least functionality, ensuring that systems are configured to provide only essential capabilities.

Document Content
Matched Section
Section: Configuration Management | Configuration Management Plan
Content: Configuration Management | Configuration Management Plan
AI Justification
The reference to configuration management plans aligns with CM-9, which emphasizes the need for a structured approach to managing configurations.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The chunk discusses the importance of maintaining information security throughout the lifecycle of information systems, which aligns with the need for support and updates for system components.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses the integration of security and privacy considerations into the system development life cycle, which aligns directly with the principles outlined in SA-3.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text mentions the importance of security engineering principles in designing, coding, and testing systems, which aligns with SA-8.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The text highlights the role of acquisition and supply chain risk management in the system development life cycle, which aligns with SA-9.

Document Content
Matched Section
Section: Security and privacy functional requirements
Content: Security and privacy functional requirements are typically derived from the high-level security and privacy requirements described in SA-2. The derived requirements include security and privacy capabilities, functions, and mechanisms.
AI Justification
The text discusses the derivation of security and privacy requirements, which aligns with the control's focus on deriving functional requirements from high-level security and privacy objectives.

Document Content
Matched Section
Section: Security and privacy documentation requirements
Content: Security and privacy documentation requirements address all stages of the system development life cycle. Documentation provides user and administrator guidance for the implementation and operation of controls.
AI Justification
The text mentions the need for documentation and processes related to controls, which aligns with the establishment of policies and procedures for configuration management.

Document Content
Matched Section
Section: Controls can include technical, administrative, and physical aspects
Content: Controls can include technical, administrative, and physical aspects. In some cases, the selection and implementation of a control may necessitate additional specification by the organization in the form of derived requirements or instantiated control parameter values.
AI Justification
The text refers to the selection and implementation of controls, which includes change management aspects, aligning with the need for configuration change control.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The chunk discusses the importance of establishing controls for information security throughout the lifecycle of information systems, which aligns with the need for system documentation to understand and manage controls effectively.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance; Vendor Risk Management
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems. (m) Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The text discusses the management of external system services and the importance of establishing trust relationships with external providers, which aligns directly with the requirements outlined in control SA-9.

Document Content
Matched Section
Section: System Acquisition, Development and Maintenance
Content: System Acquisition, Development and Maintenance – Establishes controls to ensure that information security is an integral part of information systems across the entire lifecycle and information security is designed and implemented within the development lifecycle of information systems.
AI Justification
The text discusses the importance of establishing policies and procedures for system and communications protection, aligning with the SC-1 control.

Document Content
Matched Section
Section: Vendor Risk Management
Content: Vendor Risk Management – Establishes controls to maintain an agreed level of information security and service delivery.
AI Justification
The mention of risk management strategy as a factor in establishing policies aligns with the PM-9 control.

Document Content
Matched Section
Section: Information Security Incident Management
Content: Information Security Incident Management – Establishes controls to ensure a consistent and effective approach to the management of information security incidents, including communication on security events and weaknesses.
AI Justification
The text emphasizes the need for a consistent approach to managing information security incidents, which aligns with the IR-1 control.

Document Content
Matched Section
Section: Information Security Aspects of Business Continuity Management
Content: Information Security Aspects of Business Continuity Management – Establishes controls to ensure continuous business operations and availability of information in the event of major failures or disasters.
AI Justification
The reference to ensuring continuous business operations in the event of failures aligns with the CP-1 control.

Document Content
Matched Section
Section: Compliance
Content: Compliance – Establishes controls to ensure compliance with legal, statutory.
AI Justification
The discussion about compliance with legal and statutory requirements aligns with the PL-1 control.

Document Content
Matched Section
Section: Cryptography
Content: Cryptography – Establishes controls for proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information.
AI Justification
The chunk discusses the establishment of controls for the proper and effective use of cryptography, which aligns with the requirements for cryptographic key management and establishment.

Document Content
Matched Section
Section: Cryptography
Content: Cryptography – Establishes controls for proper and effective use of cryptography to protect the confidentiality, authenticity and/or integrity of information.
AI Justification
The chunk discusses the establishment of controls for the proper and effective use of cryptography, which aligns with the requirements outlined in SC-13 regarding the protection of information and the implementation of cryptographic standards.
anonymized_7.0_IS_Asset_Management_Policy.pdf NIST
152 matches found

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Control: AC-1: Access control policy and procedures address the controls in the AC family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of access control policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies reflecting the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to access control policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their role in security and privacy assurance.

Document Content
Matched Section
Section: 1.2. Hardware, Software, Applications and Data - Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The text discusses the identification and inventory of mobile devices, which aligns with the requirements for managing and controlling mobile devices as outlined in AC-19.

Document Content
Matched Section
Section: Defining and periodically reviewing access restrictions and classification of important Assets, considering applicable access control policies.
Content: Defining and periodically reviewing access restrictions and classification of important Assets, considering applicable access control policies.
AI Justification
The chunk discusses defining and reviewing access restrictions and classification of important assets, which relates to making access control decisions.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Control: AT-3: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the importance of role-based training tailored to the responsibilities and security requirements of personnel, which aligns directly with the intent of AT-3.

Document Content
Matched Section
Section: Ensuring the resolution of information security-related audit issues.
Content: Ensuring the resolution of information security-related audit issues.
AI Justification
The text discusses the importance of audit issues resolution and the delegation of authority, which aligns with the need for audit and accountability policies and procedures.

Document Content
Matched Section
Section: Defining and periodically reviewing access restrictions and classification of important Assets, considering applicable access control policies.
Content: Defining and periodically reviewing access restrictions and classification of important Assets, considering applicable access control policies.
AI Justification
The text mentions defining and periodically reviewing access restrictions and classification of important assets, which is directly related to access control policies.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
The chunk discusses network controls and mentions various aspects of information transfer and segregation in networks, which aligns with the use of out-of-band channels for secure transmission.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
The mention of segregation in networks and protecting application services transactions aligns with the need for boundary protection.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls A.13.1.3 Segregation in Networks Information Transfer Policies & Procedures Electronic Messaging Confidentiality or Non-Disclosure Agreements Securing Application Services on Public Networks Protecting Application Services Transactions NIST SP 800-53 Rev 5
AI Justification
The chunk discusses various network controls and emphasizes the importance of protecting information, which aligns with the principles of OPSEC.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls A.13.1.3 Segregation in Networks Information Transfer Policies & Procedures Electronic Messaging Confidentiality or Non-Disclosure Agreements Securing Application Services on Public Networks Protecting Application Services Transactions NIST SP 800-53 Rev 5
AI Justification
The mention of protecting application services and securing transactions indicates a focus on boundary protection, which is relevant to SC-7.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse.
AI Justification
The section discusses the secure disposal and reuse of assets containing sensitive information, which aligns with preventing unauthorized access to residual information.

Document Content
Matched Section
Section: Acceptable Use of Assets
Content: Policies for the acceptable use of information and of Assets associated with information and information processing facilities should be identified, documented, and implemented.
AI Justification
The chunk discusses acceptable use policies and the need to document and implement them, which aligns with the concept of usage restrictions on system components.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
The control SC-7 relates to the protection of information systems by ensuring that there are no logical paths that could allow for policy enforcement mechanisms to be bypassed.

Document Content
Matched Section
Section: Network Controls
Content: A variety of technologies are available to limit or eliminate the origination and effects of denial-of-service events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of denial-of-service attacks.
AI Justification
The text discusses the use of boundary protection devices to mitigate denial-of-service attacks, which aligns with the SC-7 control focused on boundary protection mechanisms.

Document Content
Matched Section
Section: Network Controls
Content: Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to denial-of-service events.
AI Justification
The mention of employing increased network capacity and bandwidth to reduce susceptibility to denial-of-service events aligns with the SI-4 control, which emphasizes the importance of monitoring systems for integrity and availability.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls A.13.1.3 Segregation in Networks
AI Justification
The text discusses managed interfaces and boundary protection measures, which directly align with the SC-7 control regarding network boundaries and segregation.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Control: SC-8: Protecting the confidentiality and integrity of transmitted information applies to internal and external networks as well as any system components that can transmit information, including servers, notebook computers, desktop computers, mobile devices, printers, copiers, scanners, facsimile machines, and radios. Unprotected communication paths are exposed to the possibility of interception and modification.
AI Justification
The chunk discusses the importance of protecting the confidentiality and integrity of transmitted information, which aligns directly with control SC-8.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Protecting the confidentiality and integrity of information can be accomplished by physical or logical means.
AI Justification
The mention of protecting the confidentiality and integrity of information through physical or logical means aligns with the data protection focus of PR.DS-5.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Logical protection can be achieved by employing encryption techniques.
AI Justification
The text discusses employing encryption techniques for logical protection, which aligns with the cryptographic controls policy.

Document Content
Matched Section
Section: Policy Exception Process
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of security requirements and mechanisms, as well as the process for requesting exceptions to the policy, which aligns with the need for documented policies and procedures for system and information integrity.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse. Assets reuse and destruction practices should be tracked, documented, and evidenced.
AI Justification
The text discusses the importance of managing and retaining information throughout its lifecycle, including secure disposal and documentation of asset reuse and destruction practices.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy.
AI Justification
The section discusses the secure disposal of assets and the importance of classifying information, which aligns with the need to retain information only as long as necessary.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
The chunk discusses various network controls and mentions spam protection mechanisms, which aligns with the control's focus on system entry and exit points and spam protection.

Document Content
Matched Section
Section: Securing Application Services on Public Networks
Content: Securing Application Services on Public Networks
AI Justification
The mention of securing application services on public networks aligns with the need for boundary protection as outlined in SC-7.

Document Content
Matched Section
Section: Divisions & Functions Policy Implementation
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the implementation of security requirements and mechanisms, including the process for requesting policy exceptions, which aligns with the need for a supply chain risk management policy that addresses security controls.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse.
AI Justification
The section discusses the secure disposal of assets containing sensitive data and the need for formal procedures, aligning with the control's focus on disposal at any stage of the system development life cycle.

Document Content
Matched Section
Section: Supply Chain Risk Management
Content: The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware, and poor manufacturing and development practices in the supply chain.
AI Justification
The text discusses the complexities and requirements of managing supply chain risks, which aligns directly with the control's focus on the risks associated with external providers and the need for tailored SCRM plans.

Document Content
Matched Section
Section: Supply Chain Risk Management
Content: Finally, supply chain risk management plans address requirements for developing trustworthy, secure, privacy-protective, and resilient system components and systems, including the application of the security design principles implemented as part of life cycle-based systems security engineering processes.
AI Justification
The text emphasizes the importance of developing trustworthy and secure system components, which aligns with the control's focus on the acquisition and development of critical components.

Document Content
Matched Section
Section: Ensuring the resolution of information security-related audit issues
Content: Ensuring the resolution of information security-related audit issues.
AI Justification
The text discusses the resolution of information security-related audit issues, which aligns with the need for reviewing and analyzing audit records.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the implementation of security requirements and mechanisms, as well as the process for requesting policy exceptions, which aligns with the need for assessment and authorization procedures.

Document Content
Matched Section
Section: Network Controls
Content: Control: CA-3: System information exchange requirements apply to information exchanges between two or more systems. System information exchanges include connections via leased lines or virtual private networks, connections to internet service providers, database sharing or exchanges of database transaction information, connections and exchanges with cloud services, exchanges via web-based services, or exchanges of files via file transfer protocols, network protocols (e.g., IPv4, IPv6), email, or other organization-to-organization communications.
AI Justification
The text discusses the requirements and considerations for system information exchanges, including risk assessment and agreements between organizations.

Document Content
Matched Section
Section: 1.2. Hardware, Software, Applications and Data - Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The chunk discusses the inventory of assets, including mobile devices and printers, which are part of internal system connections as defined in CA-9.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions to define and implement security requirements and mechanisms, which aligns with the need for configuration management policies and procedures that address security and privacy assurance.

Document Content
Matched Section
Section: Configuration Management | System Component Inventory
Content: Control: CM-2: Baseline configurations for systems and system components include connectivity, operational, and communications aspects of systems. Baseline configurations are documented, formally reviewed, and agreed-upon specifications for systems or configuration items within those systems.
AI Justification
The chunk discusses the importance of baseline configurations for systems and system components, which aligns directly with the control's focus on documenting and maintaining baseline configurations.

Document Content
Matched Section
Section: 1.2. Hardware, Software, Applications and Data - Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The text discusses the need for an inventory of assets, including hardware and software, which aligns with the requirements of CM-8 for maintaining a centralized inventory of system components.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the ability of divisions to define and implement security requirements, including the process for requesting exceptions to policies, which aligns with the need for contingency planning policies and procedures.

Document Content
Matched Section
Section: 1.2.1 Backup
Content: a) For additional information on data backup, please refer to 6.0 Data Security Policy.
AI Justification
The section discusses data backup and the importance of protecting sensitive information, which aligns with the control's focus on system-level information and backup integrity.

Document Content
Matched Section
Section: Divisions & Functions Policy Implementation
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the implementation of security requirements and mechanisms, including the process for requesting exceptions to the policy, which aligns with the need for incident response policies and procedures.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the establishment of security requirements and mechanisms, including the process for requesting exceptions to the policy, which aligns with the need for maintenance policies and procedures.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security | External Personnel Security Personnel Security | Personnel Sanctions Personnel Security | Position Descriptions
AI Justification
The text discusses the roles and access requirements of maintenance personnel, which aligns with the MA-5 control regarding maintenance activities on organizational systems.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security | External Personnel Security Personnel Security | Personnel Sanctions Personnel Security | Position Descriptions
AI Justification
The mention of physical access for maintenance personnel aligns with PE-2, which addresses the physical access requirements for individuals performing maintenance duties.

Document Content
Matched Section
Section: Acceptable Use of Assets
Content: Policies for the acceptable use of information and of Assets associated with information and information processing facilities should be identified, documented, and implemented.
AI Justification
The text discusses the importance of policies and procedures related to media protection, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets should be securely disposed of when no longer required, using formal procedures. The procedures for secure disposal of Assets containing sensitive data can be found in IS Global Policies and Standards, Data Security Policy. Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse.
AI Justification
The text discusses secure disposal and sanitization of assets containing sensitive data, which aligns with the requirements for media sanitization.

Document Content
Matched Section
Section: 1.2.2 Asset Disposal & Re-Use
Content: Assets that contain sensitive or internal information should be adequately obscured, erased, destroyed, or otherwise rendered unusable prior to disposal or reuse.
AI Justification
The section discusses the secure disposal of assets containing sensitive data, which aligns with the concept of media downgrading to ensure information cannot be retrieved or reconstructed.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary.
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions to define and implement security requirements, which aligns with the need for policies and procedures addressing physical and environmental protection.

Document Content
Matched Section
Section: Physical & Environmental Protection
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The chunk discusses physical and environmental protection, which aligns with the need for environmental controls in organizational facilities.

Document Content
Matched Section
Section: Physical & Environmental Protection
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The mention of environmental controls in the context of protecting systems aligns with this control focused on external and environmental threats.

Document Content
Matched Section
Section: Physical & Environmental Protection
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The need for environmental controls in specific facilities like data centers relates to the protection of equipment.

Document Content
Matched Section
Section: Physical & Environmental Protection
Content: Physical and environmental hazards include floods, fires, tornadoes, earthquakes, hurricanes, terrorism, vandalism, an electromagnetic pulse, electrical interference, and other forms of incoming electromagnetic radiation.
AI Justification
The control aligns with the need to consider various physical and environmental hazards that can affect organizational security.

Document Content
Matched Section
Section: Physical & Environmental Protection
Content: Organizations consider the location of entry points where unauthorized individuals, while not being granted access, might nonetheless be near systems.
AI Justification
This control is relevant as it pertains to the consideration of entry points and the protection of systems from unauthorized access.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical access control applies to employees and visitors. Individuals with permanent physical access authorizations are not considered visitors. Physical access controls for publicly accessible areas may include physical access control logs/records, guards, or physical access devices and barriers to prevent movement from publicly accessible areas to non-public areas.
AI Justification
The chunk discusses physical access control measures, which are part of the broader access control policies that organizations must implement.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Organizations determine the types of guards needed, including professional security staff, system users, or administrative staff.
AI Justification
The mention of physical access controls and the need for security measures aligns with the control regarding working in secure areas.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Components of systems may be in areas designated as publicly accessible with organizations controlling access to the components.
AI Justification
The control regarding equipment siting and protection is relevant as the chunk discusses controlling access to components in publicly accessible areas.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
The control PE-4 is directly related to the physical security measures that prevent damage, disruption, and tampering of system distribution and transmission lines, which aligns with the mention of physical controls in the chunk.

Document Content
Matched Section
Section: Network Controls
Content: Network Controls
AI Justification
SC-7 relates to protecting the boundaries of systems, which can include physical aspects of network security, aligning with the need to prevent unauthorized access and tampering.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The control focuses on the physical protection of equipment, which aligns with the need to control physical access to output devices.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The chunk discusses physical access monitoring and its importance in identifying suspicious activities, which aligns directly with the control's focus.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The mention of reviewing physical access logs and the support from audit logging controls aligns with the need for audit logging as specified in AU-2.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions to define and implement security requirements, which aligns with the need for planning policies and procedures for security controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Control: PL-11: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions.
AI Justification
The text discusses the importance of tailoring controls, which aligns with the need for a defined access control policy that reflects specific organizational requirements.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs.
AI Justification
The text discusses the requirements and components of insider threat programs, including monitoring, training, and oversight, which aligns directly with control PM-12.

Document Content
Matched Section
Section: Personnel Security | Personnel Sanctions
Content: Insider threat programs require organizations to prepare department or agency insider threat policies and implementation plans, conduct host-based user monitoring of individual employee activities on government-owned classified computers.
AI Justification
The text mentions the importance of monitoring employee activities and the need for insider threat awareness training, which relates to personnel screening.

Document Content
Matched Section
Section: System & Services Acquisition | Developer Screening
Content: Insider threat programs can leverage the existence of incident handling teams that organizations may already have in place.
AI Justification
The mention of monitoring and oversight in the context of insider threats relates to the screening of individuals who have access to sensitive information.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Physical & Environmental Protection | Asset Monitoring & Tracking
AI Justification
The text discusses the central management of controls, which includes access control policies as part of the centrally managed controls.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: Control: PM-31: Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions.
AI Justification
The text discusses the importance of continuous monitoring at the organization level for security and privacy posture, which aligns directly with control PM-31.

Document Content
Matched Section
Section: Physical & Environmental Protection | Asset Monitoring & Tracking
Content: The results of continuous monitoring guide and inform risk response actions by organizations.
AI Justification
The mention of monitoring requirements and the need for ongoing assessment aligns with CA-7, which focuses on continuous monitoring of security controls.

Document Content
Matched Section
Section: 1.2. Hardware, Software, Applications and Data - Inventory of Assets
Content: All relevant Test information and information processing Assets should be identified, and an inventory of these assets maintained to ensure effective protection through creation, processing, storage, transmission, deletion, and eventual destruction. The asset inventory should be maintained within a centralized repository and official system of record (SOR).
AI Justification
The text discusses the need for an inventory of assets, which aligns with the guidance provided in OMB A-130 regarding the development of systems inventories.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Control: PS-1: Personnel security policy and procedures for the controls in the PS family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of personnel security policies and procedures, their development, and the collaboration between security and privacy programs.

Document Content
Matched Section
Section: Personnel Security | Personnel Sanctions
Content: Personnel Security | Personnel Sanctions
AI Justification
The mention of personnel sanctions aligns with the broader context of personnel security policies and procedures.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Personnel Security | Position Descriptions
AI Justification
The text implies the need for clear position descriptions as part of personnel security policies.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Control: PS-2: Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel security program. The Position Designation System (PDS) assesses the duties and responsibilities of a position to determine the degree of potential damage to the efficiency or integrity of the service due to misconduct of an incumbent of a position and establishes the risk level of that position.
AI Justification
The text discusses the importance of position risk designations and their alignment with OPM policy, which is directly related to control PS-2.

Document Content
Matched Section
Section: Personnel Security
Content: Personnel Security |External Personnel Security Personnel Security |Personnel Sanctions Personnel Security |Position Descriptions
AI Justification
The chunk discusses various aspects of personnel security, which aligns with the requirements for personnel screening and rescreening activities as outlined in PS-3.

Document Content
Matched Section
Section: Return of Assets
Content: All employees and external party Users should return Test Assets within their possession, upon termination of their employment, contract or agreement.
AI Justification
The section discusses the return of assets and the responsibilities of managers and HR to ensure that all assets are returned upon termination, which aligns with the control's focus on accountability for system-related property.

Document Content
Matched Section
Section: Return of Assets
Content: In cases where an employee or external party User has knowledge that is important to the ongoing operation of the company, that information should be documented during the exit interview.
AI Justification
The mention of documenting important information during the exit interview aligns with the control's emphasis on ensuring that terminated individuals understand security constraints.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security | External Personnel Security
AI Justification
The chunk discusses actions related to personnel security, including reassignments and transfers, which aligns with the requirements outlined in PS-5.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security | External Personnel Security
AI Justification
The text discusses the importance of personnel security requirements for external providers and the management of their credentials and privileges.

Document Content
Matched Section
Section: Personnel Security | Personnel Sanctions
Content: Personnel Security | Personnel Sanctions
AI Justification
The mention of notifications of external personnel changes and the termination of privileges relates to personnel sanctions.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Personnel Security | Position Descriptions
AI Justification
The control relates to defining roles and functions associated with external personnel, which aligns with position descriptions.

Document Content
Matched Section
Section: ENFORCEMENT/COMPLIANCE
Content: Test Senior Management should define consequences for violations of all information security related policies, procedures, processes, or standards. Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The text discusses the consequences for violations of information security policies, which aligns with the need for organizational sanctions as described in PS-8.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Personnel Security |Position Descriptions
AI Justification
The chunk explicitly mentions 'Position Descriptions' under Personnel Security, which aligns with the specification of security and privacy roles.

Document Content
Matched Section
Section: Acceptable Use of Assets
Content: Policies for the acceptable use of information and of Assets associated with information and information processing facilities should be identified, documented, and implemented.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information processing and transparency, aligning with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Acceptable Use of Assets
Content: Policies for the acceptable use of information and of Assets associated with information and information processing facilities should be identified, documented, and implemented.
AI Justification
The mention of acceptable use policies indicates a need for access control measures to protect information and assets.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary...
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk...
AI Justification
The text discusses the ability of divisions to define and implement security requirements based on risk assessment, which aligns with the need for risk assessment policies and procedures.

Document Content
Matched Section
Section: PURPOSE and SCOPE & APPLICABILITY
Content: The purpose of this policy is to define the requirements for secure management of Test Assets throughout the Asset lifecycle including allocation, release, transfer, and disposal. This policy applies to all Test owned system and software Assets that have business value or create potential risk (e.g., financial loss, data loss, contractual default etc.) and to all Test personnel, third party consultants, contractors and vendor who work on Test premises or use Test Assets.
AI Justification
The text discusses the systematic management of assets throughout their lifecycle, which aligns with the need for risk assessments that consider threats and vulnerabilities to organizational operations and assets.

Document Content
Matched Section
Section: Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded.
Content: Criticality analysis is performed when an architecture or design is being developed, modified, or upgraded. If such analysis is performed early in the system development life cycle, organizations may be able to modify the system design to reduce the critical nature of these components and functions, such as by adding redundancy or alternate paths into the system design.
AI Justification
The text discusses the importance of criticality analysis in identifying and prioritizing system components and functions that require protection, which aligns directly with RA-9.

Document Content
Matched Section
Section: Such analysis is conducted as part of security categorization in RA-2.
Content: Criticality analysis can also influence the protection measures required by development contractors. In addition to criticality analysis for systems, system components, and system services, criticality analysis of information is an important consideration. Such analysis is conducted as part of security categorization in RA-2.
AI Justification
The text mentions that criticality analysis is conducted as part of security categorization, which aligns with RA-2.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the ability of divisions to define and implement security requirements, which aligns with the need for policies and procedures in system and services acquisition.

Document Content
Matched Section
Section: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary
Content: Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions to define and implement security requirements, which aligns with the need for policies and procedures that address system and communications protection.

Document Content
Matched Section
Section: Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal.
Content: Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal.
AI Justification
The mention of a policy exception process and the requirement for maintaining records of approved requests indicates a structured approach to policy management.

Document Content
Matched Section
Section: Assets ownership and responsibilities
Content: Ownership should be assigned for all assets maintained in the inventory. An Asset Owner should be assigned whenever Assets are acquired by or transferred by the organization.
AI Justification
The text discusses the assignment of ownership and responsibilities for assets, which aligns with the management of security and privacy attributes related to access control and information protection.

Document Content
Matched Section
Section: Listing of individuals or groups who are authorized to access the information
Content: Listing of individuals or groups who are authorized to access the information stored in or processed by the application.
AI Justification
The mention of authorized individuals or groups accessing the information aligns with the need for an access control policy.
anonymized_20.0_IS_Risk_Management_Policy_2.pdf NIST
52 matches found

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of access control policies and procedures, their applicability to all staff and contractors, and the need for a common methodology in information security risk management.

Document Content
Matched Section
Section: IS Risk Management Policy
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The text discusses the handling of sensitive information and the restrictions on sharing it, which aligns with the control's focus on information sharing and access restrictions.

Document Content
Matched Section
Section: 1.0 PURPOSE
Content: Test is committed to conducting all firm’s activities in compliance with all applicable laws, regulations, and Information Security policies. Test has adopted this policy to outline the security measures required to protect electronic information systems and related equipment from unauthorized use.
AI Justification
The text discusses the management of access to nonpublic information and the policies surrounding publicly accessible content, which aligns with the requirements of AC-22.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The policy outlines a common methodology for managing access to information and infrastructure, which aligns with the definition of access control policies that govern access between users and organizational resources.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of policies and procedures related to awareness and training, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Performance will be identified and measured by: ...
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, including their development and the roles involved in managing risks and compliance.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the need for policies and procedures addressing system and information integrity.

Document Content
Matched Section
Section: Information management and retention requirements cover the full life cycle of information.
Content: Information management and retention requirements cover the full life cycle of information, in some cases extending beyond system disposal. Information to be retained may also include policies, procedures, plans, reports, data output from control implementation, and other types of administrative information.
AI Justification
The text discusses the importance of managing and retaining information throughout its life cycle, which aligns directly with the requirements outlined in control SI-12.

Document Content
Matched Section
Section: 1.1 APPLICABILITY
Content: The policy and associated guidance provide a common methodology and organized approach to Information Security Risk Management whether based on regulatory compliance requirement or a threat to the organization.
AI Justification
The text discusses the importance of policies and procedures for assessment, authorization, and monitoring in the context of information security risk management, aligning with the CA-1 control.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the need for organizations to assess controls and ensure they meet security and privacy requirements.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of having a configuration management policy and procedures that address security and privacy assurance, which aligns with the requirements of control CM-1.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, which aligns directly with the control IA-1.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: The policy and associated guidance provide a common methodology and organized approach to Information Security Risk Management whether based on regulatory compliance requirement or a threat to the organization.
AI Justification
The text discusses the importance of incident response policies and procedures, which aligns directly with the control IR-1.

Document Content
Matched Section
Section: Performance will be identified and measured by: Compliance with regulation; Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented.
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The chunk discusses the investigation and analysis of information security incidents, which aligns with the requirements for incident reporting and compliance with regulations.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of media protection policies and procedures, aligning with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: DOCUMENT CLASSIFICATION
Content: DOCUMENT CLASSIFICATION Internal
AI Justification
The chunk discusses the classification of documents and the importance of security markings for various types of media, aligning with the definition and requirements outlined in control MP-3.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of policies and procedures related to physical and environmental protection, which aligns with the control's focus on establishing such policies and procedures within organizations.

Document Content
Matched Section
Section: 1.1 Applicability
Content: The policy and associated guidance provide a common methodology and organized approach to Information Security Risk Management whether based on regulatory compliance requirement or a threat to the organization.
AI Justification
The chunk discusses the establishment of a policy and associated guidance for Information Security Risk Management, which aligns with the need for planning policies and procedures as outlined in control PL-1.

Document Content
Matched Section
Section: Control References
Content: Control: PL-10: Control baselines are predefined sets of controls specifically assembled to address the protection needs of a group, organization, or community of interest.
AI Justification
The text discusses predefined sets of controls (control baselines) that address protection needs, which aligns with the definition and purpose of PL-10.

Document Content
Matched Section
Section: Control References
Content: the information types and the information that is processed, stored, and transmitted on the system; analyzing the potential adverse impact of the loss or compromise of the information or system on the organization.
AI Justification
The text mentions analyzing information types and the potential adverse impact of information loss, which relates to the categorization of security controls.

Document Content
Matched Section
Section: Control References
Content: considering the results from system and organizational risk assessments.
AI Justification
The text refers to risk assessments and their importance in selecting control baselines, aligning with the RA-3 control.

Document Content
Matched Section
Section: Section 1.4 - REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the need for security and privacy plans that frame, assess, respond, and monitor risks as outlined in control PL-2.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the overarching goals of an information security program plan as described in PM-1.

Document Content
Matched Section
Section: 1.5 ROLES & RESPONSIBILITIES
Content: CISO or appointed representative Will maintain the risk register Communicate information security risks to Executive Leadership
AI Justification
The text discusses risk management processes, roles, and responsibilities related to risk assessments and compliance, which aligns with the requirements of PM-10.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the need for an Information Security Risk Management Process that aligns with the protection needs derived from organizational stakeholders and risk management strategies.

Document Content
Matched Section
Section: 1.5 ROLES & RESPONSIBILITIES
Content: CISO or appointed representative Will maintain the risk register Communicate information security risks to Executive Leadership
AI Justification
The text discusses the roles and responsibilities of various officials, including the CISO, which aligns with the definition of the senior agency information security officer.

Document Content
Matched Section
Section: Performance will be identified and measured by
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The text discusses the importance of reporting on performance, compliance, and risk management, which aligns with promoting accountability and transparency in privacy operations.

Document Content
Matched Section
Section: 1.5 ROLES & RESPONSIBILITIES
Content: Board of Directors Audit Committee Presented annual risk update Executive Leadership, Risk Committee Approves Capital Expenditures for Information Security Communication Path to Senior Management CIO Sponsors the Information Security Team to ensure the information security risk process is followed for organization activities, processes and projects CISO or appointed representative Will maintain the risk register Communicate information security risks to Executive Leadership
AI Justification
The text discusses roles and responsibilities related to information security, including the Board of Directors and Executive Leadership, which aligns with the establishment of champions for information security.

Document Content
Matched Section
Section: Risk Management Performance
Content: The appropriate organization response will be based upon identified risk tolerance levels – remediate, mitigate, transfer, accept, or avoid. These organizational risk tolerance levels should be periodically reviewed and aligned with that of Test industry peers. Please see Test Risk Management Policy for detailed information regarding Risk Tolerance levels. (3) Plans will be developed and response to the risk will be assigned to the department or teams to take the steps to reduce risk to an acceptable level. Cooperation from all departments will be required to reduce risk in the Test environment. These steps will be monitored, tracked in the risk register, tested, and reported to senior leadership.
AI Justification
The text discusses organizational risk tolerance levels and the need for a structured response to risks, which aligns with the elements of a supply chain risk management strategy.

Document Content
Matched Section
Section: Performance will be identified and measured by
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The text discusses the identification and measurement of performance related to risk reduction, compliance, and information security incidents, which aligns with the principles of continuous monitoring.

Document Content
Matched Section
Section: Performance will be identified and measured by
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The mention of risk assessments and the ongoing measurement of performance indicates a continuous monitoring approach.

Document Content
Matched Section
Section: Control: PM-4
Content: The plan of action and milestones is a key organizational document and is subject to reporting requirements established by the Office of Management and Budget. Organizations develop plans of action and milestones with an organization-wide perspective, prioritizing risk response actions and ensuring consistency with the goals and objectives of the organization. Plan of action and milestones updates are based on findings from control assessments and continuous monitoring activities.
AI Justification
The text discusses the importance of plans of action and milestones as organizational documents that prioritize risk response actions and ensure consistency with organizational goals.

Document Content
Matched Section
Section: Performance will be identified and measured by
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The chunk discusses various performance metrics related to risk management and compliance, aligning with the need for outcome-based metrics as described in PM-6.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the integration of security and privacy requirements into the enterprise architecture.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The mention of developing a risk management process that aligns with security regulations indicates a consideration for security and privacy architectures at an individual system level.

Document Content
Matched Section
Section: Risk Assessment Policy/Plan
Content: Protection strategies are based on the prioritization of critical assets and resources. The requirement and guidance for defining critical infrastructure and key resources and for preparing an associated critical infrastructure protection plan are found in applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.
AI Justification
The text discusses the prioritization of critical assets and resources, aligning with the requirement for protection strategies based on critical infrastructure.

Document Content
Matched Section
Section: Risk Assessment Policy/Plan
Content: Protection strategies are based on the prioritization of critical assets and resources. The requirement and guidance for defining critical infrastructure and key resources and for preparing an associated critical infrastructure protection plan are found in applicable laws, executive orders, directives, policies, regulations, standards, and guidelines.
AI Justification
The mention of critical infrastructure and key resources aligns with the need for criticality analysis in risk assessment.

Document Content
Matched Section
Section: Performance will be identified and measured by
Content: Performance will be identified and measured by: (cid:127) The reduction or risks reported quarterly. (cid:127) Completion and reporting of reviews. (cid:127) Compliance with regulation (cid:127) Information Security incidents that are investigated and analyzed for risk resulting in the appropriate response or controls implemented. (cid:127) Risk assessments completed for all organization events and projects.
AI Justification
The text discusses the identification and measurement of performance related to risk, including risk assessments and compliance, which aligns with the organization's risk management strategy as outlined in PM-9.

Document Content
Matched Section
Section: 1.2 APPLICABILITY
Content: This policy is applicable for all Test information, infrastructure, network segments and devices.
AI Justification
The text discusses the importance of a personnel security policy and its applicability to all staff and contractors, aligning with the requirements of PS-1.

Document Content
Matched Section
Section: 1.4.1 RISK REGISTER
Content: The Risk Register is held currently in a spreadsheet across a combination of administrative and operational units and risk types. The purpose of the risk register is to consolidate all information about risk into a central repository.
AI Justification
The text discusses the importance of policies and procedures related to risk management, which aligns with the need for transparency and processing of personally identifiable information.

Document Content
Matched Section
Section: 1.4.1 RISK REGISTER
Content: The Risk Register is held currently in a spreadsheet across a combination of administrative and operational units and risk types. The purpose of the risk register is to consolidate all information about risk into a central repository. This allows risk management participants to use a single resource to obtain the status of the risk management process. The Chief Information Security Officer (CISO) or their appointed representative is responsible for maintaining the risk register. For more information regarding the risk assessment process, including risk tolerance, criticality ratings, and adding risks to the risk register, please reference Test Risk Assessment Policy listed in the Related Policies, Standards and Procedures section of this policy.
AI Justification
The text discusses the importance of risk assessment policies and procedures, which aligns with the control RA-1 that addresses these elements within systems and organizations.

Document Content
Matched Section
Section: 1.4.1 RISK REGISTER
Content: The Risk Register is held currently in a spreadsheet across a combination of administrative and operational units and risk types. The purpose of the risk register is to consolidate all information about risk into a central repository. This allows risk management participants to use a single resource to obtain the status of the risk management process. The Chief Information Security Officer (CISO) or their appointed representative is responsible for maintaining the risk register.
AI Justification
The text discusses the purpose and maintenance of a risk register, which is integral to conducting risk assessments and managing risks effectively.

Document Content
Matched Section
Section: Continuous Vulnerability Management
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, the need for continuous monitoring, and the use of various tools and methods to identify vulnerabilities.

Document Content
Matched Section
Section: Risk Management Performance
Content: The appropriate organization response will be based upon identified risk tolerance levels – remediate, mitigate, transfer, accept, or avoid. These organizational risk tolerance levels should be periodically reviewed and aligned with that of Test industry peers. Please see Test Risk Management Policy for detailed information regarding Risk Tolerance levels. (3) Plans will be developed and response to the risk will be assigned to the department or teams to take the steps to reduce risk to an acceptable level. Cooperation from all departments will be required to reduce risk in the Test environment. These steps will be monitored, tracked in the risk register, tested, and reported to senior leadership.
AI Justification
The text discusses various organizational responses to risk, including remediation, mitigation, transfer, acceptance, and avoidance, which aligns directly with the control's focus on risk response options.

Document Content
Matched Section
Section: Risk Assessment | Criticality Analysis
Content: Not all system components, functions, or services necessarily require significant protections. For example, criticality analysis is a key tenet of supply chain risk management and informs the prioritization of protection activities. The identification of critical system components and functions considers applicable laws, executive orders, regulations, directives, policies, standards, system functionality requirements, system and component interfaces, and system and component dependencies.
AI Justification
The text discusses the importance of criticality analysis in identifying and prioritizing system components and functions that require protection, aligning directly with the objectives of RA-9.

Document Content
Matched Section
Section: 1.1 - Policy Overview
Content: The policy and associated guidance provide a common methodology and organized approach to Information Security Risk Management whether based on regulatory compliance requirement or a threat to the organization.
AI Justification
The text discusses the importance of policies and procedures related to information security risk management, which aligns with the requirements of SA-1 for establishing such policies and procedures.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The text discusses the integration of security and privacy considerations in the system development life cycle, which aligns with the principles outlined in SA-3.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk. Guidance for this process will be based on the National Institute of Standards and Technology Cyber Risk Framework (NIST CRF) and specific security regulations e.g. HIPAA, FERPA, etc. if applicable. The risk management process will be designed to assist Test to maintain compliance with regulatory requirements, federal and state and local laws.
AI Justification
The mention of developing and maintaining an Information Security Risk Management Process indicates a focus on risk assessment and management, which aligns with RA-1.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk.
AI Justification
The text discusses the development and maintenance of an Information Security Risk Management Process, which aligns with the need for deriving security and privacy functional requirements as described in SA-4.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns with the control's focus on applying these principles to new and existing systems.

Document Content
Matched Section
Section: 1.4 REQUIREMENT
Content: The Information Security Team (InfoSec) will develop and maintain an Information Security Risk Management Process to frame, assess, respond, and monitor risk.
AI Justification
The mention of developing and maintaining an Information Security Risk Management Process aligns with the need for conducting risk assessments as part of the overall security framework.

Document Content
Matched Section
Section: 1.1 Applicability
Content: The policy and associated guidance provide a common methodology and organized approach to Information Security Risk Management whether based on regulatory compliance requirement or a threat to the organization.
AI Justification
The text discusses the importance of having a policy and associated guidance for Information Security Risk Management, which aligns with the need for a system and communications protection policy and procedures.
anonymized_16.0_IS_Maintaining_Security_during_BC__DR_Policy_1.pdf NIST
45 matches found

Document Content
Matched Section
Section: 1.2.1 Access Control
Content: All security controls described in the IS Global Policies & Standards document entitled “8.0 Access Control Policy” should be strictly adhered to while conducting a drill or participating in an actual BC/DR event.
AI Justification
The text discusses the importance of access control policies and procedures, aligning with the requirements of AC-1.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Access rights to the Test information resources should be revoked immediately upon completion of the task for which the access was requested. The revocation should be documented and attached to the approved access request documentation.
AI Justification
The text discusses the identification of authorized users, specification of access privileges, and the revocation of access rights, which aligns with account management practices.

Document Content
Matched Section
Section: Personnel Access Rights for BC/DR Events
Content: Personnel participating in a BC/DR event may require access rights to certain information resources needed in the recovery effort. Requests for the granting of access to Test information resources should be documented and approved by one of the following: a. The information asset’s owner.
AI Justification
The chunk discusses access rights to information resources needed for recovery efforts, which aligns with the control's focus on information sharing and access restrictions.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Requests for the granting of access to Test networks and network services should be documented and approved by one of the following: a. A director level IT representative. b. A member of the Information Security department. Access rights to the Test networks and network services should be revoked immediately upon completion of the task for which the access was requested.
AI Justification
The text discusses the process of granting and revoking access rights, which aligns with the concept of access control decisions and enforcement.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. (cid:127) Is responsible for reviewing requests for the removal of furniture and/or computing assets from restricted areas during a BC/DR event, test, or execution. Asset Owner (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. IS Team Member (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. Security Personnel (cid:127) Is responsible for reviewing and authorizing personnel entry and
AI Justification
The responsibilities outlined for the IT Director, Asset Owner, IS Team Member, and Security Personnel emphasize the review and authorization of access to information resources, which aligns with the enforcement of access control policies as described in AC-25.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Access rights to the Test networks and network services should be revoked immediately upon completion of the task for which the access was requested. The revocation should be documented and attached to the approved access request documentation.
AI Justification
The text discusses the need for access rights to be granted and revoked, which aligns with the principles of access control policies.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility.
AI Justification
The responsibilities outlined for the IT Director, Asset Owner, IS Team Member, and Security Personnel emphasize the review and authorization of access to information resources, which aligns with the principle of least privilege.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. (cid:127) Is responsible for reviewing requests for the removal of furniture and/or computing assets from restricted areas during a BC/DR event, test, or execution. Asset Owner (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. IS Team Member (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. Security Personnel (cid:127) Is responsible for reviewing and authorizing personnel entry and
AI Justification
The text discusses the responsibilities of various roles in reviewing and authorizing access, which aligns with the principle of separation of duties to mitigate risks of unauthorized access and abuse of privileges.

Document Content
Matched Section
Section: Role Responsibility
Content: Role Responsibility IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. (cid:127) Is responsible for reviewing requests for the removal of furniture and/or computing assets from restricted areas during a BC/DR event, test, or execution. Asset Owner (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. IS Team Member (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. Security Personnel (cid:127) Is responsible for reviewing and authorizing personnel entry and
AI Justification
The chunk discusses the responsibilities of various roles, including IT Director, Asset Owner, IS Team Member, and Security Personnel, which aligns with the need for role-based training tailored to specific responsibilities.

Document Content
Matched Section
Section: Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the ability of divisions and functions to implement stronger security mechanisms, which aligns with the requirement for additional strength of mechanism for domain separation and policy enforcement.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures related to system and information integrity, including how exceptions to these policies should be handled.

Document Content
Matched Section
Section: 16.0 Maintaining Security during BC/DR Policy
Content: The information contained herein is the property of Test Freres & Co. LLC (“Test") and may not be copied, used, or disclosed in whole or in part, stored in a retrieval system or transmitted in any form or by any means (electronic, mechanical, reprographic, recording or otherwise) outside of Test without prior written permission.
AI Justification
The section discusses the unauthorized copying, use, or disclosure of information, which aligns with the control's focus on preventing data leakage.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the need for policies and procedures regarding exceptions to security policies, which aligns with the control's focus on assessment, authorization, and monitoring.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility.
AI Justification
The text discusses the responsibilities of various roles, including the IT Director, Asset Owner, IS Team Member, and Security Personnel, in authorizing access to information resources during BC/DR events, which aligns with the concept of official management decisions to authorize operations.

Document Content
Matched Section
Section: 1.2.3 Access to Networks, Network Services
Content: Requests for the granting of access to Test networks and network services should be documented and approved by one of the following: a. A director level IT representative. b. A member of the Information Security department.
AI Justification
The text discusses the need for documented and approved access to networks and network services, which aligns with access enforcement principles.

Document Content
Matched Section
Section: 1.2.3 Access to Networks, Network Services
Content: Access rights to the Test networks and network services should be revoked immediately upon completion of the task for which the access was requested.
AI Justification
The text emphasizes the importance of revoking access rights immediately upon task completion, which aligns with the control's focus on managing access to systems.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: This policy applies to all BC/DR administrators and personnel directly responsible for developing, maintaining, executing, and participating in Test’s BCP/DR strategy.
AI Justification
The text discusses the importance of contingency planning policies and procedures, their development, and their applicability to personnel involved in BC/DR activities.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY and 1.2 REQUIREMENTS
Content: This policy applies to all BC/DR administrators and personnel directly responsible for developing, maintaining, executing, and participating in Test’s BCP/DR strategy. Please see the overarching 9.0 IT Disaster Recovery Policy and plans for more information. Applicability All personnel who are responsible for and participate in Business Continuity and Disaster Recovery planning, testing and execution.
AI Justification
The text discusses the training requirements for personnel involved in Business Continuity and Disaster Recovery, linking it to their roles and responsibilities, which aligns with the intent of CP-3.

Document Content
Matched Section
Section: Business Continuity and Disaster Recovery Planning and Testing
Content: It is important to maintain Test’s security posture at all times, and especially during a BC/DR event or exercise, to avoid cybercriminals taking advantage of the firm’s personnel while they focus on the BC/DR event or exercise.
AI Justification
The text discusses the importance of maintaining security during BC/DR events and exercises, which aligns with the need for testing contingency plans to identify weaknesses.

Document Content
Matched Section
Section: Access to Networks, Network Services
Content: Access rights to the Test information resources should be revoked immediately upon completion of the task for which the access was requested. The revocation should be documented and attached to the approved access request documentation.
AI Justification
The text discusses the requirements for access rights and the need for documentation and approval for access to networks and services, which aligns with the identification and authentication requirements outlined in IA-2.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility.
AI Justification
The text discusses roles responsible for reviewing and authorizing access, which implies the need for authentication mechanisms to ensure that only authorized personnel can perform these actions.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the importance of having incident response policies and procedures, including how exceptions to these policies should be managed, which aligns with the requirements of control IR-1.

Document Content
Matched Section
Section: Business Continuity and Disaster Recovery planning, testing, and execution
Content: The purpose of this document is to outline requirements for the maintaining of Test’s cybersecurity posture during Business Continuity and Disaster Recovery planning, testing, and execution.
AI Justification
The text discusses the importance of maintaining security posture during BC/DR events and exercises, which aligns with testing incident response capabilities.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of media protection policies and procedures, including the approval process for exceptions, which aligns with the requirements of MP-1.

Document Content
Matched Section
Section: Restricted Area Access Procedures
Content: a. The facilities where BC/DR related activities are taking place should be considered a restricted area for the duration of the event. b. In the event that the badge entry system is not functional, security personnel should be posted at all entrances and exits of the restricted area to verify that all badge holders are in fact the badge owners. c. All personnel wishing to enter the restricted area should have the appropriate Test issued identification or be an approved vendor. d. Only personnel participating the in BC/DR event will be authorized access to the restricted area. e. All personnel entering the facility should swipe their badge to gain entry. Tailgating is strictly prohibited. f. Test issued ID badges should be worn and visible at all times. g. No furniture should be removed from restricted areas without written approval from Test facilities at the director level. h. No computing assets should be removed from restricted areas without written approval.
AI Justification
The text discusses restricting access to a designated area and verifying the identity of individuals entering, which aligns with enforcing authorizations.

Document Content
Matched Section
Section: Physical Access Authorizations for Restricted Areas
Content: a. The facilities where BC/DR related activities are taking place should be considered a restricted area for the duration of the event. b. In the event that the badge entry system is not functional, security personnel should be posted at all entrances and exits of the restricted area to verify that all badge holders are in fact the badge owners. c. All personnel wishing to enter the restricted area should have the appropriate Test issued identification or be an approved vendor. d. Only personnel participating the in BC/DR event will be authorized access to the restricted area. e. All personnel entering the facility should swipe their badge to gain entry. Tailgating is strictly prohibited. f. Test issued ID badges should be worn and visible at all times.
AI Justification
The text discusses the need for authorization credentials for accessing restricted areas, which aligns with the control's focus on physical access authorizations for employees and visitors.

Document Content
Matched Section
Section: a. The facilities where BC/DR related activities are taking place should be considered a restricted area for the duration of the event.
Content: a. The facilities where BC/DR related activities are taking place should be considered a restricted area for the duration of the event.
AI Justification
The text discusses restricted areas, badge entry systems, and personnel authorization, which aligns with physical access control measures.

Document Content
Matched Section
Section: b. In the event that the badge entry system is not functional, security personnel should be posted at all entrances and exits of the restricted area to verify that all badge holders are in fact the badge owners.
Content: b. In the event that the badge entry system is not functional, security personnel should be posted at all entrances and exits of the restricted area to verify that all badge holders are in fact the badge owners.
AI Justification
The requirement for badge holders to verify their identity and the prohibition of tailgating are key aspects of physical access control.

Document Content
Matched Section
Section: c. All personnel wishing to enter the restricted area should have the appropriate Test issued identification or be an approved vendor.
Content: c. All personnel wishing to enter the restricted area should have the appropriate Test issued identification or be an approved vendor.
AI Justification
The requirement for personnel to have appropriate identification to enter restricted areas aligns with physical access control policies.

Document Content
Matched Section
Section: d. Only personnel participating the in BC/DR event will be authorized access to the restricted area.
Content: d. Only personnel participating the in BC/DR event will be authorized access to the restricted area.
AI Justification
The restriction of access to only those participating in the BC/DR event is a clear application of physical access control.

Document Content
Matched Section
Section: e. All personnel entering the facility should swipe their badge to gain entry. Tailgating is strictly prohibited.
Content: e. All personnel entering the facility should swipe their badge to gain entry. Tailgating is strictly prohibited.
AI Justification
The requirement for personnel to swipe their badge to gain entry is a direct application of physical access control measures.

Document Content
Matched Section
Section: f. Test issued ID badges should be worn and visible at all times.
Content: f. Test issued ID badges should be worn and visible at all times.
AI Justification
The requirement for Test issued ID badges to be worn and visible aligns with physical access control policies.

Document Content
Matched Section
Section: g. No furniture should be removed from restricted areas without written approval from Test facilities at the director level.
Content: g. No furniture should be removed from restricted areas without written approval from Test facilities at the director level.
AI Justification
The requirement for written approval for removing furniture from restricted areas is a control measure to maintain physical security.

Document Content
Matched Section
Section: h. No computing assets should be removed from restricted areas without written approval.
Content: h. No computing assets should be removed from restricted areas without written approval.
AI Justification
The requirement for written approval for removing computing assets from restricted areas is a control measure to maintain physical security.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility.
AI Justification
The responsibilities outlined for reviewing and authorizing access to information resources and restricted areas align with the need for physical access monitoring.

Document Content
Matched Section
Section: SCOPE & APPLICABILITY
Content: This policy applies to all BC/DR administrators and personnel directly responsible for developing, maintaining, executing, and participating in Test’s BCP/DR strategy.
AI Justification
The text discusses the importance of planning policies and procedures for security and privacy programs, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility.
AI Justification
The text describes roles responsible for reviewing and authorizing access to information resources, which aligns with the requirement for authorization processes outlined in PM-10.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the need for defining protection requirements and exceptions to security policies, aligning with the need to understand and manage protection needs.

Document Content
Matched Section
Section: Requirements for maintaining Test’s cybersecurity posture during Business Continuity and Disaster Recovery planning, testing, and execution.
Content: The purpose of this document is to outline requirements for the maintaining of Test’s cybersecurity posture during Business Continuity and Disaster Recovery planning, testing, and execution.
AI Justification
The chunk discusses the importance of maintaining security posture during BC/DR events, which aligns with the need for ongoing testing, training, and monitoring as outlined in PM-14.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: This policy applies to all BC/DR administrators and personnel directly responsible for developing, maintaining, executing, and participating in Test’s BCP/DR strategy.
AI Justification
The text discusses the importance of personnel security policies and procedures in the context of security and privacy assurance, which aligns with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Role Responsibility
Content: IT Director (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. (cid:127) Is responsible for reviewing requests for the removal of furniture and/or computing assets from restricted areas during a BC/DR event, test, or execution. Asset Owner (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. IS Team Member (cid:127) Is responsible for reviewing and authorizing access to information resources, networks, network services, and Enterprise Servers during a BC/DR event, test, or execution. Other roles may share this responsibility. Security Personnel (cid:127) Is responsible for reviewing and authorizing personnel entry and
AI Justification
The chunk specifies the roles and responsibilities associated with security access during BC/DR events, aligning with the need for clarity in security responsibilities.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information processing and the need for collaboration between security and privacy programs, which aligns with the PT-1 control.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to security and privacy, which aligns with the requirements of SA-1 for establishing acquisition policies and procedures.

Document Content
Matched Section
Section: Exceptions
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the derivation of security and privacy requirements, which aligns with the control's focus on functional requirements derived from high-level security and privacy requirements.

Document Content
Matched Section
Section: 1.6 EXCEPTIONS
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the importance of having a system and communications protection policy and procedures, including the process for handling exceptions to the policy.
anonymized_14.0_IS_Supplier_Management_Policy_2.pdf NIST
126 matches found

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of access control policies and procedures, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on account management practices.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The reference to logging and monitoring integrated with Test Logging and monitoring systems aligns with the need for monitoring controls.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the representation of information using data structures and the binding of attributes to subjects and objects, which aligns with the principles of access control and data management.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on managing access and authentication, which aligns with the control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore availability and access to personal data in a timely manner relates to contingency planning and incident response.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of various account types, which aligns with the requirements of control AC-2.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text mentions the specification of access privileges and the management of account types, which aligns with the requirements of control AC-3.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the need for data protection measures and the implementation of security requirements to safeguard sensitive information, which aligns with the control's focus on preventing unauthorized data mining.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on managing access to sensitive information, which aligns with the control's emphasis on ensuring proper authentication and access controls.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The requirement for logging and monitoring integrated with Test Logging and monitoring systems aligns with the control's focus on auditing and monitoring access to sensitive data.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: b. Identity Access Management (IAM) standards.
AI Justification
The chunk discusses the implementation of access control measures, including Identity Access Management (IAM) standards, which aligns with the requirements of a reference monitor enforcing access control policies.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures, including Identity Access Management (IAM) standards, which aligns with the concept of access control policies that govern access between users and systems.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the need for data protection measures, including encryption and access management, which align with the principles of information flow control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: c. The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
AI Justification
The mention of ensuring confidentiality, integrity, and availability of processing systems relates to controlling remote access to sensitive information.

Document Content
Matched Section
Section: Scope
Content: The process of selecting products and services involves numerous people throughout Test. Each person involved in the process, whether on an individual or group level, should understand the importance of security in the organization’s information infrastructure and the security impacts of their decisions.
AI Justification
The text discusses the importance of training personnel involved in the selection of products and services, emphasizing their understanding of security impacts, which aligns with the requirements for role-based training.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, which aligns with the AU-1 control that emphasizes the need for such policies in organizations.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on access control, which aligns with the AC-1 control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The text refers to logging and monitoring integrated with Test Logging and monitoring systems, which aligns with the SI-4 control that focuses on monitoring information systems.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures, which aligns with the need to associate security and privacy attributes with information systems.

Document Content
Matched Section
Section: Mobile Code Policy and Procedures
Content: Where the use of mobile code is authorized, the configuration should ensure that the authorized mobile code operates according to a clearly defined security policy, and unauthorized mobile code should be prevented from executing.
AI Justification
The chunk discusses the restrictions and guidelines regarding the use of mobile code, including the prevention of unauthorized mobile code execution and the requirement for authorized mobile code to operate under a defined security policy.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses measures to ensure the confidentiality and integrity of data in transit, which aligns with protecting session authenticity against threats such as man-in-the-middle attacks.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The chunk discusses the implementation of data protection measures, including encryption of data at rest, which aligns with the focus on protecting information at rest as described in control SC-28.

Document Content
Matched Section
Section: Control of mobile code and its execution
Content: Where the use of mobile code is authorized, the configuration should ensure that the authorized mobile code operates according to a clearly defined security policy, and unauthorized mobile code should be prevented from executing.
AI Justification
The text discusses restrictions on the use of mobile code and the need for a defined security policy, which aligns with the control's focus on usage restrictions for system components.

Document Content
Matched Section
Section: 1.2 GOVERNANCE - Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the implementation of data protection measures, including encryption and access management, which align with the concept of managing interfaces and boundary protection as outlined in SC-7.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The chunk discusses the implementation of encryption for data in transit, which aligns with the control's focus on protecting the confidentiality and integrity of transmitted information.

Document Content
Matched Section
Section: Control: SI-1: System and information integrity policy and procedures
Content: System and information integrity policy and procedures address the controls in the SI family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, which aligns directly with the requirements of control SI-1.

Document Content
Matched Section
Section: Information management and retention requirements cover the full life cycle of information
Content: Supplier and/or contractor should acknowledge that Test Data retention and replication should always be assessed against business needs and minimizes, either by not collecting unnecessary data or by deleting data as soon as the need for it has passed and that holding any data presents security risks.
AI Justification
The text discusses the importance of managing and retaining test data in accordance with business needs, which aligns with the requirements for information management and retention.

Document Content
Matched Section
Section: SUPPLIER RISK CATEGORY
Content: Risks affecting the confidentiality, integrity, and availability of digital assets. For example, supplier service providers who store, process, or have access to our customer data introduce a security risk and should meet our security requirements.
AI Justification
The text discusses risks affecting the integrity and availability of digital assets, which aligns with the need for actions taken by system services to be based on accurate information.

Document Content
Matched Section
Section: Retention and Disposal of Test Data
Content: Supplier and/or contractor should acknowledge that Test Data retention and replication should always be assessed against business needs and minimizes, either by not collecting unnecessary data or by deleting data as soon as the need for it has passed and that holding any data presents security risks.
AI Justification
The text discusses the importance of minimizing data retention and the associated security risks, which aligns with the control's focus on retaining information only as long as necessary.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk discusses the importance of logging and monitoring integrated with systems, which aligns with the objectives of system monitoring as described in control SI-4.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: c. The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
AI Justification
The mention of ensuring ongoing confidentiality, integrity, availability, and resilience of processing systems relates to access control measures, which is a part of AC-17.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The chunk discusses regulatory and compliance controls related to service providers, which aligns with the need for compliance with security directives as mentioned in SI-5.

Document Content
Matched Section
Section: Supplier Relationship Management Responsibilities
Content: Supplier Relationship Owner Is responsible for conducting a due diligence on regular basis as per Technology and Information Security team mandated, keeping supplier information up to date. Is responsible for obtaining relevant information about the prospective service, service provider, and/or tool so that relevant risks can be identified and evaluated Legal Department Is responsible for including Security related legal clauses in contracts with Third Parties. Include/Negotiate security incident notification clause in contracts with Third Parties Supplier Relationship Technology Manager Is responsible for providing IT, information security needed for risk assessments Chief Information Security Officer Is responsible for ensuring proper policies, procedures and standards are developed and implemented that will apply to Test and employees involved in the management of third- party service providers.
AI Justification
The text discusses the responsibilities of various roles in managing supplier relationships and ensuring that security-related clauses are included in contracts, which aligns with the need for a supply chain risk management policy.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The text discusses supplier risk and the importance of assessing vendors, which aligns with the need to manage counterfeit components and ensure the integrity of the supply chain.

Document Content
Matched Section
Section: 1.13 END OF SERVICE
Content: Upon termination, cancellation, expiration or other conclusion of the agreement, Service provider should return all data and assets to Test. If return of data is not feasible, service provider should physically or electronically destroy beyond all ability to recover all Test data provided to them and certify the destruction.
AI Justification
The chunk discusses the process for end of service, including the requirement for the service provider to physically or electronically destroy data beyond recovery, which aligns with the control's focus on proper disposal of data and system components.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The text discusses the risks associated with external providers and the importance of managing supply chain risks, which aligns with the objectives of SR-2.

Document Content
Matched Section
Section: Supplier Relationship Owner and Legal Department responsibilities
Content: Supplier Relationship Owner Is responsible for conducting a due diligence on regular basis as per Technology and Information Security team mandated, keeping supplier information up to date. Is responsible for obtaining relevant information about the prospective service, service provider, and/or tool so that relevant risks can be identified and evaluated Legal Department Is responsible for including Security related legal clauses in contracts with Third Parties.
AI Justification
The text discusses the responsibilities of various roles in conducting due diligence and risk assessments related to suppliers, which aligns with the control's focus on assessing supplier risk.

Document Content
Matched Section
Section: SUPPLIER RISK
Content: SUPPLIER RISK CATEGORY EXAMPLES Information Security / Cloud Security Risks affecting the confidentiality, integrity, and availability of digital assets. For example, supplier service providers who store, process, or have access to our customer data introduce a security risk and should meet our security requirements Operational / Technological Includes problems with service delivery to customers or losses of data. Consider whether new software or tools fit our current and future architecture. Will the 3rd party store or process critical company or customer data and what will be the impact to Test if the service is disrupted? Reputation Includes risks such as dissatisfied customers or violations of laws or regulations that lead to public enforcement actions. Consider whether the supplier’s product or service could potentially lead to negative publicity if the product or service does not perform as expected (e.g. disruption in service or breach of customer data). Compliance /
AI Justification
The text discusses the importance of protecting the supply chain and outlines various tools and techniques to mitigate risks associated with suppliers, which aligns with the objectives of SR-5.

Document Content
Matched Section
Section: Supplier Relationship Owner, Legal Department, Supplier Relationship Technology Manager, Chief Information Security Officer
Content: Supplier Relationship Owner Is responsible for conducting a due diligence on regular basis as per Technology and Information Security team mandated, keeping supplier information up to date. Is responsible for obtaining relevant information about the prospective service, service provider, and/or tool so that relevant risks can be identified and evaluated Legal Department Is responsible for including Security related legal clauses in contracts with Third Parties. Include/Negotiate security incident notification clause in contracts with Third Parties Supplier Relationship Technology Manager Is responsible for providing IT, information security needed for risk assessments Chief Information Security Officer Is responsible for ensuring proper policies, procedures and standards are developed and implemented that will apply to Test and employees involved in the management of third- party service providers.
AI Justification
The text discusses the responsibilities of various roles in maintaining supplier information and ensuring security-related clauses are included in contracts, which aligns with the need for communication and agreements among supply chain entities.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk discusses the need for logging and monitoring, which aligns with the requirements for audit logging in a cross-organizational context.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk discusses logging and monitoring, which aligns with the requirements for logging significant events as outlined in AU-2.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of logging and monitoring systems indicates a need for ongoing monitoring, which aligns with SI-4(22).

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk discusses logging and monitoring, which aligns with the need for audit records that include event descriptions, timestamps, and other relevant data.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk discusses logging and monitoring, which aligns with the requirements for audit record review and analysis.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The chunk mentions logging and monitoring integrated with Test Logging and monitoring systems, which aligns with the requirement for audit information and logging activities.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of policies and procedures related to assessment, authorization, and monitoring, which aligns with the CA-1 control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on access control, which aligns with AC-1.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The text refers to logging and monitoring, which is a key aspect of information system monitoring.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the importance of assessing the effectiveness of technical measures and security requirements implemented by suppliers and contractors, which aligns with the need for organizations to ensure that control assessors possess the required skills and conduct assessments.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements for third parties, which aligns with the need for managing risks associated with information exchanges as described in CA-3.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the need for ongoing monitoring and assessment of security measures, which aligns with the continuous monitoring requirements outlined in CA-7.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of logging and monitoring integrated with Test Logging and monitoring systems aligns with the requirements for logging and monitoring controls.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: f. A process for regularly testing, assessing, and evaluating the effectiveness of technical.
AI Justification
The chunk mentions a process for regularly testing, assessing, and evaluating the effectiveness of technical measures, which aligns with incident response testing requirements.

Document Content
Matched Section
Section: Configuration Management Policy and Procedures
Content: Control: CM-1: Configuration management policy and procedures address the controls in the CM family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of configuration management policy and procedures.
AI Justification
The text discusses the importance of configuration management policies and procedures in relation to security and privacy assurance, aligning directly with the control's focus.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures, including encryption, identity access management, and the ability to restore access to personal data, which aligns with the control's focus on processing personally identifiable information and the associated risks.

Document Content
Matched Section
Section: 1.14 POLICY CHANGE, REVIEW & UPDATE CHANGE
Content: This policy should be reviewed annually unless the owner considers an earlier review is necessary to ensure that the policy remains current. Changes to this policy should be exclusively performed by (designate/name role) and approved by management. A change log should be kept current and be updated as soon as any change has been made.
AI Justification
The text discusses the need for systematic review and updates to policies, which aligns with the principles of configuration change control, including the need for documentation and approval of changes.

Document Content
Matched Section
Section: 1.15 POLICY COMPLIANCE
Content: The CISO/InfoSec validates policy and control adherence with, but not limited to, business tool reports and internal and external audits.
AI Justification
The mention of compliance measurement and validation of policy adherence relates to the auditing aspect of configuration change control.

Document Content
Matched Section
Section: 1.16 MAINTAINENCE
Content: A periodical review for this standard and the associated core documents should be performed to identify and implement measures for improvement. The minimal interval for this review is annually from the date of last approval.
AI Justification
The periodic review for improvement aligns with the need for systematic proposal and review of changes as outlined in the configuration change control.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of contingency planning policies and procedures, emphasizing their role in security and privacy assurance and the need for collaboration between security and privacy programs.

Document Content
Matched Section
Section: 1.2 GOVERNANCE - Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of measures to ensure ongoing confidentiality, integrity, availability, and resilience, which aligns with the concept of using alternative security mechanisms to support system resiliency and continuity of operations.

Document Content
Matched Section
Section: 1.2 GOVERNANCE - Implementation
Content: The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The mention of the ability to restore availability and access to personal data in a timely manner in the event of a physical or technical incident supports the need for alternative mechanisms to ensure business continuity.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the need for data protection measures, including encryption and the ability to restore access to personal data, which aligns with the requirements for protecting system-level and user-level information.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The mention of encrypting test data in transit aligns with the need to protect the integrity of system backups while in transit.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on access control measures, which aligns with the control's objectives.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards implies the need for authentication mechanisms to ensure that operators are authorized to access systems and perform their roles.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: b. Identity Access Management (IAM) standards.
AI Justification
The chunk discusses the need for identity access management (IAM) standards, which aligns with the identification and authentication of non-organizational users.

Document Content
Matched Section
Section: Supplier Relationship and Legal Department Responsibilities
Content: Is responsible for including Security related legal clauses in contracts with Third Parties. Include/Negotiate security incident notification clause in contracts with Third Parties.
AI Justification
The chunk discusses responsibilities related to supplier relationships and the inclusion of security clauses in contracts, which are essential for incident response planning and risk management.

Document Content
Matched Section
Section: Supplier Relationship Management and Responsibilities
Content: Is responsible for including Security related legal clauses in contracts with Third Parties. Include/Negotiate security incident notification clause in contracts with Third Parties
AI Justification
The text discusses the responsibilities related to managing third-party service providers and includes aspects of incident notification, which aligns with the need for a coordinated incident response approach.

Document Content
Matched Section
Section: Maintenance policy and procedures
Content: Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of maintenance policies and procedures in relation to security and privacy assurance, aligning directly with the MA-1 control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of policies and procedures related to physical and environmental protection, which aligns with the PE-1 control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on access control measures.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore availability and access to personal data in a timely manner aligns with contingency planning.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The text discusses the importance of control baselines in addressing protection needs and regulatory compliance, which aligns with the definition of PL-10.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of security measures and requirements that align with the need for comprehensive security and privacy plans as outlined in control PL-2.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The mention of encrypting test data in transit and at rest aligns with the need for cryptographic measures to protect data.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The reference to Identity Access Management (IAM) standards indicates a focus on managing user accounts and access rights.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore availability and access to personal data in the event of incidents aligns with contingency planning requirements.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: f. A process for regularly testing, assessing, and evaluating the effectiveness of technical.
AI Justification
The process for regularly testing, assessing, and evaluating the effectiveness of technical measures aligns with the need for security assessments.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements that align with the overarching security and privacy architectures described in PL-8.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The mention of organizational measures and security requirements indicates alignment with the enterprise architecture principles outlined in PM-7.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the central management of controls and processes, which aligns with the definition of PL-9.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards aligns with the need for account management controls.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The reference to logging and monitoring integrated with Test Logging and monitoring systems aligns with the need for audit review and analysis.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore the availability and access to personal data in a timely manner relates to contingency planning.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy. b. Identity Access Management (IAM) standards. c. The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services. d. Logging and monitoring integrated with Test Logging and monitoring systems. e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident. f. A process for regularly testing, assessing, and evaluating the effectiveness of technical
AI Justification
The chunk discusses the need for ongoing testing, assessing, and evaluating the effectiveness of technical measures, which aligns with the requirements for security and privacy testing and monitoring.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: The process of selecting products and services involves numerous people throughout Test. Each person involved in the process, whether on an individual or group level, should understand the importance of security in the organization’s information infrastructure and the security impacts of their decisions.
AI Justification
The chunk outlines the roles and responsibilities of various personnel involved in the information security process, including the Chief Security Officer and Information Security Team, which aligns with the definition of the senior agency information security officer.

Document Content
Matched Section
Section: 1.1 SCOPE & APPLICABILITY
Content: The process of selecting products and services involves numerous people throughout Test. Each person involved in the process, whether on an individual or group level, should understand the importance of security in the organization’s information infrastructure and the security impacts of their decisions.
AI Justification
The text discusses the involvement of various personnel in the selection process, highlighting the importance of security and the need for specialized expertise, which aligns with the establishment of champions for information security.

Document Content
Matched Section
Section: 1.4 SUPPLIER RISK MANAGEMENT PROGRAM
Content: Test’s Supplier Risk Management Program consists of four key elements: Risk Assessment and Planning – assess inherent risk based on nature of service or product; Due Diligence – assess residual risk based on 3rd party controls; Contract Management – ensure an appropriate contract protects Test; Risk Monitoring – monitor ongoing risk profile with changing service or needs and prior to contract renewal.
AI Justification
The Supplier Risk Management Program outlines a structured approach to managing supplier-related risks, aligning with the elements of an organization-wide supply chain risk management strategy.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of ongoing monitoring and assessment of controls and risks, which aligns with the continuous monitoring concept outlined in PM-31.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of logging and monitoring integrated with systems indicates a focus on continuous monitoring, which aligns with CA-7.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of measures that ensure a level of security appropriate to the risk, which aligns with the concept of measuring effectiveness and efficiency in security programs.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and the integration of security requirements, which aligns with the control's focus on embedding security and privacy into enterprise architecture.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Third parties should at least implement the following measures: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The mention of individual system security measures aligns with the control's focus on developing security and privacy architectures at the system level.

Document Content
Matched Section
Section: 1.17 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow.
AI Justification
The text discusses the importance of personnel security policies and procedures, including the process for exceptions, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: Supplier Relationship Management
Content: Supplier Relationship Owner Is responsible for conducting a due diligence on regular basis as per Technology and Information Security team mandated, keeping supplier information up to date. Is responsible for obtaining relevant information about the prospective service, service provider, and/or tool so that relevant risks can be identified and evaluated
AI Justification
The text discusses responsibilities related to managing third-party service providers, including conducting due diligence and including security clauses in contracts, which aligns with the control's focus on external providers.

Document Content
Matched Section
Section: Scope
Content: The process of selecting products and services involves numerous people throughout Test. Each person involved in the process, whether on an individual or group level, should understand the importance of security in the organization’s information infrastructure and the security impacts of their decisions.
AI Justification
The text discusses the importance of understanding security roles and responsibilities among various personnel involved in the selection of products and services, which aligns with the specification of security and privacy roles.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of policies and procedures related to personally identifiable information, aligning with the requirements of control PT-1.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a need for access control policies.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore availability and access to personal data in a timely manner relates to contingency planning.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and the handling of personal data, which aligns with the processing operations defined in PT-2.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of logging and monitoring systems in the chunk relates to the processing operations and risk management aspects of PT-2.

Document Content
Matched Section
Section: Risk assessments should be revisited as part of a contract renewal or anytime there is a significant change to the service
Content: Risk assessments should be revisited as part of a contract renewal or anytime there is a significant change to the service, such as addition of a new product to the portfolio, significant new features objectives or goals, significant capabilities, change in Data Classification, any changes to the means how services are delivered, changes in the supplier’s supply chain, any material change to the company standing or organizational structure as defined by SEC or another governing body, security incident. This list is not exhaustive.
AI Justification
The text discusses the need for revisiting risk assessments in relation to contract renewals and significant changes, which aligns with the control's focus on ongoing risk assessments considering various factors.

Document Content
Matched Section
Section: Risk assessments should be revisited as part of a contract renewal or anytime there is a significant change to the service.
Content: Risk assessments should be revisited as part of a contract renewal or anytime there is a significant change to the service, such as addition of a new product to the portfolio, significant new features objectives or goals, significant capabilities, change in Data Classification, any changes to the means how services are delivered, changes in the supplier’s supply chain, any material change to the company standing or organizational structure as defined by SEC or another governing body, security incident. This list is not exhaustive.
AI Justification
The text discusses the need for revisiting risk assessments in response to significant changes, which aligns with the control's focus on determining appropriate responses to risk.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The text discusses the criticality analysis of system components and functions, which aligns with the principles of risk assessment and management.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of policies and procedures for system and services acquisition, emphasizing collaboration between security and privacy programs, which aligns with the requirements of control SA-1.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: b. Identity Access Management (IAM) standards.
AI Justification
The mention of Identity Access Management (IAM) standards indicates a focus on access control measures, which aligns with control AC-1.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident aligns with control CP-9.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: ... f. A process for regularly testing, assessing, and evaluating the effectiveness of technical.
AI Justification
The chunk discusses the need for ongoing testing, assessment, and evaluation of technical measures to ensure effectiveness, which aligns with the requirements of SA-11.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The chunk discusses the assessment of service providers and their compliance with regulatory controls, which aligns with the need for maintaining integrity and configuration control in development processes.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements that align with the principles of security architecture and design, particularly in the context of third-party involvement.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The mention of organizational measures and the need for security architecture integration aligns with the intent of PL-8, which focuses on internal development and security architecture integration.

Document Content
Matched Section
Section: Information Security Risk – Supplier Risk Matrix
Content: data will be stored, transmitted, or processed Regulatory/Compliance Controls – assess whether the service provider will be used by Test to perform regulatory or compliance functions (e.g. for ISO / FedRAMP / GDPR / SOX)
AI Justification
The chunk discusses the necessity of enhancing systems or components to maximize trustworthiness, which aligns with the control's focus on system enhancements for mission-essential services.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements, which aligns with the principles of integrating security and privacy into the system development life cycle.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
AI Justification
The chunk mentions the need for ongoing confidentiality, integrity, availability, and resilience of processing systems, which relates to the security engineering principles outlined in SA-8.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements, which aligns with the derivation of security and privacy functional requirements.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of logging and monitoring integrated with Test Logging and monitoring systems aligns with the need for ongoing monitoring of systems.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: e. The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident.
AI Justification
The ability to restore the availability and access to personal data in a timely manner in the event of a physical or technical incident aligns with contingency planning.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The chunk discusses the implementation of data protection measures and security requirements, which aligns with the principles of systems security engineering.

Document Content
Matched Section
Section: 1.2 GOVERNANCE Implementation
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The mention of implementing security measures and requirements throughout the system development life cycle aligns with the principles outlined in SA-3.

Document Content
Matched Section
Section: Supplier Relationship Owner and Legal Department Responsibilities
Content: Supplier Relationship Owner Is responsible for conducting a due diligence on regular basis as per Technology and Information Security team mandated, keeping supplier information up to date. Is responsible for obtaining relevant information about the prospective service, service provider, and/or tool so that relevant risks can be identified and evaluated Legal Department Is responsible for including Security related legal clauses in contracts with Third Parties.
AI Justification
The text discusses responsibilities related to managing relationships with external service providers, including due diligence and security clauses in contracts, which aligns with the requirements of SA-9.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, which aligns with the SC-1 control.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy. d. Logging and monitoring integrated with Test Logging and monitoring systems.
AI Justification
The mention of encryption and logging and monitoring indicates a focus on protecting the boundaries of systems, which aligns with SC-7.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: c. The ability to ensure the ongoing confidentiality, integrity, availability, and resilience of processing systems and services.
AI Justification
The mention of ensuring confidentiality, integrity, availability, and resilience of processing systems relates to access controls, which aligns with AC-17.

Document Content
Matched Section
Section: 1.2 GOVERNANCE
Content: Supplier and/or contractor should agree to implement data protection by design and by default and appropriate technical and Supplier and/or contractor Security Requirements and organizational measures to ensure a level of security appropriate to the risk. Third parties should at least implement the following measures: a. Encrypt Test data in transit and at rest, per the 6.0 IS Data Security Policy.
AI Justification
The chunk discusses the implementation of encryption for data protection, which aligns with the use of cryptography to protect information.
anonymized_19.0_IS_Cloud_Computing_Security_Policy.pdf NIST
88 matches found

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied.
AI Justification
The text discusses the need for an access control policy and procedures, including the approval process for exceptions, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the classification, protection, and destruction of data in cloud services, which aligns with the need to protect sensitive information from unauthorized access or mining.

Document Content
Matched Section
Section: Role Functional Activities
Content: Each system owner should maintain a portfolio of cloud application profiles under their control and management purview. The application owner may be a direct customer of a CSP for specific business functions and should track implementation and maintenance requirements for business applications hosted in the cloud.
AI Justification
The text discusses the responsibilities of application owners in managing cloud application services and ensuring compliance with information security standards, which aligns with the concept of access control policies.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program.
AI Justification
The roles and responsibilities outlined emphasize the importance of managing access and ensuring that roles operate with the least privilege necessary for their functions.

Document Content
Matched Section
Section: 1.6 CLOUD SECURITY TRAINING & AWARENESS
Content: 1. Test should provide security education and awareness training for the end-user community and engineers and architects with information security responsibilities related to cloud security
AI Justification
The chunk discusses the need for security education and awareness training for users, which aligns with the requirements of AT-2 for providing literacy training.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program.
AI Justification
The text discusses the importance of role-based training for various stakeholders involved in the governance of the Cloud Security Program, aligning with the requirements of AT-3.

Document Content
Matched Section
Section: Cloud security audit plans, activities, and operational action items
Content: Cloud security audit plans, activities, and operational action items focusing on cloud data duplication, advance by stakeholders. cloud services access, and cloud architecture boundary limitations should be designed to minimize the risk of business process disruption. Audit activities should be planned and agreed upon in
AI Justification
The text discusses the importance of audit and accountability policies and procedures, which aligns with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Implementation of security measures on endpoint devices and cloud infrastructure.
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses preventing malware execution on endpoint devices, which aligns with the control's focus on managing mobile code to prevent malicious actions.

Document Content
Matched Section
Section: Discussion on multi-cloud and application portability
Content: Multi-cloud involves using multiple cloud services from different providers to serve different needs and requirements; enables control over where data, applications and workloads are hosted, and allows an enterprise to securely shift workloads between different cloud platforms and providers.
AI Justification
The text discusses the concept of data and application portability across multiple cloud platforms, which aligns with the definition of platforms and application portability outlined in SC-27.

Document Content
Matched Section
Section: Section 8: Information Security Team Responsibilities
Content: The Information Security Team should enforce and comply with all applicable Test IS and IT policies related to data media implemented in cloud services, its creation, storage, and destruction.
AI Justification
The chunk discusses the implementation of measures to prevent malware execution and compliance with policies related to data media, which aligns with the control's focus on protecting the integrity of software and data.

Document Content
Matched Section
Section: Multi-cloud involves using multiple cloud services from different providers to serve different needs and requirements; enables control over where data, applications and workloads are hosted, and allows an enterprise to securely shift workloads between different cloud platforms and providers.
Content: Multi-cloud involves using multiple cloud services from different providers to serve different needs and requirements; enables control over where data, applications and workloads are hosted, and allows an enterprise to securely shift workloads between different cloud platforms and providers. Can increase availability, redundancy, improve performance and security; architecture patterns split between distributed and redundant deployments.
AI Justification
The text discusses the use of multi-cloud services and the benefits of distributing workloads across different cloud platforms, which aligns with the concept of redundancy and increased availability outlined in SC-36.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle.
AI Justification
The chunk discusses the need for data protection, classification, and destruction procedures to prevent unauthorized access to data, which aligns with the principles of preventing information transfer via shared resources.

Document Content
Matched Section
Section: The Information Security Team should enforce and comply with all applicable Test IS and IT policies related to data media implemented in cloud services.
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses the implementation of restrictions to prevent malware execution on endpoint devices and cloud infrastructure, aligning with the control's focus on usage restrictions for system components.

Document Content
Matched Section
Section: Implementation of malware prevention on endpoint devices and cloud infrastructure
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses the implementation of measures to prevent malware execution on various endpoint devices and cloud infrastructure, which aligns with the purpose of detonation chambers to identify and mitigate malicious code.

Document Content
Matched Section
Section: Implementation of controls to prevent malware execution
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The text discusses the implementation of controls to prevent malware execution on managed endpoint devices and cloud infrastructure, which aligns with the concept of boundary protection as described in SC-7.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies.
AI Justification
The chunk discusses the protection of data being moved or added to Cloud Services, which aligns with the need to protect the confidentiality and integrity of transmitted information.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, including the approval process for exceptions and the need for collaboration between security and privacy programs.

Document Content
Matched Section
Section: Implementation of non-persistent components and services
Content: Control: SI-14: Implementation of non-persistent components and services mitigates risk from advanced persistent threats (APTs) by reducing the targeting capability of adversaries (i.e., window of opportunity and available attack surface) to initiate and complete attacks.
AI Justification
The text discusses the implementation of non-persistent components and services to mitigate risks from advanced persistent threats, which aligns with the control's focus on reducing the attack surface and targeting capability of adversaries.

Document Content
Matched Section
Section: The Information Security Team should enforce and comply with all applicable Test IS and IT policies related to data media implemented in cloud services.
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses the implementation of measures to prevent malware execution, which aligns with the intent of SI-16 to protect memory from unauthorized code execution.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle.
AI Justification
The text discusses the importance of protecting personally identifiable information (PII) throughout its lifecycle, which aligns with the control's focus on ensuring the accuracy and relevance of PII.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle.
AI Justification
The text discusses the process of removing identifying data from datasets, which aligns with the control's focus on de-identification and privacy protection.

Document Content
Matched Section
Section: Changes to cloud security systems and procedures should be formally requested, evaluated, approved, documented, and communicated for audit and compliance purposes in accordance with all Test IT5 policies.
Content: The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing).
AI Justification
The text discusses the need for identifying and responding to potential breaches, which aligns with monitoring for unauthorized access and data exfiltration.

Document Content
Matched Section
Section: Malicious code protection mechanisms include both signature- and nonsignature-based technologies.
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses the implementation of measures to prevent malware execution on endpoint devices and cloud infrastructure, which aligns with the control's focus on protecting against malicious code.

Document Content
Matched Section
Section: Implementation of measures to prevent malware execution
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses the implementation of measures to prevent malware execution, which aligns with the need to monitor and maintain the integrity of software and systems to prevent unauthorized changes.

Document Content
Matched Section
Section: Section discussing malware execution prevention on endpoint devices and cloud infrastructure.
Content: implemented to prevent malware execution on Test-owned or managed endpoint devices (i.e., workstations, laptops, and mobile devices) and cloud infrastructure system components (gateways, cloud service brokers, virtual machines)
AI Justification
The chunk discusses preventing malware execution on endpoint devices and cloud infrastructure, which aligns with the control's focus on protecting system entry and exit points from malware.

Document Content
Matched Section
Section: 1.10 CLOUD EXIT STRATEGY
Content: An exit strategy for recovering, transferring, or destroying data should be defined in case the contract ends. Cloud Service Providers should be able to remove all Test data from the hosting locations at the conclusion of a service contract. Secure data disposal should follow the Data Security Policy and Data Security Standard documents.
AI Justification
The chunk discusses the need for secure data disposal and the responsibilities of Cloud Service Providers in ensuring that data is removed and disposed of properly, which aligns with the control's focus on disposal during the system development life cycle.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program. Information Security Team Test entity responsible for governance of the Cloud Security Program and internal cloud security assessments and compliance reviews. The Information Security Team should perform internal assessments and reviews at least annually for compliance reporting and performance metrics.
AI Justification
The text discusses the roles and responsibilities of the Information Security Team and System Owner in conducting internal assessments and compliance reviews, which aligns with the requirement for organizations to ensure that control assessors possess the necessary skills and conduct assessments effectively.

Document Content
Matched Section
Section: The Information Security Team should utilize specialized software and systems to reduce cloud security breach risk exposure, and regularly test company’s secure perimeters and the cloud service perimeters using penetration tests and other forensic methods.
Content: The Information Security Team should utilize specialized software and systems to reduce cloud security breach risk exposure, and regularly test company’s secure perimeters and the cloud service perimeters using penetration tests and other forensic methods.
AI Justification
The text discusses the importance of conducting penetration tests to identify vulnerabilities in cloud environments, which aligns with the definition and purpose of CA-8.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the importance of having a configuration management policy and procedures, including the process for handling exceptions to the policy.

Document Content
Matched Section
Section: Cloud Service Provider physical locations, including data centers and information processing facilities should be secured and protected in accordance with their Data center tier.
Content: Cloud Service Provider physical locations, including data centers and information processing facilities should be secured and protected in accordance with their Data center tier. Please see the IT3 policy for further details.
AI Justification
The chunk discusses the identification and protection of information necessary for investigations, which aligns with understanding where information is processed and stored.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the classification, protection, and destruction of data, which aligns with the control's focus on processing personally identifiable information and the full information life cycle.

Document Content
Matched Section
Section: Deviations from baseline configuration
Content: NOTE: Any deviations from baseline configuration defined by the IT Infrastructure / cloud team should be authorized following Test’s formal change management processes prior to deployment, provisioning, or integration for use. In addition, deviations from standard security baseline configurations should be authorized by Test Information Security Team prior to deployment, provisioning, or integration in accordance with the Test IT policy.
AI Justification
The text discusses the need for authorization of deviations from baseline configurations, which aligns with the requirement for documented and formally reviewed baseline configurations.

Document Content
Matched Section
Section: Configuration Change Control
Content: NOTE: Any deviations from baseline configuration defined by the IT Infrastructure / cloud team should be authorized following Test’s formal change management processes prior to deployment, provisioning, or integration for use. In addition, deviations from standard security baseline configurations should be authorized by Test Information Security Team prior to deployment, provisioning, or integration in accordance with the Test IT policy.
AI Justification
The text discusses the need for authorization of deviations from baseline configurations, which aligns with the systematic proposal and justification of changes outlined in CM-3.

Document Content
Matched Section
Section: Role Functional Activities
Content: Each system owner should maintain a portfolio of cloud application profiles under their control and management purview. The Application Owner should work collaboratively with data owners and custodians to ensure cloud security controls and standards are effectively implemented for compliance reporting under consulting guidance and approval from the Information Security Team.
AI Justification
The text discusses the responsibilities of application owners in managing cloud applications and ensuring compliance with security controls, which aligns with conducting impact analyses regarding security and privacy responsibilities.

Document Content
Matched Section
Section: Deviations from baseline configuration defined by the IT Infrastructure / cloud team
Content: NOTE: Any deviations from baseline configuration defined by the IT Infrastructure / cloud team should be authorized following Test’s formal change management processes prior to deployment, provisioning, or integration for use.
AI Justification
The text discusses the need for authorization of deviations from baseline configurations, which aligns with the control's focus on managing configuration settings.

Document Content
Matched Section
Section: Contingency planning policy and procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of contingency planning policies and procedures, aligning directly with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions.
Content: Control: CP-2: Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restoration and implementation of alternative mission or business processes when systems are compromised or breached.
AI Justification
The text discusses the importance of contingency planning for systems, including system restoration and alternative processes when systems are compromised, which aligns with CP-2's focus on continuity of operations.

Document Content
Matched Section
Section: Cloud Service Provider physical locations, including data centers and information processing facilities should be secured and protected in accordance with their Data center tier.
Content: Cloud Service Provider physical locations, including data centers and information processing facilities should be secured and protected in accordance with their Data center tier. Please see the IT3 policy for further details.
AI Justification
The text discusses the importance of securing cloud service provider locations and ensuring they meet specific data center tiers, which aligns with the concept of alternate processing sites being geographically distinct and providing processing capabilities.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: 1. All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification. Cloud providers should provide a method for Test authorized personnel to directly destroy or to request destruction of data. Cloud providers should provide evidence of destruction to Test upon request.
AI Justification
The chunk discusses the classification, protection, and destruction of data in cloud services, which aligns with the requirements for system-level and user-level information protection as outlined in CP-9.

Document Content
Matched Section
Section: 1.5 CLOUD SECURITY MANAGEMENT
Content: The Information Security Team should enforce compliance with the Test IS 8.0 Access Control & Identity Management policy for accessing Test systems, networks, applications, and files implemented in cloud services, both locally and remotely, including passwords and other cloud security access controls, to include authentication of Test and non-Test users.
AI Justification
The text discusses the management and security of authenticators, including passwords and access controls in cloud services, which aligns with the requirements for authenticator content and management.

Document Content
Matched Section
Section: 1.5 CLOUD SECURITY MANAGEMENT
Content: The Information Security Team should enforce compliance with the Test IS 8.0 Access Control & Identity Management policy for accessing Test systems, networks, applications, and files implemented in cloud services, both locally and remotely, including passwords and other cloud security access controls, to include authentication of Test and non-Test users.
AI Justification
The text emphasizes the enforcement of access controls and compliance with identity management policies, which is related to access enforcement.

Document Content
Matched Section
Section: Changes to cloud security systems and procedures
Content: Changes to cloud security systems and procedures should be formally requested, evaluated, approved, documented, and communicated for audit and compliance purposes in accordance with all Test IT5 policies. The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing). Cloud security incident response procedures should follow the Incident Response management policy.
AI Justification
The text discusses the importance of incident response policies and procedures, particularly in the context of cloud security, which aligns directly with the requirements of control IR-1.

Document Content
Matched Section
Section: 5. Changes to cloud security systems and procedures should be formally requested, evaluated, approved, documented, and communicated for audit and compliance purposes in accordance with all Test IT5 policies.
Content: The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing). Cloud security incident response procedures should follow the Incident Response management policy.
AI Justification
The text discusses the need for training related to incident response, including identifying and responding to potential breaches, which aligns with the requirements of IR-2.

Document Content
Matched Section
Section: Changes to cloud security systems and procedures
Content: The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing). Cloud security incident response procedures should follow the Incident Response management policy.
AI Justification
The text discusses the formal processes for identifying and responding to potential breaches, which aligns with the need for testing incident response capabilities.

Document Content
Matched Section
Section: Section 9: Changes to cloud security systems and procedures
Content: Changes to cloud security systems and procedures should be formally requested, evaluated, approved, documented, and communicated for audit and compliance purposes in accordance with all Test IT5 policies.
AI Justification
The text discusses the documentation and management of incidents related to cloud security, which aligns with the requirements of IR-5 for documenting incidents and maintaining records.

Document Content
Matched Section
Section: Changes to cloud security systems and procedures
Content: The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing). Cloud security incident response procedures should follow the Incident Response management policy.
AI Justification
The text discusses the formal processes for identifying and responding to potential breaches in cloud security, which aligns with the incident response capabilities outlined in control IR-4.

Document Content
Matched Section
Section: Changes to cloud security systems and procedures
Content: Changes to cloud security systems and procedures should be formally requested, evaluated, approved, documented, and communicated for audit and compliance purposes in accordance with all Test IT5 policies.
AI Justification
The text discusses the formal processes for identifying and responding to potential breaches, which aligns with the requirements for incident reporting and documentation as outlined in control IR-6.

Document Content
Matched Section
Section: 5. Changes to cloud security systems and procedures
Content: The Information Security Team should enforce, comply, and document a formal process for identifying and responding to a potential breach in cloud-based network perimeters (e.g., DDoS attack, phishing, identity spoofing). Cloud security incident response procedures should follow the Incident Response management policy.
AI Justification
The text discusses the need for a formal process for identifying and responding to potential breaches, which aligns with the requirement for a coordinated approach to incident response.

Document Content
Matched Section
Section: Maintenance policy and procedures
Content: Control: MA-1: Maintenance policy and procedures address the controls in the MA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of maintenance policy and procedures. Security and privacy program policies and procedures at the organization level are preferable, in general, and may obviate the need for mission- or system-specific policies and procedures. The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed. Procedures describe how the policies or controls are implemented and can be directed at the individual or role that is the object of the procedure. Procedures can be documented in system security and privacy plans or in one or more separate documents. Events that may precipitate an update to maintenance policy and procedures assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines. Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text discusses the importance of maintenance policies and procedures in the context of security and privacy assurance, aligning with the requirements of control MA-1.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle.
AI Justification
The section discusses the classification, protection, and destruction of data being moved to Cloud Services, which aligns with the requirements for protecting media during transport.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the destruction of data in cloud environments and the need for adequate data destruction procedures, which aligns with the media sanitization requirements outlined in control MP-6.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the destruction of data in accordance with classification and the need for data protection, which aligns with the concept of media downgrading.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk.
AI Justification
The text discusses the importance of having a physical and environmental protection policy and procedures, including the approval process for exceptions to these policies.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The chunk discusses the approval process for exceptions to the policy, which aligns with the need for planning policies and procedures regarding security and privacy assurance.

Document Content
Matched Section
Section: Baseline security control requirements should be established for developed or acquired, Test-owned or managed cloud applications and systems.
Content: Baseline security control requirements should be established for developed or acquired, Test-owned or managed cloud applications and systems. Compliance with cloud security baseline requirements should be reassessed at least annually or upon architectural changes.
AI Justification
The text discusses the establishment of baseline security control requirements for cloud applications and systems, which aligns with the definition and purpose of control baselines as described in PL-10.

Document Content
Matched Section
Section: 1.12 GOVERNANCE
Content: Test’s Cloud Security Program should be governed by the Information Security Team based on NIST recommended security practices and defined security controls, as established by the CSA and CIS. Cloud security artifacts and system documentation are to be maintained with each business unit by the assigned system and Application Owners.
AI Justification
The text discusses the governance of the Cloud Security Program and mentions the maintenance of security artifacts and system documentation, which aligns with the need for consistent security and privacy architectures as described in PL-8.

Document Content
Matched Section
Section: Role Functional Activities
Content: Each system owner should maintain a portfolio of cloud application profiles under their control and management purview. A designated Test resource responsible for managing cloud-based application services or business functions. The application owner may be a direct customer of a CSP for specific business functions and should track implementation and maintenance requirements for business applications hosted in the cloud. Application owners should maintain an information security categorization profile for all cloud application services and functions in their purview.
AI Justification
The text discusses the roles and responsibilities of application owners in maintaining security categorization profiles and ensuring compliance with security controls, which aligns with the overarching goals of an information security program plan.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program.
AI Justification
The roles and responsibilities outlined in the chunk indicate a structured approach to governance and management of cloud security, aligning with the need for designated roles in risk management processes.

Document Content
Matched Section
Section: Functional Activities
Content: Each system owner should maintain a portfolio of cloud application profiles under their control and management purview.
AI Justification
The text discusses the importance of maintaining an information security categorization profile for cloud application services, which aligns with the need to define protection and processing needs for information.

Document Content
Matched Section
Section: 1.6 CLOUD SECURITY TRAINING & AWARENESS
Content: Test should provide security education and awareness training for the end-user community and engineers and architects with information security responsibilities related to cloud security.
AI Justification
The chunk discusses the need for security education and awareness training, which aligns with the development of workforce capabilities in security roles.

Document Content
Matched Section
Section: 1.5 CLOUD SECURITY MANAGEMENT
Content: The Information Security Team should oversee the Cloud Security Program, with support from other departments and business units. Test’s Cloud Security Program should ensure the security of cloud-based systems and data, monitor, and analyze cloud security risk and violations, and ensure they are addressed and mitigated, accordingly.
AI Justification
The text discusses the oversight of the Cloud Security Program, which includes monitoring and analyzing cloud security risks and violations, aligning with the need for organization-wide security and privacy testing and monitoring.

Document Content
Matched Section
Section: 1.9 DATA PROTECTION REQUIREMENTS
Content: All data being moved or added to Cloud Services should be classified, protected, and retained in accordance with the Data Security and Information Security policies. Cloud Service providers should implement adequate data destruction procedures to ensure protection of data throughout the service lifecycle. When data is no longer needed or has exceeded the requirement retention period, the data should be destroyed from the cloud environment in accordance with its classification.
AI Justification
The chunk discusses the importance of data protection, classification, and destruction procedures, which aligns with the management of personally identifiable information (PII) quality throughout its lifecycle.

Document Content
Matched Section
Section: 1.12 GOVERNANCE
Content: Test’s Cloud Security Program should be governed by the Information Security Team based on NIST recommended security practices and defined security controls, as established by the CSA and CIS.
AI Justification
The text discusses the establishment of a governance structure for data management, which aligns with the need for a Data Governance Body to ensure coherent policies and compliance with security and privacy requirements.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program.
AI Justification
The text discusses the roles and responsibilities of the Information Security Team and System Owner, which aligns with the establishment of champions for information security and privacy.

Document Content
Matched Section
Section: 1.11 ROLES & RESPONSIBILITIES
Content: The following roles are primary stakeholders for the governance of Test’s Cloud Security Program and Cloud services architecture. These functions work collaboratively with business units, functional leads, and the Program Management Office to manage the needs of the program.
AI Justification
The text discusses roles and responsibilities related to governance and compliance, which aligns with the need for a risk management strategy that includes risk assessment and management processes.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the importance of personnel security policies and procedures, including the process for handling exceptions to these policies.

Document Content
Matched Section
Section: Cloud Service Provider
Content: Designated external entities, outside of Test, are responsible for delivering cloud services. The CSP works closely with Cloud Enterprise Architects, Test IT, and Test Information Security Team to develop and integrate secure cloud solutions.
AI Justification
The text discusses the involvement of external entities (Cloud Service Provider) in delivering services, which aligns with the control's focus on external providers and their personnel security requirements.

Document Content
Matched Section
Section: 1.13 ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment.
AI Justification
The section discusses disciplinary actions for policy violations, aligning with the need for organizational sanctions as described in PS-8.

Document Content
Matched Section
Section: Role Functional Activities
Content: Each system owner should maintain a portfolio of cloud application profiles under their control and management purview. Application Owner A designated Test resource responsible for managing cloud-based application services or business functions.
AI Justification
The text describes the roles and responsibilities of the Application Owner in managing cloud-based application services, which aligns with the specification of security and privacy roles.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of risk assessment policies and procedures, including the approval process for exceptions, which aligns with the requirements of RA-1.

Document Content
Matched Section
Section: Privacy Impact Assessment
Content: A privacy impact assessment is an analysis of how personally identifiable information is handled to ensure that handling conforms to applicable privacy requirements, determine the privacy risks associated with an information system or activity, and evaluate ways to mitigate privacy risks.
AI Justification
The text discusses the importance of conducting a privacy impact assessment, detailing the process, stakeholders involved, and the ongoing nature of the assessment, which aligns with the requirements of control RA-8.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy.
AI Justification
The text discusses the importance of policies and procedures related to security and privacy, which aligns with the requirements of SA-1 for establishing acquisition policies and procedures.

Document Content
Matched Section
Section: Deviations from baseline configuration and authorization processes
Content: NOTE: Any deviations from baseline configuration defined by the IT Infrastructure / cloud team should be authorized following Test’s formal change management processes prior to deployment, provisioning, or integration for use. In addition, deviations from standard security baseline configurations should be authorized by Test Information Security Team prior to deployment, provisioning, or integration in accordance with the Test IT policy.
AI Justification
The text discusses the need for authorization of deviations from baseline configurations, which aligns with the control's focus on maintaining configuration integrity and managing changes.

Document Content
Matched Section
Section: 1.6 CLOUD SECURITY TRAINING & AWARENESS
Content: Test should provide security education and awareness training for the end-user community and engineers and architects with information security responsibilities related to cloud security
AI Justification
The chunk discusses the need for security education and awareness training for personnel involved in cloud security, which aligns with the requirement for training provided by developers.

Document Content
Matched Section
Section: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud, including cloud authentication and credential management for Test and non-Test users.
Content: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud, including cloud authentication and credential management for Test and non-Test users.
AI Justification
The text discusses the establishment of a test policy, preparation of security architecture documents, and conducting risk assessments, which aligns with the need for developmental testing and evaluation to confirm that controls are implemented correctly.

Document Content
Matched Section
Section: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment, as applicable to all cloud environments.
Content: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment, as applicable to all cloud environments.
AI Justification
The mention of conducting periodic risk assessments and utilizing specialized software for testing aligns with the ongoing assessment and evaluation aspect of developmental testing.

Document Content
Matched Section
Section: The Information Security Team should utilize specialized software and systems to reduce cloud security breach risk exposure, and regularly test company’s secure perimeters and the cloud service perimeters using penetration tests and other forensic methods.
Content: The Information Security Team should utilize specialized software and systems to reduce cloud security breach risk exposure, and regularly test company’s secure perimeters and the cloud service perimeters using penetration tests and other forensic methods.
AI Justification
The use of penetration tests and forensic methods to test secure perimeters aligns with the requirement for testing and evaluation of security controls.

Document Content
Matched Section
Section: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud
Content: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud, including cloud authentication and credential management for Test and non-Test users.
AI Justification
The chunk discusses establishing a test policy and preparing security architecture documents, which aligns with the principles of integrating security and privacy considerations into the system development life cycle.

Document Content
Matched Section
Section: Test System and Application Owners should prepare and record system security architecture and design documents with a focus on cloud services
Content: Test System and Application Owners should prepare and record system security architecture and design documents with a focus on cloud services and facilitate maintenance and review of those plans.
AI Justification
The mention of preparing and recording system security architecture and design documents aligns with the security engineering principles that guide the design and testing of systems.

Document Content
Matched Section
Section: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment
Content: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment, as applicable to all cloud environments.
AI Justification
The periodic risk assessment of threats and vulnerabilities aligns with the need for ongoing vulnerability management in the system development life cycle.

Document Content
Matched Section
Section: Section 3: A consistent unified framework for cloud-based service continuity planning and plan development
Content: A consistent unified framework for cloud-based service continuity planning and plan development should be established, documented, and adopted to ensure related business continuity plans are consistent in addressing priorities for testing, maintenance, and cloud security requirements.
AI Justification
The text discusses the derivation of security and privacy requirements, which aligns with the control's focus on functional requirements derived from high-level security and privacy needs.

Document Content
Matched Section
Section: Section 4: Procedures should be established, and supporting business processes and technical measures implemented
Content: Procedures should be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new managed cloud services/service models have been pre-authorized by the organization's business leadership or other accountable business role or function.
AI Justification
The mention of establishing procedures and supporting processes for the acquisition of cloud services aligns with the need for resource allocation and management as described in SA-2.

Document Content
Matched Section
Section: Section 5: Baseline security control requirements should be established for developed or acquired
Content: Baseline security control requirements should be established for developed or acquired, Test-owned or managed cloud applications and systems. Compliance with cloud security baseline requirements should be reassessed at least annually or upon architectural changes.
AI Justification
The text emphasizes the importance of baseline security control requirements and compliance reassessment, which aligns with the control's focus on security throughout the system development life cycle.

Document Content
Matched Section
Section: 1.12 GOVERNANCE
Content: Test’s Cloud Security Program should be governed by the Information Security Team based on NIST recommended security practices and defined security controls, as established by the CSA and CIS. Cloud security artifacts and system documentation are to be maintained with each business unit by the assigned system and Application Owners.
AI Justification
The text discusses the importance of maintaining cloud security artifacts and system documentation, which aligns with the need for quality and completeness of system documentation as outlined in control SA-5.

Document Content
Matched Section
Section: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud
Content: Security Team should establish or amend a Test policy for accessing systems, applications, and data implemented in the cloud, including cloud authentication and credential management for Test and non-Test users.
AI Justification
The text discusses the establishment of security architecture and design documents, which aligns with the principles of systems security engineering.

Document Content
Matched Section
Section: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment, as applicable to all cloud environments.
Content: The Information Security Team should periodically conduct a risk assessment of the internal and external threats and vulnerabilities of the IT environment, as applicable to all cloud environments.
AI Justification
The mention of conducting risk assessments and utilizing specialized software to reduce security breach risks aligns with vulnerability management practices.

Document Content
Matched Section
Section: Cloud security procedures should address all Test cloud services technology, systems, data, and implemented in private, hybrid and/or public cloud infrastructures.
Content: Cloud security procedures should address all Test cloud services technology, systems, data, and implemented in private, hybrid and/or public cloud infrastructures. Procedures should require the implementation of cloud security standards to assure secure cloud-based systems and services within the Test enterprise. External entities using Test cloud services are subject to Test’s IT4 & IS policies, controls, and contractual requirements (e.g., SOW, MSA) as specified in service agreements.
AI Justification
The text discusses cloud security procedures and the requirements for external entities using Test cloud services, which aligns with the management of external system services and the associated risks.

Document Content
Matched Section
Section: 1.15 EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the importance of having policies and procedures for system and communications protection, including the process for exceptions to these policies.
anonymized_15.0_IS_Incident_Management_Policy_1.pdf NIST
64 matches found

Document Content
Matched Section
Section: 7. EXCEPTION
Content: Exceptions to the policy should be approved by InfoSec in advance. The technical and organizational controls define minimum requirements for securing assets. Divisions & Functions are free to define and implement stronger security requirements and mechanisms if a higher protection level is necessary and they do not contradict the Policy. In exceptional cases Divisions & Functions may implement a lower protection level to adequately address the related information security risk. In such cases, Test's policy exception process should be followed and applied. Exceptions to this policy can be requested by submitting a policy exception form in the ServiceNow portal. The request should contain the supporting information requested below, and should be approved by the Department Manager (not lower than director level) and the CISO or his/her designee: 1. Policy statement requiring the exception. 2. Exception duration. Provide detailed information.
AI Justification
The text discusses the need for an access control policy and procedures, including how exceptions to the policy should be handled, which aligns with the requirements of AC-1.

Document Content
Matched Section
Section: 8. ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The chunk discusses the enforcement of policies and the consequences of violations, which aligns with the concept of access control policies that govern user behavior and access to organizational resources.

Document Content
Matched Section
Section: 8. ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The chunk discusses disciplinary actions for policy violations, which implies enforcement of information flow controls and compliance with security policies.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the implementation of an incident management training policy, which aligns with the need for awareness and training policies as described in control AT-1.

Document Content
Matched Section
Section: Security Awareness & Skills Training
Content: Security Awareness & Skills Training
AI Justification
The text discusses the provision of literacy training and awareness for system users, which aligns with the requirements of AT-2.

Document Content
Matched Section
Section: Security Awareness & Skills Training
Content: Organizations determine the content of training based on the assigned roles and responsibilities of individuals as well as the security and privacy requirements of organizations and the systems to which personnel have authorized access, including technical training specifically tailored for assigned duties.
AI Justification
The text discusses the need for role-based training tailored to the responsibilities and security requirements of various roles within an organization.

Document Content
Matched Section
Section: Training and testing shall include lessons learned from previous IT Incident management activities.
Content: Training and testing shall include lessons learned from previous IT Incident management activities. IT Incident-related training and testing shall focus on improving the ability to respond effectively to a real event while continually identifying areas for growth and improvement.
AI Justification
The chunk discusses the importance of training and testing in incident management, which aligns with the need for training feedback and awareness training results.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, which aligns with the requirements of AU-1.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage.
AI Justification
The text discusses the importance of timely reporting and handling of incidents, which aligns with the need for alternate communications paths to ensure effective incident response.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the importance of having policies and procedures for system and information integrity, which aligns with the requirements of control SI-1.

Document Content
Matched Section
Section: Organization Protocols and Impact Assessment
Content: g. Organization Protocols: Security incidents may occur across network boundaries. The CISO shall define the protocols for handling these incidents and the contacts between Test, state agencies and outsourced entities. h. Impact Assessment: The CISO shall evaluate the impact of security incidents.
AI Justification
The text discusses the importance of communication protocols and impact assessments in handling incidents, which aligns with the need for agreements and procedures among supply chain entities.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: d. Incidents are properly recorded and documented.
AI Justification
The chunk discusses the importance of properly recording and documenting incidents, which aligns with the requirement to retain audit records until they are no longer needed.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: d. Incidents are properly recorded and documented.
AI Justification
The chunk discusses the importance of properly recording and documenting incidents, which aligns with the requirements for audit record content.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage. b. Incidents are detected as soon as possible and properly reported in accordance with internal and regulatory requirements. c. Incidents are handled by appropriate authorized personnel as detailed in the Incident Management Team log. d. Incidents are properly recorded and documented. e. All evidence is gathered, recorded, and maintained in the Information Management Log that will withstand internal and external scrutiny. f. The full extent and implications relating to an incident are understood. g. Incidents are dealt with in a timely manner and service(s) restored as soon as possible.
AI Justification
The chunk discusses the responsibilities of information users in reporting incidents and the documentation of incidents, which aligns with the need for audit record review and analysis.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the need for policies and procedures related to incident management, which aligns with the assessment and authorization aspects of CA-1.

Document Content
Matched Section
Section: Assessment of & Decision on Information Security Events
Content: Organizations assess controls in systems and the environments in which those systems operate as part of initial and ongoing authorizations, continuous monitoring, FISMA annual assessments, system design and development, systems security engineering, privacy engineering, and the system development life cycle.
AI Justification
The text discusses the importance of organizations ensuring that control assessors possess the required skills and technical expertise to conduct assessments, which aligns directly with the requirements of CA-2.

Document Content
Matched Section
Section: Assessment of & Decision on Information Security Events
Content: After the initial authorizations, organizations assess controls during continuous monitoring.
AI Justification
The text emphasizes the need for continuous monitoring and assessment of controls, which aligns with CA-7.

Document Content
Matched Section
Section: Assessment of & Decision on Information Security Events
Content: Organizations can use other types of assessment activities, such as vulnerability scanning and system monitoring, to maintain the security and privacy posture of systems during the system life cycle.
AI Justification
The text mentions system monitoring as part of maintaining the security and privacy posture of systems, which aligns with SI-4.

Document Content
Matched Section
Section: Impact Assessment
Content: The CISO shall evaluate the impact of security incidents.
AI Justification
The text discusses the evaluation of the impact of security incidents, which aligns with the requirement for conducting impact analyses as outlined in CM-4.

Document Content
Matched Section
Section: Contingency Planning | System Recovery and Reconstitution
Content: Response to Information Security Incidents NIST SP 800-53 Rev 5 Contingency Planning | Contingency Plan Contingency Planning | System Recovery and Reconstitution
AI Justification
The chunk discusses the execution of contingency plan activities to restore organizational mission and business functions, which aligns with the objectives of CP-10.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures.
AI Justification
The text discusses the importance of contingency planning policies and procedures, their development, and their relationship with security and privacy assurance.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Simply restating controls does not constitute an organizational policy or procedure.
AI Justification
The text mentions the need for procedures that describe how policies or controls are implemented, which aligns with the requirements of a contingency plan.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Events that may precipitate an update to contingency planning policy and procedures include assessment or audit findings, security incidents or breaches.
AI Justification
The text references the need for procedures that may include incident response, which aligns with incident handling requirements.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed.
AI Justification
The text implies the need for a structured approach to incident response, which is covered under incident response planning.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan
Content: Contingency Planning | Contingency Plan
AI Justification
The text discusses contingency plans and the importance of incorporating alternate communications protocols, which aligns directly with the requirements of CP-11.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan
Content: Contingency Planning | Contingency Plan
AI Justification
The mention of contingency planning and recovery aligns with the requirements of CP-2.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: Incident Response | Incident Handling
AI Justification
The reference to incident response indicates alignment with the incident handling control IR-4.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: Contingency planning for systems is part of an overall program for achieving continuity of operations for organizational mission and business functions. Contingency planning addresses system restoration and implementation of alternative mission or business processes when systems are compromised or breached.
AI Justification
The text discusses the importance of contingency planning for systems, including system restoration and alternative processes when systems are compromised, which aligns directly with CP-2.

Document Content
Matched Section
Section: Response to Information Security Incidents
Content: By coordinating contingency planning with incident handling activities, organizations ensure that the necessary planning activities are in place and activated in the event of an incident.
AI Justification
The text mentions the coordination of contingency planning with incident handling activities, which aligns with the requirements of IR-4.

Document Content
Matched Section
Section: Contingency training and incident management training
Content: Training and testing shall include lessons learned from previous IT Incident management activities. IT Incident-related training and testing shall focus on improving the ability to respond effectively to a real event while continually identifying areas for growth and improvement.
AI Justification
The text discusses the need for training and testing related to incident management, which aligns with the requirement for contingency training linked to roles and responsibilities.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, aligning with the control's focus on establishing such policies within organizations.

Document Content
Matched Section
Section: 1. PURPOSE
Content: The purpose of the incident management policy is to provide organization-wide guidance to employees on the proper response to, and efficient and timely reporting of, computer security-related incidents, such as computer viruses, unauthorized user activity, and suspected compromise of data, in accordance with internal and regulatory requirements. Further, this policy provides guidance regarding the need for developing and maintaining an incident management process. Additionally, the purpose of this policy is also to ensure proper recognition, management, and communication of security events and weaknesses through a formal process. It deals with the management of Incidents, including “Material” Cybersecurity Incidents as defined by SEC requirements.
AI Justification
The text discusses the importance of incident management policies and procedures, which aligns directly with the control IR-1 that emphasizes the need for such policies within organizations.

Document Content
Matched Section
Section: Incident Handling Team (IHT)
Content: Training and testing shall include lessons learned from previous IT Incident management activities. IT Incident-related training and testing shall focus on improving the ability to respond effectively to a real event while continually identifying areas for growth and improvement.
AI Justification
The text discusses the need for annual training and testing related to IT incident management, which aligns with the requirements for incident response training outlined in control IR-2.

Document Content
Matched Section
Section: Incident Handling Team (IHT)
Content: shall occur at a minimum, annually, using checklists, tabletop exercise, simulations, meetings, or comprehensive scenario-based exercises. Training and testing shall include lessons learned from previous IT Incident management activities.
AI Justification
The text discusses the requirement for annual testing of incident response capabilities, including the use of checklists and simulations, which aligns with the control's focus on testing incident response effectiveness.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage.
AI Justification
The text discusses the responsibilities of information users in reporting incidents and the procedures for handling incidents, which aligns with the incident response capabilities outlined in control IR-4.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage. b. Incidents are detected as soon as possible and properly reported in accordance with internal and regulatory requirements. c. Incidents are handled by appropriate authorized personnel as detailed in the Incident Management Team log. d. Incidents are properly recorded and documented. e. All evidence is gathered, recorded, and maintained in the Information Management Log that will withstand internal and external scrutiny. f. The full extent and implications relating to an incident are understood. g. Incidents are dealt with in a timely manner and service(s) restored as soon as possible.
AI Justification
The section outlines the responsibilities of users in reporting incidents and the importance of documenting incidents, which aligns with the requirements of IR-5.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: Response to Information Security Incidents
AI Justification
The chunk discusses incident response and mentions various aspects of incident handling and planning, which aligns with the need for support resources.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage.
AI Justification
The chunk outlines responsibilities for reporting and managing incidents, which aligns with the need for a coordinated approach to incident response as described in control IR-8.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: a. All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage.
AI Justification
The text discusses the responsibilities of information users in reporting incidents and the importance of timely reporting, which aligns with the requirements of IR-6.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: b. Incidents are detected as soon as possible and properly reported in accordance with internal and regulatory requirements.
AI Justification
The section emphasizes the need for incidents to be detected and reported in accordance with internal and regulatory requirements, which is a key aspect of IR-6.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: d. Incidents are properly recorded and documented.
AI Justification
The mention of proper recording and documentation of incidents aligns with the control's focus on incident reporting and documentation.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: e. All evidence is gathered, recorded, and maintained in the Information Management Log that will withstand internal and external scrutiny.
AI Justification
The requirement to gather and maintain evidence in a way that withstands scrutiny supports the control's emphasis on thorough incident reporting.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: f. The full extent and implications relating to an incident are understood.
AI Justification
The focus on understanding the full extent and implications of incidents is relevant to the control's requirements for effective incident reporting.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: g. Incidents are dealt with in a timely manner and service(s) restored as soon as possible.
AI Justification
The emphasis on timely handling of incidents aligns with the control's focus on the timeliness of incident reporting.

Document Content
Matched Section
Section: 3. GENERAL PROVISIONS
Content: All information users are responsible for reporting (or bringing to the attention of the information security function) actual, suspected, threatened and potential information security incidents and for assisting with investigations as required, particularly if urgent action should be taken to prevent further damage.
AI Justification
The text discusses the responsibilities of information users in reporting and managing information security incidents, which aligns with the need for corrective action in the event of information spillage.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs.
AI Justification
The text discusses the importance of having policies and procedures for physical and environmental protection, which aligns with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: a. Incident Management Training: This shall provide incident management training on how to identify and report security incidents.
AI Justification
The section discusses incident management training and guidelines for identifying and prioritizing security incidents, which aligns with the need for incident response policies and procedures.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the need for an implementation plan and procedures for incident management, which aligns with the planning and procedural aspects of control PL-1.

Document Content
Matched Section
Section: Incident Monitoring and Incident Detection
Content: The CISO shall develop and maintain guidelines on how to monitor for security incidents. The various functions at Test, as part of their risk management program, shall continuously monitor for security incidents (both physical and information security – related incidents). The CISO shall develop and maintain enterprise-wide procedures for collecting, analyzing, and reporting data.
AI Justification
The chunk discusses the development and maintenance of guidelines for monitoring security incidents, which aligns with the requirements for insider threat programs to detect and prevent malicious insider activity.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The chunk discusses the need for incident management training and guidelines for identifying and prioritizing security incidents, which aligns with the need for coordinated testing and training activities as outlined in PM-14.

Document Content
Matched Section
Section: Assessment of & Decision on Information Security Events
Content: Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation with changing mission and business needs, threats, vulnerabilities, and technologies.
AI Justification
The text discusses the importance of continuous monitoring for maintaining security and privacy posture, which aligns directly with the control's focus on ongoing awareness and risk management.

Document Content
Matched Section
Section: Assessment of & Decision on Information Security Events
Content: Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation with changing mission and business needs, threats, vulnerabilities, and technologies.
AI Justification
The mention of continuous monitoring and its role in risk management decisions aligns with the CA-7 control, which emphasizes the need for ongoing monitoring of security controls.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation with changing mission and business needs, threats, vulnerabilities, and technologies.
AI Justification
The text refers to system monitoring as part of the continuous monitoring process, which is a key aspect of the SI-4 control.

Document Content
Matched Section
Section: Organization Protocols
Content: The CISO shall define the protocols for handling these incidents and the contacts between Test, state agencies and outsourced entities.
AI Justification
The text discusses the inclusion of outsourced vendors and external entities in incident handling, aligning with the definition of external providers and their roles in security protocols.

Document Content
Matched Section
Section: 8. ENFORCEMENT/COMPLIANCE
Content: Any User found to have violated any of these policies may be subject to disciplinary action, if such User is an employee, up to and including dismissal or termination of employment. Violation of these policies by anyone other than an employee performing services for Test, including anyone performing services pursuant to a contract, may be grounds for immediate termination. Test may also pursue any other additional rights and remedies it may have against anyone found to be in violation of these policies.
AI Justification
The text discusses disciplinary actions for policy violations, which aligns with the need for organizational sanctions as outlined in PS-8.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the importance of risk assessment policies and procedures in the context of security and privacy assurance, which aligns with the RA-1 control.

Document Content
Matched Section
Section: Vulnerability Monitoring & Scanning
Content: Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly.
AI Justification
The text discusses the importance of vulnerability monitoring and the processes involved in identifying and addressing vulnerabilities, which aligns directly with the control RA-5.

Document Content
Matched Section
Section: System & Information Integrity | System Monitoring
Content: Vulnerability monitoring may also include continuous vulnerability monitoring tools that use instrumentation to continuously analyze components.
AI Justification
The text mentions continuous monitoring tools and the need for organizations to analyze components continuously, which aligns with the control SI-4.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: Vulnerability monitoring includes a channel and process for receiving reports of security vulnerabilities from the public at-large.
AI Justification
The text refers to vulnerability disclosure programs and incident response mechanisms, which align with the control IR-4.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs. The plan also call’s out, as needed, the various procedures documents and runbooks, as referenced in the Section 10 below.
AI Justification
The text discusses the importance of policies and procedures related to system and services acquisition, aligning with the control's focus on establishing such policies and procedures.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: a. Incident Management Training: This shall provide incident management training on how to identify and report security incidents.
AI Justification
The section outlines the need for incident management training and guidelines for identifying and prioritizing security incidents, which aligns with incident response controls.

Document Content
Matched Section
Section: Organization Protocols
Content: Security incidents may occur across network boundaries. The CISO shall define the protocols for handling these incidents and the contacts between Test, state agencies and outsourced entities.
AI Justification
The text discusses the involvement of outsourced vendors and external entities in handling security incidents, which aligns with the management of external system services and the associated risks.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: The implementation of this policy shall require an implementation plan with requirements as specified by the following paragraphs.
AI Justification
The text discusses the importance of having a system and communications protection policy and procedures, which aligns with the control SC-1 that emphasizes the need for such policies to address security and privacy assurance.

Document Content
Matched Section
Section: 4. IMPLEMENTATION
Content: a. Incident Management Training: This shall provide incident management training on how to identify and report security incidents.
AI Justification
The section outlines the need for incident management training and guidelines for identifying and prioritizing security incidents, which aligns with the control IR-1 that focuses on incident response policies and procedures.
anonymized_19.1_IS_Cloud_Computing_Security_Standard.pdf NIST
226 matches found

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The text discusses the importance of access control policies and procedures, their development, and their role in security and privacy assurance.

Document Content
Matched Section
Section: Access Control | Account Management
Content: Access Control | Account Management
AI Justification
The mention of procedures that can be established for security and privacy programs aligns with the need for account management policies.

Document Content
Matched Section
Section: Access Control | Access Enforcement
Content: Access Control | Access Enforcement
AI Justification
The text implies the need for enforcement of access control policies and procedures.

Document Content
Matched Section
Section: Access Control | Separation of Duties
Content: Access Control | Separation of Duties
AI Justification
The discussion of procedures directed at individuals or roles relates to the concept of separation of duties.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Access Control | Least Privilege
AI Justification
The text emphasizes the importance of policies that can dictate the least privilege access.

Document Content
Matched Section
Section: Access Control | Permitted Actions without Identification or Authentication
Content: Access Control | Permitted Actions without Identification or Authentication
AI Justification
The mention of permitted actions relates to access control decisions.

Document Content
Matched Section
Section: Access Control | Security and Privacy Attributes
Content: Access Control | Security and Privacy Attributes
AI Justification
The text discusses the collaboration between security and privacy programs in developing policies.

Document Content
Matched Section
Section: Access Control | Access Control Decisions
Content: Access Control | Access Control Decisions
AI Justification
The text discusses the need for access control decisions as part of the policy framework.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The text discusses remote access to organizational systems, including the use of encrypted VPNs, which aligns directly with the definition and requirements outlined in AC-17.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The text mentions enforcing access restrictions for remote access, which is directly related to the requirements of AC-3.

Document Content
Matched Section
Section: Control: AC-2
Content: Examples of system account types include individual, shared, group, system, guest, anonymous, emergency, developer, temporary, and service. Identification of authorized system users and the specification of access privileges reflect the requirements in other controls in the security plan.
AI Justification
The text discusses the identification of authorized system users, specification of access privileges, and management of various types of accounts, which aligns with the requirements of control AC-2.

Document Content
Matched Section
Section: data privacy governs how data is collected, shared, and used.
Content: data privacy governs how data is collected, shared, and used. In a practical sense, data privacy deals with aspects of the control processes around sharing data with third parties, how and where that data is stored, and the specific regulations that apply to those processes (i.e., legislation, contracts)
AI Justification
The chunk discusses data privacy and the control processes around sharing data with third parties, which aligns with the concepts of information sharing and access restrictions outlined in AC-21.

Document Content
Matched Section
Section: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text discusses the need for segregation of information systems and restricting access to prevent inappropriate disclosure, which aligns with the principles of access control and protection of nonpublic information.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The mention of user access policies and procedures indicates a structured approach to access control, which is fundamental to AC-1.

Document Content
Matched Section
Section: Definition of access control and authorization
Content: access control constraining or restricting physical and logical access to a resource (system locks, firewalls, gateways) access management managing employee/individual access to enterprise resources to keep systems and data secure (i.e., accounts, permissions) authorization allowing an identity access to something (e.g., data or a function)
AI Justification
The chunk discusses access control and authorization, which aligns with the definition of access control decisions as described in AC-24.

Document Content
Matched Section
Section: Term Definition
Content: access control constraining or restricting physical and logical access to a resource (system locks, firewalls, gateways) access management managing employee/individual access to enterprise resources to keep systems and data secure (i.e., accounts, permissions)
AI Justification
The chunk discusses access control and management, which aligns with the requirements of a reference monitor enforcing access control policies.

Document Content
Matched Section
Section: Definition of access control and access management
Content: access control constraining or restricting physical and logical access to a resource (system locks, firewalls, gateways) access management managing employee/individual access to enterprise resources to keep systems and data secure (i.e., accounts, permissions)
AI Justification
The chunk discusses access control and management, which aligns with the definition of access control policies that govern access to resources.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text discusses the need for segregation of access to prevent inappropriate disclosure and tampering, which aligns with the principle of separation of duties to mitigate risks.

Document Content
Matched Section
Section: User access policies and procedures should be established.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented.
AI Justification
The mention of establishing user access policies and procedures aligns with account management practices.

Document Content
Matched Section
Section: access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text implies the need for access restrictions to prevent inappropriate disclosure, which is a key aspect of access enforcement.

Document Content
Matched Section
Section: Security Awareness & Skills Training
Content: Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents.
AI Justification
The text discusses the provision of literacy training and awareness for system users, which aligns with the requirements of AT-2.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security |Position Descriptions
AI Justification
The text discusses the need for role-based training tailored to the responsibilities and security requirements of personnel, which aligns directly with control AT-3.

Document Content
Matched Section
Section: Audit and accountability policy and procedures
Content: Control: AU-1: Audit and accountability policy and procedures address the controls in the AU family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of audit and accountability policies and procedures, which aligns directly with the AU-1 control.

Document Content
Matched Section
Section: Audit plans should be developed and maintained
Content: AAC Audit Assurance & Compliance Audit plans should be developed and maintained to address business process disruptions.
AI Justification
The mention of audit plans and their maintenance aligns with the CA-1 control which focuses on audit activities.

Document Content
Matched Section
Section: Term Definition
Content: attribute aspects of an identity. Attributes can be static (like an organizational unit) or highly dynamic (IP address, device being used, if the user authenticated with MFA, locations, etc. ).
AI Justification
The chunk discusses attributes related to identity and access management, which aligns with the control's focus on security and privacy attributes associated with information.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The chunk discusses measures to prevent the execution of malware on organizational devices, which aligns with the control's focus on managing mobile code to prevent potential damage.

Document Content
Matched Section
Section: Provisioning for Name/Address Resolution Service
Content: Provisioning for Name/Address Resolution Service
AI Justification
The chunk discusses the importance of authoritative source information for name and address resolution, which aligns with SC-20's focus on origin authentication and integrity verification.

Document Content
Matched Section
Section: Provisioning for Name/Address Resolution Service
Content: Provisioning for Name/Address Resolution Service
AI Justification
The text discusses the validation of name resolution services and the requirement for authenticated channels, which aligns with SC-21's focus on ensuring clients validate name resolution services either independently or through trusted providers.

Document Content
Matched Section
Section: Segregation of information systems and access restrictions
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text discusses the segregation of information systems and access restrictions to prevent inappropriate disclosure and tampering, aligning with the need for separation of user and system management functions.

Document Content
Matched Section
Section: User access policies and procedures
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The mention of establishing user access policies and procedures aligns with the need for identity and access management.

Document Content
Matched Section
Section: Access restrictions to prevent inappropriate disclosure
Content: access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text emphasizes restricting access to prevent inappropriate disclosure, which aligns with access enforcement controls.

Document Content
Matched Section
Section: Segregation and access restriction of information systems
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text discusses the need to segregate information systems and restrict access to prevent inappropriate disclosure and tampering of log data, which aligns with the protection of information at rest.

Document Content
Matched Section
Section: User access policies and procedures
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The mention of establishing user access policies and procedures aligns with the need for identity and access management.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The section discusses the importance of access control mechanisms and policies in isolating security functions from nonsecurity functions.

Document Content
Matched Section
Section: Access Control | Least Privilege
Content: Access Control | Least Privilege
AI Justification
The mention of implementing least privilege capabilities aligns with the control's focus on restricting access to security functions.

Document Content
Matched Section
Section: Access Control | Access Enforcement
Content: Access Control | Access Enforcement
AI Justification
The control emphasizes the enforcement of access restrictions, which is relevant to the isolation of security functions.

Document Content
Matched Section
Section: Access Control | Separation of Duties
Content: Access Control | Separation of Duties
AI Justification
The concept of separating security functions from nonsecurity functions relates to the principle of separation of duties.

Document Content
Matched Section
Section: Data Redundancy and Performance Improvement
Content: disk drive components into one or more logical units for the purposes of data redundancy and performance improvement.
AI Justification
The chunk discusses data redundancy, which aligns with the concept of distributing processing and storage across multiple locations to improve performance and redundancy.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The chunk discusses measures to prevent the execution of malware, which aligns with the control's focus on identifying and isolating malicious code.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The mention of preventing malware execution aligns with the need for protective measures against malicious code.

Document Content
Matched Section
Section: Provisioning for Name/Address Resolution Service
Content: Provisioning for Name/Address Resolution Service
AI Justification
The chunk discusses provisioning for services that may involve out-of-band channels, aligning with the control's focus on the use of such channels for secure transmission.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The chunk discusses measures to prevent the execution of malware, which aligns with the purpose of detonation chambers to identify and mitigate malicious code.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The control emphasizes the importance of avoiding logical paths that could bypass policy enforcement mechanisms, which aligns with the need for robust access control policies and procedures.

Document Content
Matched Section
Section: Access Control | Information Flow Enforcement
Content: Access Control | Information Flow Enforcement
AI Justification
This control relates to ensuring that information flows are properly managed and enforced, which is relevant to the logical policy enforcement mechanisms mentioned in SC-46.

Document Content
Matched Section
Section: Incident Response Management
Content: An incident, whether adversarial- or nonadversarial-based, can disrupt established communications paths used for system operations and organizational command and control. Alternate communications paths reduce the risk of all communications paths being affected by the same incident.
AI Justification
The text discusses the importance of establishing alternate communications paths to ensure continuity during incidents, which aligns directly with the intent of SC-47.

Document Content
Matched Section
Section: Contingency Planning | Telecommunications Services
Content: Contingency Planning | Telecommunications Services
AI Justification
The mention of establishing alternate communications protocols and services aligns with the control CP-8, which focuses on ensuring telecommunications services are available during incidents.

Document Content
Matched Section
Section: Contingency Planning | Alternate Communications Protocols
Content: Contingency Planning | Alternate Communications Protocols
AI Justification
The text emphasizes the need for alternate communications protocols to maintain operations during incidents, which is the focus of CP-11.

Document Content
Matched Section
Section: System & Communications Protection | Denial-of-Service Protection
Content: Denial-of-service events may occur due to a variety of internal and external causes, such as an attack by an adversary or a lack of planning to support organizational needs with respect to capacity and bandwidth. Such attacks can occur across a wide range of network protocols (e.g., IPv4, IPv6). A variety of technologies are available to limit or eliminate the origination and effects of denial-of-service events. For example, boundary protection devices can filter certain types of packets to protect system components on internal networks from being directly affected by or the source of denial-of-service attacks. Employing increased network capacity and bandwidth combined with service redundancy also reduces the susceptibility to denial-of-service events.
AI Justification
The text discusses various methods to limit or eliminate denial-of-service events, which aligns directly with the control SC-5.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The chunk discusses various access control policies and procedures, which relate to the enforcement of domain separation and policy enforcement as required by SC-50.

Document Content
Matched Section
Section: Access Control | Information Flow Enforcement
Content: Access Control | Information Flow Enforcement
AI Justification
The mention of access control policies implies the enforcement of information flow, which aligns with AC-4.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Control: SC-7: Managed interfaces include gateways, routers, firewalls, guards, network-based malicious code analysis, virtualization systems, or encrypted tunnels implemented within a security architecture. Subnetworks that are physically or logically separated from internal networks are referred to as demilitarized zones or DMZs.
AI Justification
The text discusses managed interfaces and boundary protection mechanisms, which align with the control's focus on managing network interfaces and protecting organizational boundaries.

Document Content
Matched Section
Section: Implementation of non-persistent components and services
Content: Implementation of non-persistent components and services mitigates risk from advanced persistent threats (APTs) by reducing the targeting capability of adversaries (i.e., window of opportunity and available attack surface) to initiate and complete attacks.
AI Justification
The text discusses the implementation of non-persistent components and services to mitigate risks from advanced persistent threats, which aligns with the control's focus on reducing the attack surface and targeting capability of adversaries.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The chunk discusses measures to prevent the execution of malware, which aligns with the intent of SI-16 to protect against unauthorized code execution.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan
Content: Control: SI-17: Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel and providing specific instructions on subsequent steps to take.
AI Justification
The text discusses failure conditions and procedures for maintaining operations during incidents, which aligns with contingency planning.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site
Content: Control: SI-17: Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel and providing specific instructions on subsequent steps to take.
AI Justification
The mention of fail-safe procedures and alternative steps aligns with the need for alternate processing capabilities during failures.

Document Content
Matched Section
Section: Contingency Planning | Alternate Communications Protocols
Content: Control: SI-17: Failure conditions include the loss of communications among critical system components or between system components and operational facilities. Fail-safe procedures include alerting operator personnel and providing specific instructions on subsequent steps to take.
AI Justification
The loss of communications and the need for specific instructions suggest the importance of alternate communication methods.

Document Content
Matched Section
Section: Management of technical vulnerabilities
Content: The need to remediate system flaws applies to all types of software and firmware. Organizations identify systems affected by software flaws, including potential vulnerabilities resulting from those flaws, and report this information to designated organizational personnel with information security and privacy responsibilities. Security-relevant updates include patches, service packs, and malicious code signatures. Organizations also address flaws discovered during assessments, continuous monitoring, incident response activities, and system error handling.
AI Justification
The text discusses the identification and remediation of system flaws, including the reporting of vulnerabilities and the management of updates, which aligns directly with the requirements of SI-2.

Document Content
Matched Section
Section: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text discusses the importance of segregating information systems and restricting access to prevent inappropriate disclosure, which aligns with the objective of protecting valuable information from exfiltration.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The mention of establishing user access policies and procedures aligns with the control's focus on managing access to information.

Document Content
Matched Section
Section: business processes and technical measures implemented to prevent the execution of malware
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The text discusses various measures and technologies to prevent the execution of malware, which aligns with the control's focus on protecting against malicious code.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The text discusses measures to prevent malware execution on organizational devices, which aligns with the intent of SI-20 to protect against data exfiltration and insider threats.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The mention of organizationally owned or managed devices aligns with the need for maintaining an inventory of assets to protect against malware.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The focus on preventing malware execution directly relates to the control's aim of ensuring malware protection across devices.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The context implies a need for assessing risks associated with malware, which aligns with the intent of ID.RA-1.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The discussion of malware and potential threats suggests the need for threat intelligence to inform protective measures.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The mention of processes and measures to protect against malware aligns with the need for established information protection processes.

Document Content
Matched Section
Section: Security Awareness and Skills Training
Content: Security Awareness and Skills Training ISO/IEC 27001:2013 A.6.1.4 Contact with special interest groups NIST SP 800-53 Rev 5 Program Management | Security and Privacy Groups and Program Management | Threat Awareness Program Risk Assessment | Threat Hunting System & Information Integrity | Security Alerts, Advisories, and PM-15 Associations PM-16 RA-10 SI-5 Directives ID.RA-3 CIS CSC Data Protection Continuous Vulnerability 3 7 13 Network Monitoring & Defense ISO/IEC 27001:2013 Clause 6.1.2 Information Security Risk Assessment NIST SP 800-53 Rev 5 Program Management | Insider Threat Program Program Management | Threat Awareness Program Risk Assessment | Risk Assessment Risk Assessment | Threat Hunting System & Information Integrity | Security Alerts, Advisories, and PM-12 PM-16 RA-3 RA-10 SI-5 Directives ID.RA-4 CIS CSC 3 12 Data Protection Network Infrastructure Management
AI Justification
The chunk discusses the generation of security alerts and advisories, which aligns directly with the control's focus on maintaining situational awareness and compliance with security directives.

Document Content
Matched Section
Section: Information Integrity
Content: System & Information Integrity | Software, Firmware, and
AI Justification
The chunk directly references the control SI-7, which focuses on unauthorized changes to software, firmware, and information, aligning with the content of the chunk.

Document Content
Matched Section
Section: business processes and technical measures implemented
Content: business processes and technical measures implemented, to prevent the execution of malware on organizationally owned or managed user end-point devices (i.e., issued workstations, laptops, and mobile devices) and IT infrastructure network and systems components.
AI Justification
The chunk discusses measures to prevent malware execution on user end-point devices, which aligns with the control's focus on protecting system entry and exit points from threats such as spam and malware.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Controls & Processes
Content: Control: SR-1: Supply chain risk management policy and procedures address the controls in the SR family as well as supply chain-related controls in other families that are implemented within systems and organizations.
AI Justification
The text discusses the importance of supply chain risk management policies and procedures, aligning directly with the control's focus on establishing such policies.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Controls & Processes
Content: Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed.
AI Justification
The text emphasizes the need for procedures that describe how policies or controls are implemented, which aligns with the intent of SR-2.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management
Content: Events that may precipitate an update to supply chain risk management policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The mention of events that may trigger updates to supply chain risk management policies indicates a focus on risk assessment, aligning with SR-3.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: The dependence on products, systems, and services from external providers, as well as the nature of the relationships with those providers, present an increasing level of risk to an organization. Threat actions that may increase security or privacy risks include unauthorized production, the insertion or use of counterfeits, tampering, theft, insertion of malicious software and hardware, and poor manufacturing and development practices in the supply chain.
AI Justification
The text discusses the importance of managing supply chain risks, including identifying and assessing risks, developing SCRM plans, and monitoring performance, which aligns directly with the objectives of SR-2.

Document Content
Matched Section
Section: Address security within supplier agreements and Information and communication technology supply chain
Content: Address security within supplier agreements Information and communication technology supply chain
AI Justification
The chunk discusses various aspects of supply chain management, including security within supplier agreements and monitoring of supplier services, which aligns with the definition of supply chain elements and processes.

Document Content
Matched Section
Section: Managing changes to supplier services
Content: Managing changes to supplier services
AI Justification
The mention of managing changes to supplier services and the overall focus on supply chain risk management aligns with the control's intent to address vulnerabilities in supply chain processes.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Controls & Processes
Content: The use of the acquisition process provides an important vehicle to protect the supply chain. There are many useful tools and techniques available, including obscuring the end use of a system or system component, using blind or filtered buys, requiring tamper-evident packaging, or using trusted or controlled distribution.
AI Justification
The text discusses various strategies, tools, and methods for protecting the supply chain, which aligns directly with the objectives of SR-5.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supplier Assessments & Reviews
Content: Organizations consider providing training, education, and awareness programs for personnel regarding supply chain risk, available mitigation strategies, and when the programs should be employed.
AI Justification
The mention of supply chain risk assessments and the need for training and awareness programs aligns with the objectives of SR-3.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supplier Assessments & Reviews
Content: Supply Chain Risk Management | Supplier Assessments & Reviews
AI Justification
The chunk discusses various aspects of supply chain risk management, including assessments and reviews of suppliers, which aligns directly with the control's focus on evaluating supplier risk.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Controls & Processes
Content: Supply Chain Risk Management | Supply Chain Controls & Processes
AI Justification
The mention of supply chain controls and processes indicates a focus on managing risks associated with suppliers, which aligns with this control.

Document Content
Matched Section
Section: Monitoring and Review of Supplier Services
Content: Monitoring and Review of Supplier Services
AI Justification
The text references the monitoring and review of supplier services, which is a key aspect of this control.

Document Content
Matched Section
Section: Supply Chain Risk Management | Policy & Procedures
Content: Address security within supplier agreements
AI Justification
The chunk discusses the importance of addressing security within supplier agreements and managing supplier services, which aligns with the need for communication and agreements among supply chain entities as stated in SR-8.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Controls & Processes
Content: Supply Chain Risk Management | Supply Chain Controls & Processes
AI Justification
The text discusses the importance of operational security (OPSEC) in the context of supply chains, which aligns directly with the control's focus on identifying and mitigating risks associated with suppliers.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management
Content: Supply Chain Risk Management | Supply Chain Risk Management
AI Justification
The chunk emphasizes the need for risk management strategies in supply chain processes, which aligns with the control's focus on managing risks associated with supply chains.

Document Content
Matched Section
Section: System & Services Acquisition | Acquisition Process
Content: System & Services Acquisition | Acquisition Process
AI Justification
The mention of acquisition strategies and supplier assessments indicates a focus on the acquisition process, which is relevant to this control.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Session Audit
AI Justification
The chunk discusses session auditing, which aligns directly with the control's focus on monitoring and recording session activities.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Session Audit
AI Justification
The chunk discusses the importance of audit logging in a cross-organizational context, which aligns with the requirements of AU-16.

Document Content
Matched Section
Section: Event Logging
Content: Event logging requirements, including the need to log specific event types, may be referenced in other controls and control enhancements.
AI Justification
The text discusses the importance of event logging, types of events that require logging, and the need for organizations to review and update logged events, which aligns with the requirements of AU-2.

Document Content
Matched Section
Section: Audit & Accountability | Audit Review, Analysis, And Reporting
Content: Reviewing and updating the set of logged events is necessary to help ensure that the events remain relevant and continue to support the needs of the organization.
AI Justification
The mention of reviewing and updating the set of logged events aligns with the requirements of AU-6, which focuses on the analysis and reporting of audit records.

Document Content
Matched Section
Section: Audit & Accountability | Session Audit
Content: Audit & Accountability | Session Audit
AI Justification
The chunk discusses the importance of auditing and accountability, which aligns with the need for reviewing and analyzing audit records as specified in AU-6.

Document Content
Matched Section
Section: Control Assessment
Content: Organizations ensure that control assessors possess the required skills and technical expertise to develop effective assessment plans and to conduct assessments of system-specific, hybrid, common, and program management controls, as appropriate.
AI Justification
The text discusses the importance of ensuring that control assessors have the necessary skills and expertise to conduct assessments, which aligns directly with the requirements of CA-2.

Document Content
Matched Section
Section: Control Assessment
Content: Organizations may develop a single, consolidated security and privacy assessment plan for the system or maintain separate plans.
AI Justification
The mention of developing a consolidated security and privacy assessment plan aligns with the requirements of CA-1, which focuses on establishing policies and procedures for control assessments.

Document Content
Matched Section
Section: Business Continuity Management & Operational Resilience
Content: A consistent unified framework for business continuity planning and plan development should be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
AI Justification
The text discusses the establishment and documentation of a unified framework for business continuity planning, which aligns with the need for a business continuity planning policy.

Document Content
Matched Section
Section: Business Continuity Management & Operational Resilience
Content: Requirements for business continuity plans include the following: Defined purpose and scope, aligned with relevant dependencies Accessible to and understood.
AI Justification
The requirements for business continuity plans mentioned in the text align with the control's focus on planning for business continuity.

Document Content
Matched Section
Section: Business Continuity Management & Operational Resilience
Content: A consistent unified framework for business continuity planning and plan development should be established, documented, and adopted.
AI Justification
The text emphasizes the need for documented business continuity plans, which is directly related to this control.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Continuous monitoring at the system level facilitates ongoing awareness of the system security and privacy posture to support organizational risk management decisions.
AI Justification
The text discusses the importance of continuous monitoring for maintaining security and privacy posture, which aligns directly with the CA-7 control.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Having access to security and privacy information on a continuing basis through reports and dashboards gives organizational officials the ability to make effective and timely risk management decisions.
AI Justification
The mention of ongoing monitoring and the need for timely risk management decisions aligns with the SI-4 control.

Document Content
Matched Section
Section: Data Governance and Data Privacy
Content: data governance managing the lifecycle of organizational data from creation and introduction to removal and/or disposal and destruction. data privacy governs how data is collected, shared, and used.
AI Justification
The chunk discusses data governance, data privacy, and data protection, which are all related to the lifecycle and management of personally identifiable information, aligning with the requirements of control CM-13.

Document Content
Matched Section
Section: Configuration Management | Configuration Change Control
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The chunk discusses restrictions on software installation and system change control procedures, which are part of maintaining baseline configurations.

Document Content
Matched Section
Section: Configuration Management | Configuration Change Control
Content: System change control procedures
AI Justification
The mention of system change control procedures aligns with the need for configuration change control.

Document Content
Matched Section
Section: Configuration Management | Impact Analyses
Content: Technical review of applications after operating platform changes
AI Justification
The technical review of applications after operating platform changes indicates a need for security impact analysis.

Document Content
Matched Section
Section: Configuration Management | Configuration Change Control
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The chunk discusses restrictions on software installation and system change control procedures, which align with the systematic proposal and implementation of configuration changes.

Document Content
Matched Section
Section: Configuration Management | Impact Analyses
Content: Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The mention of technical reviews and restrictions on changes indicates a process for analyzing the security impact of changes, which aligns with CM-4.

Document Content
Matched Section
Section: System & Services Acquisition | Developer Configuration
Content: For new systems or major upgrades, organizations consider including representatives from the development organizations on the Configuration Control Boards or Change Advisory Boards.
AI Justification
The reference to developer involvement in configuration control boards suggests a focus on managing configurations from a development perspective.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text emphasizes the need for access restrictions and appropriate identity and access management, which aligns with the purpose of access enforcement.

Document Content
Matched Section
Section: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The mention of restricting access to prevent inappropriate disclosure aligns with the need for enforcing information flow.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text discusses identity management, which is a key aspect of identification and authentication.

Document Content
Matched Section
Section: Configuration Management | System Component Inventory
Content: Control: CM-8: System components are discrete, identifiable information technology assets that include hardware, software, and firmware. Organizations may choose to implement centralized system component inventories that include components from all organizational systems.
AI Justification
The text discusses the need for a centralized inventory of system components, including hardware and software, which aligns directly with the requirements of CM-8.

Document Content
Matched Section
Section: Program Management | System Inventory
Content: Preventing duplicate accounting of system components addresses the lack of accountability that occurs when component ownership and system association is not known.
AI Justification
The text emphasizes the importance of maintaining an inventory of system components for accountability, which aligns with the PM-5 control.

Document Content
Matched Section
Section: Configuration Management | System Component Inventory
Content: The information necessary for effective accountability of system components includes the system name, software owners, software version numbers, hardware inventory specifications.
AI Justification
The focus on maintaining an inventory of system components aligns with the asset management control ID.AM-2.

Document Content
Matched Section
Section: Configuration Management | System Component Inventory
Content: Effective prevention of duplicate accounting of system components necessitates use of a unique identifier for each component.
AI Justification
The text discusses the importance of knowing component ownership to prevent duplicate accounting, which aligns with ID.AM-4.

Document Content
Matched Section
Section: Configuration Management
Content: Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual systems. Configuration management plans define processes and procedures for how configuration management is used to support system development life cycle activities.
AI Justification
The text discusses the importance of configuration management activities throughout the system development life cycle, detailing how configuration management plans are created and implemented.

Document Content
Matched Section
Section: Configuration Management
Content: Configuration management plans satisfy the requirements in configuration management policies while being tailored to individual systems.
AI Justification
The text outlines the need for configuration management policies and the creation of plans that align with these policies.

Document Content
Matched Section
Section: Configuration Management
Content: The plans describe how to advance changes through change management processes; update configuration settings and baselines; maintain component inventories; control development, test, and operational environments.
AI Justification
The text mentions maintaining component inventories and controlling development, test, and operational environments, which aligns with establishing a baseline configuration.

Document Content
Matched Section
Section: Configuration Management
Content: Configuration management approval processes include the designation of key stakeholders responsible for reviewing and approving proposed changes to systems.
AI Justification
The text discusses change management processes and the approval of proposed changes, which aligns with configuration change control.

Document Content
Matched Section
Section: Contingency Planning Policy and Procedures
Content: Control: CP-1: Contingency planning policy and procedures address the controls in the CP family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance. Therefore, it is important that security and privacy programs collaborate on the development of contingency planning policy and procedures.
AI Justification
The text discusses the importance of contingency planning policies and procedures, emphasizing their role in security and privacy assurance and the need for collaboration between security and privacy programs.

Document Content
Matched Section
Section: Contingency Planning | Contingency Plan
Content: The policy can be included as part of the general security and privacy policy or be represented by multiple policies that reflect the complex nature of organizations. Procedures can be established for security and privacy programs, for mission or business processes, and for systems, if needed.
AI Justification
The mention of procedures for security and privacy programs and the need for updates based on various events aligns with the need for a contingency plan.

Document Content
Matched Section
Section: Contingency Planning | Alternate Communications Protocols
Content: Contingency Planning | Alternate Communications Protocols
AI Justification
The chunk mentions contingency planning and specifically references alternate communications protocols, which aligns with the requirements of CP-11.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site, Contingency Planning | Telecommunications Services, Contingency Planning | Alternate Communications Protocols, Contingency Planning | Safe Mode, Contingency Planning | Alternative Security Mechanisms
Content: Data Recovery Network Infrastructure Management Incident Response Management ISO/IEC 27001:2013 Implementing information security continuity Availability of information processing facilities NIST SP 800-53 Rev 5 Contingency Planning | Alternate Processing Site Contingency Planning | Telecommunications Services Contingency Planning | Alternate Communications Protocols Contingency Planning | Safe Mode Contingency Planning | Alternative Security Mechanisms Physical & Environmental Protection | Emergency Power Planning | Security and Privacy Architectures System & Communications Protection | Resource Availability Paths PR.PT-5 CIS CSC 11 12 17 A.17.1.2 A.17.2.1 CP-7 CP-8 CP-11 CP-12 CP-13 PE-11 PL-8 SC-6 RC.CO-3 CIS CSC 16 17 Application Software Security Incident Response Management ISO/IEC 27001:2013 Clause 16.1.2 Reporting Information Security Events Clause 7.4 Communication NIST SP 800-53 Rev 5 CP-2 Contingency Planning | Contingency Plan
AI Justification
The chunk discusses various aspects of contingency planning and recovery processes, which align with the requirements of CP-10 regarding recovery and reconstitution activities.

Document Content
Matched Section
Section: Contingency Planning | Alternative Security Mechanisms
Content: Contingency Planning | Alternative Security Mechanisms
AI Justification
The chunk discusses various aspects of contingency planning and mentions alternative security mechanisms, which aligns directly with the control's focus on supporting system resiliency and continuity of operations.

Document Content
Matched Section
Section: Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel.
Content: Contingency training provided by organizations is linked to the assigned roles and responsibilities of organizational personnel to ensure that the appropriate content and level of detail is included in such training.
AI Justification
The text discusses the importance of contingency training linked to roles and responsibilities, which aligns directly with CP-3.

Document Content
Matched Section
Section: A consistent unified framework for business continuity planning and plan development
Content: A consistent unified framework for business continuity planning and plan development should be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
AI Justification
The text discusses the establishment of a unified framework for business continuity planning, which aligns with the principles of contingency planning outlined in CP-2.

Document Content
Matched Section
Section: A consistent unified framework for business continuity planning and plan development
Content: A consistent unified framework for business continuity planning and plan development should be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
AI Justification
The mention of establishing and documenting a framework for business continuity planning aligns with the need for policies and procedures as stated in CP-1.

Document Content
Matched Section
Section: Business Continuity Planning and Plan Development
Content: A consistent unified framework for business continuity planning and plan development should be established, documented, and adopted to ensure all business continuity plans are consistent in addressing priorities for testing, maintenance, and information security requirements.
AI Justification
The text discusses the establishment of a unified framework for business continuity planning, which includes addressing priorities for testing and maintenance, aligning with the requirements of CP-4 for testing contingency plans.

Document Content
Matched Section
Section: Contingency Planning | Telecommunications Services
Content: Contingency Planning | Telecommunications Services
AI Justification
The chunk discusses telecommunications services in the context of contingency planning, which aligns with the requirements outlined in CP-8.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site
Content: Contingency Planning | Alternate Processing Site
AI Justification
The chunk discusses the concept of alternate processing sites and their role in maintaining processing capability during disruptions, which aligns directly with the definition of CP-7.

Document Content
Matched Section
Section: Restrictions on software installation and System change control procedures
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The chunk discusses restrictions and controls related to software installation and change management, which indirectly relates to maintaining data integrity and availability, aligning with the need for alternate storage sites to ensure continuity.

Document Content
Matched Section
Section: System change control procedures
Content: System change control procedures
AI Justification
The mention of system change control procedures and the need for technical reviews suggests a focus on ensuring that systems can recover and maintain operations, which aligns with contingency planning.

Document Content
Matched Section
Section: Identification and authentication policy and procedures
Content: Identification and authentication policy and procedures address the controls in the IA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of identification and authentication policies and procedures, aligning directly with control IA-1.

Document Content
Matched Section
Section: Events that may precipitate an update to identification and authentication policy and procedures
Content: Events that may precipitate an update to identification and authentication policy and procedures include assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The mention of updating policies and procedures based on assessment or audit findings aligns with the need for continuous monitoring and improvement of security policies.

Document Content
Matched Section
Section: Definition of authentication
Content: authentication the process of confirming an identity using credentials (i.e., username & password)
AI Justification
The chunk discusses the process of authentication and the management of access control, which aligns with the requirements for authenticators as outlined in control IA-5.

Document Content
Matched Section
Section: Definition of access control
Content: access control constraining or restricting physical and logical access to a resource (system locks, firewalls, gateways)
AI Justification
The chunk mentions access control and management, which aligns with the access enforcement requirements of control AC-3.

Document Content
Matched Section
Section: Definition of access management
Content: access management managing employee/individual access to enterprise resources to keep systems and data secure (i.e., accounts, permissions)
AI Justification
The chunk discusses managing employee access to resources, which aligns with the principle of least privilege as outlined in control AC-6.

Document Content
Matched Section
Section: FIM Federated Identity Management
Content: FIM Federated Identity Management: the process of asserting an identity across different systems or organizations (e.g., single sign-on (SSO)) higher baseline security a wider range of security requirements to meet all regulatory and industry compliance baselines to maintain extremely elevated levels of security.
AI Justification
The chunk discusses Federated Identity Management and the assertion of identity across different systems, which aligns with the need for identification and authentication methods.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text discusses the need for appropriate identity management and access control for users accessing data, which aligns with the identification and authentication of users.

Document Content
Matched Section
Section: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text emphasizes the need for access restrictions and policies to prevent inappropriate disclosure, which aligns with access control policies.

Document Content
Matched Section
Section: Incident Response Policy and Procedures
Content: Control: IR-1: Incident response policy and procedures address the controls in the IR family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of incident response policies and procedures, aligning directly with the requirements of control IR-1.

Document Content
Matched Section
Section: Incident Handling
Content: IR-4: Incident Response | Incident Handling
AI Justification
The text references the need for procedures related to incident handling, which aligns with control IR-4.

Document Content
Matched Section
Section: Incident Response Plan
Content: IR-8: Incident Response | Incident Response Plan
AI Justification
The text mentions the establishment of procedures that can be documented in plans, which aligns with control IR-8.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The chunk discusses incident response management and training, which aligns with the requirements for incident response training outlined in control IR-2.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The mention of incident response plans in the context of incident response management aligns with the requirements of control IR-4.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The reference to incident response plan testing and lessons learned aligns with the requirements of control IR-8.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The chunk discusses incident response management, which aligns with the need to test incident response capabilities as outlined in control IR-3.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The mention of incident response management implies the existence of an incident response plan, which is covered under control IR-4.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: Response to information security incidents
AI Justification
The chunk discusses various aspects of incident response and documentation, which aligns with the requirements of IR-5.

Document Content
Matched Section
Section: Incident Response | Incident Monitoring
Content: Incident Response | Incident Monitoring
AI Justification
The mention of incident monitoring aligns with the requirements of IR-4, which focuses on the types of incidents that should be monitored.

Document Content
Matched Section
Section: Incident Response Management
Content: Organizations recognize that incident response capabilities are dependent on the capabilities of organizational systems and the mission and business processes being supported by those systems.
AI Justification
The text discusses the importance of incident response capabilities and their integration into organizational systems and processes, aligning with the requirements of control IR-4.

Document Content
Matched Section
Section: Incident Response Management
Content: An effective incident handling capability includes coordination among many organizational entities (e.g., mission or business owners, system owners, authorizing officials, human resources offices, physical security offices, personnel security offices, legal departments, risk executive [function], operations personnel, procurement offices).
AI Justification
The mention of incident handling and the coordination among various organizational entities aligns with the requirements of control IR-8.

Document Content
Matched Section
Section: Incident Response | Incident Handling
Content: IR-4 Incident Response | Incident Handling
AI Justification
The text discusses incident reporting and the importance of timely and accurate reporting, which aligns with the requirements of incident handling.

Document Content
Matched Section
Section: Incident Response | Incident Response Plan
Content: IR-8 Incident Response | Incident Response Plan
AI Justification
The mention of incident information informing risk assessments and control effectiveness aligns with the need for a structured incident response plan.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The chunk discusses incident response management, which aligns with the provision of support resources for incident response.

Document Content
Matched Section
Section: Incident Response Management
Content: Incident Response Management
AI Justification
The text discusses the importance of developing and implementing a coordinated approach to incident response, which aligns directly with the requirements of control IR-8.

Document Content
Matched Section
Section: Identification and Authentication | Identity Proofing
Content: Control: MA-5: Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems.
AI Justification
The text discusses the roles and access requirements of maintenance personnel, including the need for physical access and temporary credentials.

Document Content
Matched Section
Section: Physical & Environmental Protection | Physical Access Authorizations
Content: Control: MA-5: Maintenance personnel refers to individuals who perform hardware or software maintenance on organizational systems, while PE-2 addresses physical access for individuals whose maintenance duties place them within the physical protection perimeter of the systems.
AI Justification
The text explicitly mentions physical access for maintenance personnel, aligning with the requirements of PE-2.

Document Content
Matched Section
Section: Physical & Environmental Protection | Personnel Screening
Content: Individuals not previously identified as authorized maintenance personnel—such as information technology manufacturers, vendors, systems integrators, and consultants—may require privileged access to organizational systems.
AI Justification
The mention of authorized maintenance personnel and the need for screening aligns with the requirements of PS-3.

Document Content
Matched Section
Section: Physical & Environmental Protection | Personnel Screening
Content: Based on organizational assessments of risk, organizations may issue temporary credentials to these individuals.
AI Justification
The text implies the need for access controls related to maintenance activities, which can be linked to remote access considerations.

Document Content
Matched Section
Section: Media Protection | Policy & Procedures
Content: Control: MP-2: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Denying access to patient medical records in a community hospital unless the individuals seeking access to such records are authorized healthcare providers is an example of restricting access to non-digital media. Limiting access to the design specifications stored on compact discs in the media library to individuals on the system development team is an example of restricting access to digital media.
AI Justification
The chunk discusses the management and access control of both digital and non-digital media, which aligns with the requirements of MP-2.

Document Content
Matched Section
Section: Media Protection | Media Marking
Content: Security marking refers to the application or use of human-readable security attributes. Digital media includes diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), flash drives, compact discs, and digital versatile discs. Non-digital media includes paper and microfilm.
AI Justification
The chunk discusses the concept of security marking and its relevance to various types of media, which aligns directly with the control's focus on security marking for digital and non-digital media.

Document Content
Matched Section
Section: Media Protection | Media Storage
Content: Control: MP-4: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state, magnetic), compact discs, and digital versatile discs. Non-digital media includes paper and microfilm. Physically controlling stored media includes conducting inventories, ensuring procedures are in place to allow individuals to check out and return media to the library, and maintaining accountability for stored media. Secure storage includes a locked drawer, desk, or cabinet or a controlled media library. The type of media storage is commensurate with the security category or classification of the information on the media. Controlled areas are spaces that provide physical and procedural controls to meet the requirements established for protecting information and systems. Fewer controls may be needed for media that contains information determined to be in the public domain, publicly releasable, or have limited adverse impacts on organizations, operations, or individuals if accessed by other than authorized personnel. In these situations, physical access controls provide adequate protection.
AI Justification
The chunk discusses the physical control and management of both digital and non-digital media, which aligns directly with the requirements outlined in control MP-4.

Document Content
Matched Section
Section: Media Protection | Media Transport
Content: Control: MP-5: System media includes digital and non-digital media. Digital media includes flash drives, diskettes, magnetic tapes, external or removable hard disk drives (e.g., solid state and magnetic), compact discs, and digital versatile discs. Non-digital media includes microfilm and paper. Controlled areas are spaces for which organizations provide physical or procedural controls to meet requirements established for protecting information and systems. Controls to protect media during transport include cryptography and locked containers. Cryptographic mechanisms can provide confidentiality and integrity protections depending on the mechanisms implemented. Activities associated with media transport include releasing media for transport, ensuring that media enters the appropriate transport processes, and the actual transport. Authorized transport and courier personnel may include individuals external to the organization. Maintaining accountability of media during transport includes restricting transport activities to authorized personnel and tracking and/or obtaining records of transport activities as the media moves through the transportation system to prevent and detect loss, destruction, or tampering. Organizations establish documentation requirements for activities associated with the transport of system media in accordance with organizational assessments of risk. Organizations maintain the flexibility to define record-keeping methods for the different types of media transport as part of a system of transport-related records.
AI Justification
The text discusses the transport of system media, including the need for controls, accountability, and documentation requirements, which aligns directly with the MP-5 control.

Document Content
Matched Section
Section: Media Protection | Policy & Procedures
Content: Control: MP-6: Media sanitization applies to all digital and non-digital system media subject to disposal or reuse, whether or not the media is considered removable. Examples include digital media in scanners, copiers, printers, notebook computers, workstations, network components, mobile devices, and non-digital media (e.g., paper and microfilm). The sanitization process removes information from system media such that the information cannot be retrieved or reconstructed.
AI Justification
The chunk discusses the processes and techniques related to media sanitization, which aligns directly with the control's focus on ensuring that information cannot be retrieved or reconstructed from media subject to disposal or reuse.

Document Content
Matched Section
Section: Media Protection | Media Use
Content: Organizations may restrict the use of portable storage devices, for example, by using physical cages on workstations to prohibit access to certain external ports or disabling or removing the ability to insert, read, or write to such devices.
AI Justification
The chunk discusses the restrictions and protections related to the use of various types of media, including portable storage devices, which aligns directly with the requirements of MP-7.

Document Content
Matched Section
Section: Media Protection | Media Downgrading
Content: MP-8: Media downgrading applies to digital and non-digital media subject to release outside of the organization, whether the media is considered removable or not. When applied to system media, the downgrading process removes information from the media, typically by security category or classification level, such that the information cannot be retrieved or reconstructed. Downgrading of media includes redacting information to enable wider release and distribution. Downgrading ensures that empty space on the media is devoid of information.
AI Justification
The chunk references the media downgrading process, which aligns with the control's focus on ensuring that information on media is properly downgraded before release.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site
Content: Contingency Planning | Alternate Processing Site
AI Justification
The chunk mentions emergency lighting provisions and their relevance to organizational facilities, aligning with the control's focus on emergency lighting in critical areas.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site
Content: Contingency Planning | Alternate Processing Site
AI Justification
The mention of considering alternate processing sites for power-related contingencies aligns with the control's focus on ensuring availability through alternate sites.

Document Content
Matched Section
Section: Contingency Planning | Alternate Processing Site
Content: Contingency Planning | Alternate Processing Site
AI Justification
The chunk discusses various aspects of contingency planning, including the need for alternate processing sites and communication protocols, which aligns with the definition and purpose of alternate work sites.

Document Content
Matched Section
Section: Identification and Authentication | Identity Proofing
Content: PE-2 Physical & Environmental Protection | Physical Access Authorizations
AI Justification
The chunk discusses the need for physical access authorizations for employees and visitors, aligning directly with the PE-2 control.

Document Content
Matched Section
Section: Physical & Environmental Protection | Personnel Screening
Content: PS-3 Physical & Environmental Protection | Personnel Screening
AI Justification
The mention of individuals with permanent physical access authorization credentials relates to the screening process for personnel.

Document Content
Matched Section
Section: Application Software Security
Content: Control: PE-6: Physical access monitoring includes publicly accessible areas within organizational facilities. Examples of physical access monitoring include the employment of guards, video surveillance equipment (i.e., cameras), and sensor devices. Reviewing physical access logs can help identify suspicious activity, anomalous events, or potential threats.
AI Justification
The chunk discusses physical access monitoring, which aligns directly with the control PE-6 that specifies the need for monitoring physical access in organizational facilities.

Document Content
Matched Section
Section: Physical & Environmental Protection | Power Equipment & Cabling
Content: Physical & Environmental Protection | Power Equipment & Cabling
AI Justification
The section discusses the security and protection of power equipment and cabling, which aligns with the requirements of control PE-9.

Document Content
Matched Section
Section: Control: PL-11
Content: The concept of tailoring allows organizations to specialize or customize a set of baseline controls by applying a defined set of tailoring actions. Tailoring actions facilitate such specialization and customization by allowing organizations to develop security and privacy plans that reflect their specific mission and business functions, the environments where their systems operate, the threats and vulnerabilities that can affect their systems, and any other conditions or situations that can impact their mission or business success.
AI Justification
The text discusses the concept of tailoring controls to meet specific organizational needs, which aligns with the PL-11 control.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The text discusses the establishment of rules of behavior for organizational users and their acknowledgment, which aligns with the control's focus on access agreements.

Document Content
Matched Section
Section: Access Control | Access Control Policy and Procedures
Content: Access Control | Access Control Policy and Procedures
AI Justification
The mention of rules of behavior for both organizational and non-organizational users aligns with the control's focus on identification and authentication processes.

Document Content
Matched Section
Section: Control ID Security Control Name Requirements
Content: Policies and procedures should be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network, and systems components, or any corporate, operations and/or data center facilities have been pre-authorized by the organization’s business leadership or other accountable business role or function.
AI Justification
The text discusses the organization-wide management and implementation of controls and processes, which aligns with the concept of central management as described in control PL-9.

Document Content
Matched Section
Section: Control ID Security Control Name Requirements
Content: Policies and procedures should be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network, and systems components, or any corporate, operations and/or data center facilities have been pre-authorized by the organization’s business leadership or other accountable business role or function.
AI Justification
The mention of policies and procedures for change control and configuration management aligns with the requirements of control CM-9.

Document Content
Matched Section
Section: Control ID Security Control Name Requirements
Content: An information security program plan is a formal document that provides an overview of the security requirements for an organization-wide information security program and describes the program management controls and common controls in place or planned for meeting those requirements.
AI Justification
The text discusses the importance of an information security program plan, detailing its purpose, implementation, and the need for updates based on various factors.

Document Content
Matched Section
Section: Security Awareness and Skills Training
Content: Organizations that handle classified information are required, under Executive Order 13587 EO 13587 and the National Insider Threat Policy ODNI NITP, to establish insider threat programs.
AI Justification
The text discusses the establishment and requirements of insider threat programs, which aligns directly with control PM-12.

Document Content
Matched Section
Section: Security Awareness and Skills Training
Content: Insider threat programs require organizations to prepare department or agency insider threat policies and implementation plans, conduct host-based user monitoring of individual employee activities on government-owned classified computers, provide insider threat awareness training to employees.
AI Justification
The text mentions the need for insider threat awareness training for employees, which aligns with control PM-15.

Document Content
Matched Section
Section: Security Awareness and Skills Training
Content: Insider threat programs can leverage the existence of incident handling teams that organizations may already have in place, such as computer security incident response teams.
AI Justification
The mention of leveraging incident handling teams and monitoring activities aligns with the objectives of PM-16.

Document Content
Matched Section
Section: Security Awareness and Skills Training
Content: Security Awareness and Skills Training
AI Justification
The chunk discusses the importance of ongoing contact with security and privacy groups, which aligns directly with the control's focus on maintaining communication with relevant associations.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security |Position Descriptions
AI Justification
The chunk explicitly mentions PM-2, which relates to the role of the senior agency information security officer.

Document Content
Matched Section
Section: Data Governance
Content: data governance managing the lifecycle of organizational data from creation and introduction to removal and/or disposal and destruction.
AI Justification
The text discusses the establishment of a Data Governance Body and its responsibilities, which aligns with the control's focus on coherent policies for data management.

Document Content
Matched Section
Section: Program Management | Risk Framing
Content: Program Management |Risk Framing
AI Justification
The chunk discusses the importance of risk framing at the organizational level and mentions various stakeholders involved, which aligns directly with the description of control PM-28.

Document Content
Matched Section
Section: Risk Assessment | System Development Life Cycle
Content: An organization-wide supply chain risk management strategy includes an unambiguous expression of the supply chain risk appetite and tolerance for the organization, acceptable supply chain risk mitigation strategies or controls, a process for consistently evaluating and monitoring supply chain risk, approaches for implementing and communicating the supply chain risk management strategy, and the associated roles and responsibilities.
AI Justification
The text discusses the elements of an organization-wide supply chain risk management strategy, including risk appetite, mitigation strategies, and monitoring processes.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: The supply chain risk management strategy is implemented at the organization and mission/business levels, whereas the supply chain risk management plan (see SR-2) is implemented at the system level.
AI Justification
The text mentions the implementation of the supply chain risk management strategy at the system level, which aligns with the concept of a supply chain risk management plan.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Continuous monitoring at the organization level facilitates ongoing awareness of the security and privacy posture across the organization to support organizational risk management decisions.
AI Justification
The text discusses the importance of continuous monitoring at the organization level to support risk management decisions, which aligns directly with the control's focus on ongoing awareness of security and privacy posture.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Continuous monitoring programs allow organizations to maintain the authorizations of systems and common controls in highly dynamic environments of operation.
AI Justification
The mention of continuous monitoring programs and the need for ongoing assessment aligns with CA-7, which focuses on continuous monitoring of security controls.

Document Content
Matched Section
Section: Assessment, Authorization & Monitoring | Plan of Action & Program Management | Plan of Action and Milestones Process
Content: Assessment, Authorization & Monitoring | Plan of Action & Program Management | Plan of Action and Milestones Process
AI Justification
The chunk discusses the importance of plans of action and milestones, aligning directly with the control's focus on organizational documentation and risk management.

Document Content
Matched Section
Section: Program Management | Risk Management Strategy
Content: Program Management | Risk Management Strategy
AI Justification
The mention of risk management strategies in the context of plans of action and milestones aligns with the control's focus on risk management.

Document Content
Matched Section
Section: Program Management | System Inventory
Content: Program Management | System Inventory
AI Justification
The chunk discusses system inventories and their management, which aligns with the guidance provided in PM-5.

Document Content
Matched Section
Section: Configuration Management | System Component Inventory
Content: Configuration Management | System Component Inventory
AI Justification
The mention of 'Configuration Management | System Component Inventory' indicates a focus on managing system components, which aligns with CM-8.

Document Content
Matched Section
Section: Personnel Security | External Personnel Security
Content: Personnel Security | External Personnel Security Personnel Security | Position Descriptions
AI Justification
The text discusses the importance of personnel security policies and procedures, their development, and the collaboration between security and privacy programs, which aligns directly with the intent of PS-1.

Document Content
Matched Section
Section: Program Management | Information Security Program Plan
Content: Program Management | Information Security Program Plan
AI Justification
The mention of security and privacy programs collaborating on their development aligns with the need for a comprehensive information security program plan.

Document Content
Matched Section
Section: Program Management | Information Security and Privacy Resources
Content: Program Management | Information Security and Privacy Resources
AI Justification
The text implies the need for resources to implement security and privacy policies, which aligns with the need for information security resources.

Document Content
Matched Section
Section: Personnel Security | Position Descriptions
Content: Control: PS-2: Position risk designations reflect Office of Personnel Management (OPM) policy and guidance. Proper position designation is the foundation of an effective and consistent suitability and personnel security program. The Position Designation System (PDS) assesses the duties and responsibilities of a position to determine the degree of potential damage to the efficiency or integrity of the service due to misconduct of an incumbent of a position and establishes the risk level of that position.
AI Justification
The text discusses the importance of position risk designations and their alignment with OPM policy, which directly relates to the control PS-2.

Document Content
Matched Section
Section: Upon termination of workforce personnel and/or expiration of external business relationships
Content: Upon termination of workforce personnel and/or expiration of external business relationships, all organizationally owned assets should be returned within an established period.
AI Justification
The text discusses the return of organizationally owned assets upon termination, which relates to the actions required for personnel transfers.

Document Content
Matched Section
Section: Termination of workforce personnel and/or expiration of external business relationships
Content: Upon termination of workforce personnel and/or expiration of external business relationships, all organizationally owned assets should be returned within an established period.
AI Justification
The text discusses the return of organizationally owned assets upon termination, which aligns with the control's focus on accountability for system-related property.

Document Content
Matched Section
Section: Risk assessment policy and procedures
Content: Risk assessment policy and procedures address the controls in the RA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures.
AI Justification
The text discusses the importance of risk assessment policies and procedures, their development, and their relationship with security and privacy programs.

Document Content
Matched Section
Section: Events that may precipitate an update to risk assessment policy and procedures
Content: Events that may precipitate an update to risk assessment policy and procedures include assessment or audit findings, security incidents or breaches, or changes in laws, executive orders, directives, regulations, policies, standards, and guidelines.
AI Justification
The text implies the need for regular updates to risk assessment policies based on various triggers, aligning with the need for ongoing risk assessment.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Threat hunting is an active means of cyber defense in contrast to traditional protection measures, such as firewalls, intrusion detection and prevention systems, quarantining malicious code in sandboxes, and Security Information and Event Management technologies and systems.
AI Justification
The text discusses proactive measures in cyber defense, specifically threat hunting, which aligns with the objectives of RA-10.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: The objective is to track and disrupt cyber adversaries as early as possible in the attack sequence and to measurably improve the speed and accuracy of organizational responses.
AI Justification
The mention of tracking and disrupting cyber adversaries aligns with the objectives of incident response.

Document Content
Matched Section
Section: Security categorization processes facilitate the development of inventories of information assets...
Content: Security categorization processes facilitate the development of inventories of information assets and, along with CM-8, mappings to specific system components where information is processed, stored, or transmitted.
AI Justification
The text discusses the process of security categorization and its importance in understanding potential adverse impacts on organizational operations and assets.

Document Content
Matched Section
Section: Data and objects containing data should be assigned a classification by the data owner based on data type, value, sensitivity, and criticality to the organization.
Content: Data and objects containing data should be assigned a classification by the data owner based on data type, value, sensitivity, and criticality to the organization.
AI Justification
The text implies the need for access control based on the classification of data, which aligns with the need to enforce access based on security categorization.

Document Content
Matched Section
Section: Risk Assessment | System Development Life Cycle
Content: Risk assessments can also address information related to the system, including system design, the intended use of the system, testing results, and supply chain-related information or artifacts.
AI Justification
The text discusses the importance of risk assessments in considering various factors such as threats, vulnerabilities, and impacts, which aligns directly with the RA-3 control.

Document Content
Matched Section
Section: Risk Assessment | System Development Life Cycle
Content: Risk assessments can play an important role in control selection processes, particularly during the application of tailoring guidance and in the earliest phases of capability determination.
AI Justification
The mention of the system development life cycle and the acquisition of systems and services aligns with the SA-15 control.

Document Content
Matched Section
Section: Risk Assessment | System Development Life Cycle
Content: Risk assessments can also address information related to the system, including system design, the intended use of the system, testing results, and supply chain-related information or artifacts.
AI Justification
The text references supply chain-related information in the context of risk assessments, which aligns with the SR-2 control.

Document Content
Matched Section
Section: Risk Assessment | Risk Response
Content: Risk Assessment | Risk Response
AI Justification
The text discusses various options for responding to risk, including mitigating, accepting, sharing, or avoiding risk, which aligns directly with the control's focus on risk response strategies.

Document Content
Matched Section
Section: System & Information Integrity | Security Alerts, Advisories, and Directives
Content: Control: RA-5: Security categorization of information and systems guides the frequency and comprehensiveness of vulnerability monitoring (including scans). Organizations determine the required vulnerability monitoring for system components, ensuring that the potential sources of vulnerabilities—such as infrastructure components (e.g., switches, routers, guards, sensors), networked printers, scanners, and copiers—are not overlooked. The capability to readily update vulnerability monitoring tools as new vulnerabilities are discovered and announced and as new scanning methods are developed helps to ensure that new vulnerabilities are not missed by employed vulnerability monitoring tools. The vulnerability monitoring tool update process helps to ensure that potential vulnerabilities in the system are identified and addressed as quickly as possible. Vulnerability monitoring and analyses for custom software may require additional approaches, such as static analysis, dynamic analysis, binary analysis, or a hybrid of the three approaches. Organizations can use these analysis approaches in source code reviews and in a variety of tools, including web-based application scanners, static analysis tools, and binary analyzers. Vulnerability monitoring includes scanning for patch levels; scanning for functions, ports, protocols, and services that should not be accessible to users or devices; and scanning for flow control mechanisms that are improperly configured or operating incorrectly. Vulnerability monitoring may also include continuous vulnerability monitoring tools that use instrumentation to continuously analyze components. Instrumentation-based tools may improve accuracy and may be run throughout an organization without scanning. Vulnerability monitoring tools that facilitate interoperability include tools that are Security Content Automated Protocol (SCAP)-validated. Thus, organizations consider using scanning tools that express vulnerabilities in the Common Vulnerabilities and Exposures (CVE) naming convention and that employ the Open Vulnerability Assessment Language (OVAL) to determine the presence of vulnerabilities. Sources for vulnerability information include the Common Weakness Enumeration (CWE) listing and the National Vulnerability Database (NVD). Control assessments, such as red team exercises, provide additional sources of potential vulnerabilities for which to scan. Organizations also consider using scanning tools that express vulnerability impact by the Common Vulnerability Scoring System (CVSS). Vulnerability monitoring includes a channel and process for receiving reports of security vulnerabilities from the public at-large. Vulnerability disclosure programs can be as simple as publishing a monitored email address or web form that can receive reports, including notification authorizing good-faith research and disclosure of security vulnerabilities. Organizations generally expect that such research is happening with or without their authorization and can use public vulnerability disclosure channels to increase the likelihood that discovered vulnerabilities are reported directly to the organization for remediation. Organizations may also employ the use of financial incentives (also known as bug bounties) to further encourage external security researchers to report discovered vulnerabilities. Bug bounty programs can be tailored to the organization’s needs. Bounties can be operated indefinitely or over a defined period of time and can be offered to the general public or to a curated group. Organizations may run public and private bounties simultaneously and could choose to offer partially credentialed access to certain participants in order to evaluate security vulnerabilities from privileged vantage points.
AI Justification
The text discusses the importance of vulnerability monitoring, including the categorization of information and systems, and the processes involved in identifying and addressing vulnerabilities.

Document Content
Matched Section
Section: Control: SA-1: System and services acquisition policy and procedures
Content: Control: SA-1: System and services acquisition policy and procedures address the controls in the SA family that are implemented within systems and organizations. The risk management strategy is an important factor in establishing such policies and procedures. Policies and procedures contribute to security and privacy assurance.
AI Justification
The text discusses the importance of policies and procedures for system and services acquisition, aligning directly with the requirements of control SA-1.

Document Content
Matched Section
Section: Configuration Management | Configuration Change Control
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The text discusses the importance of configuration management activities conducted by developers, which aligns with the control's focus on ensuring effective security controls through configuration management.

Document Content
Matched Section
Section: Configuration Management | Configuration Change Control
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The mention of system change control procedures and restrictions on changes to software packages directly relates to the need for configuration change control.

Document Content
Matched Section
Section: Configuration Management | Impact Analyses
Content: Restrictions on software installation System change control procedures Technical review of applications after operating platform changes Restrictions on changes to software packages
AI Justification
The text implies the need for impact analyses related to changes in software and systems, which aligns with the requirements of this control.

Document Content
Matched Section
Section: Risk Assessment | System Development Life Cycle
Content: Risk Assessment | System Development Life Cycle
AI Justification
The chunk discusses the importance of maintaining the integrity of development tools and processes, which aligns with the control's focus on development tools and maturity models.

Document Content
Matched Section
Section: Supply Chain Risk Management | Supply Chain Risk Management Plan
Content: Supply Chain Risk Management | Supply Chain Risk Management Plan
AI Justification
The mention of supply chain risk assessment and mitigation aligns with the control's focus on supply chain risk management.

Document Content
Matched Section
Section: Developmental Testing and Evaluation
Content: Developmental testing and evaluation confirms that the required controls are implemented correctly, operating as intended, enforcing the desired security and privacy policies, and meeting established security and privacy requirements.
AI Justification
The text discusses the importance of developmental testing and evaluation to confirm that required controls are implemented correctly and meet security and privacy requirements.

Document Content
Matched Section
Section: System Interconnections
Content: The interconnections or changes—including upgrading or replacing applications, operating systems, and firmware—may adversely affect previously implemented controls.
AI Justification
The text mentions that interconnections or changes to system components may adversely affect previously implemented controls, which aligns with the need for managing system interconnections.

Document Content
Matched Section
Section: Testing Approaches
Content: Testing custom software applications may require approaches such as manual code review, security architecture review, and penetration testing.
AI Justification
The mention of various testing approaches such as manual code review and penetration testing aligns with the need for validating inputs and ensuring security measures are in place.

Document Content
Matched Section
Section: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
Content: User access policies and procedures should be established, and supporting business processes and technical measures implemented, for ensuring appropriate identity, entitlement, and access management for all internal corporate and customer (tenant) users with access to data.
AI Justification
The text discusses the need for appropriate identity and access management for users, which aligns with the control's focus on managing user identities and access.

Document Content
Matched Section
Section: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
Content: organization’s information systems should be appropriately segregated and access restricted to prevent inappropriate disclosure and tampering of log data.
AI Justification
The text emphasizes the need to restrict access to prevent inappropriate disclosure and tampering, which aligns with enforcing information access.

Document Content
Matched Section
Section: Higher levels of assurance are required for protection, retention, and lifecycle management of audit logs.
Content: Higher levels of assurance are required for protection, retention, and lifecycle management of audit logs, adhering to applicable legal, statutory or regulatory compliance obligations.
AI Justification
The mention of audit logs and the need for higher levels of assurance for their protection aligns with the requirement to define audit events.

Document Content
Matched Section
Section: System Development Life Cycle
Content: A system development life cycle process provides the foundation for the successful development, implementation, and operation of organizational systems. The integration of security and privacy considerations early in the system development life cycle is a foundational principle of systems security engineering and privacy engineering.
AI Justification
The text discusses the importance of integrating security and privacy considerations into the system development life cycle, which aligns directly with the principles outlined in SA-3.

Document Content
Matched Section
Section: Security Engineering Principles
Content: The security engineering principles in SA-8 help individuals properly design, code, and test systems and system components.
AI Justification
The text mentions the role of security engineering principles in designing, coding, and testing systems, which aligns with the objectives of SA-8.

Document Content
Matched Section
Section: Control ID Security Control Name Requirements
Content: Security Control Name Requirements NIST CSF NIST SP 800-53 CCC Change Control & Configuration Management Policies and procedures should be established, and supporting business processes and technical measures implemented, to ensure the development and/or acquisition of new data, physical or virtual applications, infrastructure network, and systems components, or any corporate, operations and/or data center facilities have been pre-authorized by the organization’s business leadership or other accountable business role or function.
AI Justification
The text discusses the derivation of security and privacy functional requirements and their importance in the system development life cycle, which aligns with control SA-4.

Document Content
Matched Section
Section: System & Services Acquisition | Security Engineering Principles
Content: Systems security and privacy engineering principles are closely related to and implemented throughout the system development life cycle (see SA-3). Organizations can apply systems security and privacy engineering principles to new systems under development or to systems undergoing upgrades.
AI Justification
The text discusses the implementation of systems security and privacy engineering principles throughout the system development life cycle, which aligns with the control's focus on applying these principles to develop secure systems.

Document Content
Matched Section
Section: Management
Content: Keys should have identifiable owners (binding keys to identities) and there should be key management policies. Policies and procedures should be established, and supporting business processes and technical measures implemented, for the use of encryption protocols for protection of sensitive data in storage (e.g., file servers, databases, and end-user workstations), data in use (memory), and data in transmission (e.g., system interfaces, over public networks, and electronic messaging) as per applicable legal, statutory, and regulatory compliance obligations.
AI Justification
The text discusses the need for key management policies and procedures, which aligns with the requirements for cryptographic key management as outlined in SC-12.

Document Content
Matched Section
Section: Management of keys and key management policies
Content: Keys should have identifiable owners (binding keys to identities) and there should be key management policies. Policies and procedures should be established, and supporting business processes and technical measures implemented, for the use of encryption protocols for protection of sensitive data in storage (e.g., file servers, databases, and end-user workstations), data in use (memory), and data in transmission (e.g., system interfaces, over public networks, and electronic messaging) as per applicable legal, statutory, and regulatory compliance obligations.
AI Justification
The chunk discusses the use of encryption protocols for the protection of sensitive data, which aligns with the purpose of SC-13 regarding cryptography.

Document Content
Matched Section
Section: Governance and Enterprise Risk Management
Content: Defined defines the roles and responsibilities for organizational risk management between a cloud provider and a cloud customer
AI Justification
The text discusses the relationships and responsibilities between cloud providers and customers, which aligns with the control's focus on managing risks associated with external system services.