Archive for NIST Computer Security

You are browsing the archives of NIST Computer Security.

Rules of Behavior

Any information security policy and Site Security Plan (SSP) should contain a section known as “Rules of Behavior” that establishes appropriate use and behavior of system users and the consequences of non-compliance. From 800-100, Appendix B, FAQs: Q – What are “Rules of Behavior”? A – The rules should state the consequences of inconsistent behavior […]


Plan of Action and Milestones A POAM is a plan that describes specific measures to be taken to correct deficiences found during a security control assessment. The POAM should identify: The tasks needed to correct the deficiency The resources required to make the plan work Milestones in completing the tasks Scheduled completion dates for the […]

Incident Response

Federal agencies are required by law to report incidents to the US Computer Readiness Team (CERT) office in DHS and must have a formal incident response capability. INCIDENT RESPONSE METHODOLOGY Prepare – accumulate knowledge, resources, tools, team members and training needed to handle incident reponse. Provide feedback into other processes (patch management…) that may help […]

Contingency Plan

Contingency Plan

Policy Identify statutory or regulatory requirements Create a policy statement Get the policy statement approved Publish the policy statement Key elements of policy Roles and responsibilities Scope Resources required Training required Testing and exercises schedule Maintenance schedule Backup and storage schedule Business Impact Assessment (BIA) The BIA is a critical piece of the CP that […]

Wireless Restrictions

AC-18 WIRELESS RESTRICTIONS (NIST SP 800-53) The organization: (i) establishes usage restrictions and implementation guidance for wireless technologies; and (ii) authorizes, monitors, controls wireless access to the information system. NIST Special Publications 800-48 and 800-97 provide guidance on wireless network security. NIST Special Publication 800-94 provides guidance on wireless intrusion detection and prevention. Overview of […]

Supplementing Controls

After the baseline of security controls have gone through the tailoring process of: scoping guidance, compensating controls and organizationally defined parameters, it is possible that additional controls or enhancements may be needed in order to mitigate the risk that has been assessed. It is also possible to simple add restrictions to already existing controls. There […]

Tailoring Controls

NIST SP 800-53 sets terms and conditions for tailoring the security control baseline to organizational and operational needs.   There are three specific areas addressed as follows: Scoping Guidance Compensating Controls Organizationally Defined Parameters Scoping Guidance offers considerations on how individual security controls are applied and implemented. The following areas are discussed: Common Controls Common Controls […]

Categorization and Baseline Selection

Categorization is the process of selecting an Impact Level according to FIPS 199, which is a public law and must be adhered to. FIPS 199 sets three impact levels of HIGH, MODERATE and LOW. They are selected according to a consideration of the potential impact level on an organization if a security event jeopardizes the […]



Risk assessment report

Control Recommendations

Control Recommendations

The goal of the controls is to reduce risk to a level that is acceptable