Skip to main content

NIST Special Publication 800-53 AI breakdown

NIST Security Controls Implementation Guide (Excerpt)

ThisThe responsefollowing includestable an excerpt ofoutlines key NIST security controls from SP 800-53 with practical implementation guidance. For a comprehensive list, refer to the full publication:guidance:

Information System Limitprivilegeprinciplesusingaccess control lists or role-based access controls.
  • |
  • log storage location.
  • AU-2:
  • Store
  • AU-3:
  • AuditRecordContent
  • CA-1:
  • ChangeControl| systems,applications,orconfigurations; |

    Media

    Protection locations physical access based on need-to-know principles.
  • MA-3: Transmission Protection | Encrypt sensitive data transmitted over networks, especially when leaving the organization's environment.
  • MA-4: Removable Media Protection | Encrypt and securely store sensitive information on removable media; restrict access to authorized personnel only.
  • Personnel Security (PS)

    • PS-1: Background Investigations | Conduct thorough background investigations for employees and contractors with system access privileges.
    • PS-2: Personnel Screening |
    includingperiodicreinvestigationas | Implement policiesto secure workstations, laptops, wireless access
  • SC-16:
  • allAcquisition(SA)
    • SA-1:
    • Incorporate duringsystemdevelopmentor
      Control IDControl TitleControl CategoryPlain English Implementation
      AC-1 - Access Control (AC)Policy
        and
      • AC-1:Procedure
      Access |Controls Develop a formal access control policy, including least privilege principle. Define and enforce rules for user access rights based on need-to-knowroles and leastresponsibilities.
      AC-2: - Identification and Authentication Access ControlsImplement multifactor authentication (password + token/biometric) for all users, especially administrators;administrators. regularlyRegularly review and update authentication methods.methods to

      ensure they remain secure.

      AC-3 - Access EnforcementAccess ControlsEnforce access control policies via automated tools or manual verification. Use access certification processes periodically.
      AC-4 - Audit Record ContentAudit and AccountabilityLog security-relevant events such as login attempts, changes, and system modifications. Store logs securely with configured retention policies.
      AC-5 - Transmission SecurityTransmission SecurityEncrypt sensitive data during transmission using appropriate cryptographic protocols (AU)e.g.,
        TLS/SSL).
      AU-1: - Audit EventsPolicy |and ConfigureProcedureAudit and AccountabilityDevelop a formal audit policy, outlining frequency, scope, and methods for conducting audits.
      AU-2 - Audit Event Collection and TransmissionAudit and AccountabilityImplement mechanisms to collect and transmit audit logs securely to recordan appropriate storage location.
      AU-3 - Audit Record ContentAudit and AccountabilityLog security-relevant events.events Definelike alogin attempts, changes, and system modifications. Store logs securely with configured retention periodpolicies.
      AU-4 - Audit Processing and secureAnalysis Audit Retentionand |Accountability Use automated tools or manual processes to analyze audit records for anomalies and potential threats.
      AU-5 - Audit Report Generation and DistributionAudit and AccountabilityGenerate periodic reports summarizing audit findings, distributing them to appropriate stakeholders.
      MA-2 - Media ProtectionMedia SecurityEncrypt data on removable media, store it in secured locations, and limit access to authorized personnel.
      MA-3 - Removable/Portable Media ControlMedia SecurityLimit the use of removable/portable media by implementing policies and procedures for approval, storage, and access controls.
      MA-4 - Media ProtectionMedia SecurityEncrypt data on removable media, store it in secured locations, and limit access to authorized personnel.
      PS-1 - Personnel ScreeningPersonnel SecurityImplement a sufficientcomprehensive durationpersonnel screening program that includes background checks for employees and contractors.
      PS-2 - Personnel Background InvestigationPersonnel SecurityConduct periodic background investigations on personnel with access to sensitive information or systems.
      PS-3 - Personnel Access ReviewPersonnel SecurityPeriodically review personnel security clearances, access rights, and overall suitability for their roles.
      PL-1 - Position-Specific TrainingPrivacy ControlsProvide position-specific training on privacy requirements and responsibilities to employees who handle sensitive information.
      PL-2 - Incident Response PlanPrivacy ControlsEstablish a plan to respond to privacy incidents, including procedures for containment, notification, and mitigation.
      PL-3 - Notification of Privacy BreachesPrivacy ControlsDevelop procedures for notifying affected parties in case of a privacy breach or data exfiltration event.
      PL-4 - Data MinimizationPrivacy ControlsLimit the collection and retention of personal information to what is necessary for organizational purposes.
      PL-5 - RetentionPrivacy ControlsDefine and implement data retention periods based on legal, regulatory, or organizationalbusiness requirements.
      PL-6 |- LogDeletion detailedof Unnecessary Personal InformationPrivacy ControlsEstablish processes for secure deletion of personal information aboutwhen security-relatedit events,is no longer needed.
      SI-1 - System DevelopmentSystem DevelopmentImplement a formal system development process with security controls integrated into each phase, including timestamps,planning, userdesign, identifiers, actions performed,coding, and affectedtesting.
      SI-2 - Supply Chain Risk ManagementSystem DevelopmentAssess potential risks in the supply chain for hardware, software, or services, and take appropriate mitigations to protect against threats.
      SI-3 - Data IntegrityData IntegrityImplement mechanisms to ensure data integrity, including checksums, hashes, and digital signatures for critical data.
      SI-4 - System MaintenanceSystem MaintenanceEstablish regular software updates, patch deployments, and system components.monitoring with

      Configurationclear Managementincident (CA)

      response
        procedures.
      SI-5 - Organizational Security PolicySystem MaintenanceDevelop proceduresa formal security policy that addresses organizational roles, responsibilities, and expectations for managingsystem changesmaintenance toactivities.
      SI-6 include- impactSecurity Assessment and AuthorizationSystem MaintenanceConduct regular security assessments and testingauthorization requirements.processes
    • CA-2:to validate ongoing suitability of systems and components.
    • SI-7 - Configuration Management Plan System EstablishMaintenanceDevelop a formal configuration management plan withthat standardizedcovers baselines,versioning, change controlcontrol, and impact assessment for system configurations.
      CM-1 - Identification of ContentControlled Access InformationCategorize information based on sensitivity and apply appropriate protection controls according to its classification level.
      CM-2 - ClassificationControlled Access InformationImplement a formal process for classifying information based on its sensitivity and potential impact if disclosed or compromised.
      CM-3 - SafeguardingControlled Access InformationApply safeguards commensurate with the classification level of controlled access information (e.g., encryption, access controls).
      CM-4 - DistributionControlled Access InformationRestrict distribution and sharing of controlled access information according to its classification level and organizational need-to-know.
      CM-5 - Monitoring and ReportingControlled Access InformationEstablish mechanisms for monitoring access and use of controlled access information, including auditing and reporting capabilities.
      CM-6 - Audit Record RetentionControlled Access InformationPreserve audit records related to controlled access information in secure storage, with defined retention periods based on legal, regulatory, or business requirements.
      CM-7 - System Security PlanControlled Access InformationDevelop a system security plan that addresses protection of controlled access information across the system lifecycle.
      CA-1 - Identification and AuthenticationConfiguration ManagementImplement strong identification and authentication mechanisms for all users accessing systems and data.
      CA-2 - Configuration ManagementConfiguration ManagementEstablish a formal configuration management program with version control, change management, and regular audits. Set baseline configurations and monitor for deviations.
      CA-3 - Configuration ControlConfiguration ManagementImplement controls to manage changes in system configurations, including approval processes, review boards, and documentation.
      CA-4 - Identification and Authentication of DevicesDevice ManagementEnsure devices connecting to systems are authenticated and authorized according to organizational policies.
      MA-1 - Media Protection ServiceMedia SecurityEstablish a media protection service that includes encryption, access controls, and secure disposal processes for removable/portable media.
      SC-1 - Incident Response PlanSystem Architecture Design and ImplementationDevelop an incident response plan outlining procedures for containing, eradicating, and recovering from security incidents.
      SC-2 - Incident Response TeamSystem Architecture Design and ImplementationIdentify a formal incident response team with defined roles and responsibilities to manage potential security incidents.
      SC-3 - Communication PlanSystem Architecture Design and ImplementationEstablish a communication plan for disseminating information regarding security incidents, both internally and externally as needed.
      SC-4 - Incident Response PolicySystem Architecture Design and ImplementationDevelop an incident response policy that defines the organizational approach to responding to security incidents, including escalation procedures.
      SC-5 - Incident Response CoordinationSystem Architecture Design and ImplementationDefine coordination processes for engaging internal and external stakeholders (e.g., law enforcement, vendors) during a security incident.
      SC-6 - Information SharingSystem Architecture Design and ImplementationDevelop formal mechanisms for sharing information related to security threats and incidents with trusted partners or organizations.
      SC-7 - Incident Response MetricsSystem Architecture Design and ImplementationDefine metrics for evaluating the effectiveness of security incident response efforts, including response time, containment efficiency, and recovery speed.
      SI-1 - System DevelopmentSystem Architecture Design and ImplementationImplement a formal system development process with security controls integrated into each phase, including planning, design, coding, and testing.
      SI-2 - Supply Chain Risk ManagementSystem Architecture Design and ImplementationAssess potential risks in the supply chain for hardware, software, or services, and take appropriate mitigations to protect against threats.
      SI-3 - Data IntegritySystem Architecture Design and ImplementationImplement mechanisms to ensure data integrity, including checksums, hashes, and digital signatures for critical data.
      SI-4 - System MaintenanceSystem Architecture Design and ImplementationEstablish regular software updates, patch deployments, and system monitoring with clear incident response procedures.
      SC-8 - Software Component VerificationSystem Architecture Design and ImplementationVerify the integrity of third-party software components by validating cryptographic signatures or hashes before deployment.
      PR-1 - Publicly Disclosed VulnerabilitiesProgram ManagementImplement a process for identifying, tracking, and prioritizing remediation efforts for publicly disclosed vulnerabilities affecting organizational systems.
      PR-2 - Privately Disclosed VulnerabilitiesProgram ManagementEstablish procedures for receiving, evaluating, and responding to privately disclosed vulnerabilities by vendors or researchers.
      PR-3 - System InventoryProgram ManagementMaintain an up-to-date inventory of all systems within the organization's environment, including hardware, software, and firmware configurations.
      PL-1 - Privacy Impact AssessmentPrivacy ControlsConduct privacy impact assessments for new projects or initiatives to identify potential privacy risks and mitigations before implementation.
      PL-2 - Privacy Policies and PracticesPrivacy ControlsEstablish formal privacy policies and practices that define organizational expectations regarding collection, use, retention, and disclosure of personal information.
      PL-3 - Data MinimizationPrivacy ControlsLimit the collection and retention of personal information to what is necessary for organizational purposes.
      PL-4 - RetentionPrivacy ControlsDefine and implement data retention periods based on legal, regulatory, or business requirements.
      PL-5 - Deletion of Unnecessary Personal InformationPrivacy ControlsEstablish processes for secure deletion of personal information when it is no longer needed.
      CA-3 - Configuration ControlConfiguration ManagementImplement controls to manage changes in system configurations, including approval processes, review boards, and documentation.
      CM-1 - Identification of ContentControlled Access InformationCategorize information based on sensitivity and apply appropriate protection controls according to its classification level.
      CM-2 - ClassificationControlled Access InformationImplement a formal process for classifying information based on its sensitivity and potential impact if disclosed or compromised.
      CM-3 - SafeguardingControlled Access InformationApply safeguards commensurate with the classification level of controlled access information (e.g., encryption, access controls).
      CM-4 - DistributionControlled Access InformationRestrict distribution and sharing of controlled access information according to its classification level and organizational need-to-know.
      CM-5 - Monitoring and ReportingControlled Access InformationEstablish mechanisms for monitoring access and use of controlled access information, including auditing and reporting capabilities.
      CM-6 - Audit Record RetentionControlled Access InformationPreserve audit records related to controlled access information in secure storage, with defined retention periods based on legal, regulatory, or business requirements.
      CM-7 - System Security PlanControlled Access InformationDevelop a system security plan that addresses protection of controlled access information across the system lifecycle.
      PL-6 - Data SharingPrivacy ControlsEstablish formal processes for sharing personal information with third parties while ensuring compliance with legal, regulatory, or contractual obligations.
      SC-9 - Information System Component Security PlanSystem Architecture Design and ImplementationDevelop a security plan for each critical system component, including security controls, risk mitigations, and monitoring mechanisms.strategies.
      SI-8 - System Development ProcessSystem Architecture Design and ImplementationImplement a formal system development process that includes security considerations at every stage, from initial planning through deployment and maintenance.
      SC-10 - Incident Response Plan UpdateSystem Architecture Design and ImplementationRegularly update the incident response plan to address emerging threats, new technologies, or organizational changes.
      PR-4 - Vulnerability ScanningProgram ManagementImplement a program of regular vulnerability scanning across organizational systems to identify potential security weaknesses.
      PL-7 - Privacy Impact Assessment UpdatePrivacy ControlsPeriodically review and update privacy impact assessments as system changes, new technologies are adopted, or regulatory requirements evolve.
      CA-4 - Identification and Authentication of DevicesDevice ManagementEnsure devices connecting to systems are authenticated and authorized according to organizational policies, including endpoint security configurations and access controls.
      CA-5 - Security Technical Implementation GuidesConfiguration ManagementUtilize formal security technical implementation guides (MA)STIGs)
        or
      • MA-1:other Datatechnical Sanitizationstandards |to Implementenforce proceduresconsistent configuration settings across the organization's system landscape.
      SC-11 - Network Security PlanningSystem Architecture Design and ImplementationDevelop a network security plan that addresses secure design, segmentation, and monitoring of organizational networks.
      SI-9 - System Development Life Cycle Methodology SelectionSystem Architecture Design and ImplementationSelect an established system development life cycle methodology (e.g., Agile, Waterfall) to provide a structured approach for securelymanaging removingsystem datadevelopment fromprojects mediawithin uponthe endorganization.
      PR-5 - Automated Indicators of useCompromiseProgram ManagementImplement automated systems or disposalprocesses for detecting indicators of compromise (IOCs) across organizational networks and endpoints to facilitate rapid response to security incidents.
      SC-12 - Network Configuration MonitoringSystem Architecture Design and ImplementationEstablish monitoring mechanisms to track changes in network configurations, including access control lists, routing tables, and firewall rules.
      CA-6 - Access EnforcementIdentification and AuthenticationImplement access enforcement controls at all system entry points, including firewalls, routers, and application gateways, to ensure adherence to the principle of least privilege (PoLP).
      SC-13 - Network Segmentation PlanningSystem Architecture Design and ImplementationDevelop a formal plan for network segmentation that addresses logical isolation and access controls between critical system components and sensitive data.
      SI-10 - System Development Life Cycle Methodology TrainingSystem Architecture Design and ImplementationProvide training to development teams on the selected system development life cycle methodology, ensuring consistent application across projects.
      PR-6 - Supply Chain Risk ManagementProgram ManagementImplement a supply chain risk management process that evaluates potential risks associated with third-party vendors, software components, or services used within organizational systems.
      CA-7 - Wireless Access ControlsIdentification and AuthenticationEstablish access control measures for wireless network infrastructure to prevent unauthorized access.access,
    • MA-2:ensuring Physicalencryption Mediaand Protectionauthentication |mechanisms Store removable mediaare in secureplace.
    • SC-14 - Network Security MonitoringSystem Architecture Design and limitImplementation Implement ongoing monitoring of organizational networks to detect anomalous or malicious activities that may indicate a security clearances,incident.
      SI-11 needed.-
    • PS-3:System SecurityDevelopment EducationLife Cycle Methodology Adaptation
    • System Architecture Design and TrainingImplementation Regularly Provide regular training on information security policies, best practices,review and risksadapt associatedthe withselected personnelsystem activities.development
    • PS-4:life Separationcycle methodology to accommodate new technologies, emerging threats, or organizational requirements.
    • PR-7 - Automated Vulnerability Scanning for Host SystemsProgram ManagementImplement automated vulnerability scanning of Dutieshost |systems Ensurewithin criticalthe tasksorganization's are divided among multiple individualsenvironment to prevent misuse or unauthorized actions.
    • PS-5: Information System Access Monitoring | Monitor user activity for detecting anomalous behavior indicatingidentify potential security incidents.
    • PS-6: Workforceweaknesses and prioritize remediation efforts.
    • CA-8 - Media Protection ServiceDevice ManagementEstablish a media protection service that includes encryption, access controls, and secure disposal processes for removable/portable media used across the organization's system landscape.
      SC-15 - Network Traffic AnalysisSystem Architecture Design and ImplementationImplement network traffic analysis capabilities to identify abnormal or malicious patterns within organizational network communications.
      PR-8 - Third-Party Risk ManagementProgram ManagementEstablish a third-party risk management process that assesses the security posture of critical vendors, service providers, and software components used within organizational systems.
      CA-9 - Remote Access ControlsIdentification and AuthenticationImplement controls to secure remote access mechanisms, including virtual private networks (VPNs), remote desktop protocols, or other forms of remote connectivity.
      SC-16 - Security Monitoring PlanningSystem Architecture Design and ImplementationDevelop a security monitoring plan that addresses the organizational approach for collecting, analyzing, and acting upon security-related data from various sources across the system landscape.
      SI-12 - System Development Life Cycle Methodology ReviewSystem Architecture Design and ImplementationPeriodically review the selected system development life cycle methodology to ensure continued relevance and alignment with organizational objectives, security standards, and emerging technologies.
      PR-9 - Security Incident Response Plan UpdateProgram ManagementRegularly update the security incident response plan to reflect lessons learned from past incidents, changes in threat landscape, or evolving organizational requirements.
      CA-10 - Physical Access ControlsIdentification and AuthenticationImplement physical access control measures, including badge systems, biometric authentication, or mantrap facilities, to restrict unauthorized individuals' entry into critical system areas.
      SC-17 - Security Monitoring for Virtualization and Cloud ServicesSystem Architecture Design and ImplementationEstablish security monitoring capabilities specifically tailored for virtualized environments and cloud services, ensuring consistent application of organizational security policies across diverse infrastructure types.
      PR-10 - Automated Threat Intelligence SharingProgram ManagementImplement automated systems or processes for sharing threat intelligence with trusted partners, industry groups, or public repositories to enhance the overall security posture of organizational systems.
      CA-11 - Media Protection Service for Virtual and Cloud SystemsDevice ManagementExtend media protection services to include virtualized environments and cloud services, ensuring encryption, access controls, and secure disposal processes are in place for digital artifacts stored or transmitted across these platforms.
      SC-18 - Security Monitoring for Third-Party ServicesSystem Architecture Design and ImplementationImplement security monitoring capabilities specifically designed for third-party services and platforms integrated into the organization's system landscape to ensure ongoing compliance with service level agreements (SLAs) and security standards.
      SI-13 - System Development Life Cycle Methodology DocumentationSystem Architecture Design and ImplementationDevelop and maintain formal documentation of the selected system development life cycle methodology, including process workflows, templates, and training materials for organizational teams.
      PR-11 - Automated Vulnerability Scanning for Host Systems in Virtual EnvironmentsProgram ManagementImplement automated vulnerability scanning tailored to virtualized host systems within the organization's environment, ensuring comprehensive security assessment across diverse infrastructure types.
      CA-12 - Mobile Device Security |Controls Identification and proceduresAuthentication Establish mobile devices used by personnel accessing sensitive information.
    • PS-7: Personnel Screening | Conduct comprehensive background checks for employees and contractors with access to critical systems or data.
    • PS-8: Continuous Monitoring | Establish ongoing monitoring of personnel activities, system configurations, anddevice security events for early detection of anomalies.
    • System Maintenance (SI)

      • SI-1: Incident Response Plan | Develop detailed incident response plans,controls, including roles, responsibilities, communication protocols, and recovery procedures.
      • SI-2: Information Security Continuous Monitoring | Implement ongoing monitoring to assess system vulnerabilities, detect security events, and ensure compliance with security policies.
      • SI-3: System Updates | Regularly apply software updates and patches to systems based on vendor recommendations or security advisories.
      • SI-4: Maintenance Schedule | Establish a maintenance schedule that includes routine checks, testing, and system upgrades to support evolving security requirements.
      • SI-5: Information Security Risk Assessments | Conduct periodic risk assessments to identify potential vulnerabilities and prioritize remediation efforts based on risk levels.
      • SI-6: System Maintenance | Regularly update software, apply patches, monitor system performance, and conduct security audits following established schedules and procedures.

      System Development (SC)

      • SC-1: Security Planning | Incorporate security planning into the system development lifecycle, considering threats, vulnerabilities, and potential impacts.
      • SC-2: System Design Documentation | Prepare detailed documentation of secure design principles and components, including architecture diagrams, threat models, and countermeasures.
      • SC-3: Information Input Validation | Validate and sanitize input data at multiple layers (system, application, network) to prevent injection attacks or other untrusted data exploits.
      • SC-4: Data Sanitization | Securely remove data from systems and media upon end of use or disposal using approved techniques such as cryptographic erasure or degaussing.
      • SC-5: Information System Security Assessment | Perform comprehensive security assessments (including penetration tests) to identify vulnerabilities and validate implemented countermeasures.
      • SC-6: Test Security Functions | Validate the functionality of security controls through regular testing, including simulated attacks or adversarial simulations.
      • SC-7: Software Integrity | Protect software components using digital signatures, checksums, and other mechanisms to prevent unauthorized modifications.
      • SC-8: Network Segmentation | Implement network segmentation to isolate critical systems, reduce attack surfaces, and limit lateral movement by potential threat actors.
      • SC-9: Non-Broadcast Distribution | Use secure channels or protocols for distributing sensitive information within internal networks, avoiding unprotected broadcast mechanisms.
      • SC-10: Network Traffic Encryption | Encrypt network traffic, especially when transmitting sensitive data between systems or across public networks.
      • SC-11: Wireless Access Control | Implement strong controls around wireless access, including authentication, encryption, and user authorization for wireless network access points.
      • SC-12: Wireless Device Management | Manage the lifecycle of wireless devices (including mobile phones, laptops) with encryption, remote wipe capabilities, and access restrictionscontrol based on need-to-know.
      • SC-13: Mobile Device Security | Secure mobile computing devices through strong authentication, encrypted storage, and application controlsmechanisms, to protect sensitive data.
      • data
      • accessed or stored on mobile devices used within the organization's system landscape.
      SC-14:19 Wireless- AccessData PointsCenter |Network DeploySegmentation System Architecture Design and ImplementationImplement network segmentation strategies specifically tailored for data center environments, addressing logical isolation and access pointscontrols securelybetween withcritical strong authentication, encryption,systems and limitedsensitive physicaldata.
      PR-12 - Automated Security Orchestration and ResponseProgram ManagementImplement automated security orchestration and response capabilities to streamline the detection, analysis, and remediation of security incidents across organizational systems and technologies.
      SI-14 - System Development Life Cycle Methodology Training for managementProject consoles.Managers System NetworkArchitecture EncryptionDesign |and EncryptImplementation Provide network traffic, especially when transmitting sensitive data outside secure facilities.
    • SC-28: Information Input Validation | Implement robust input validation mechanismstraining to preventproject injectionmanagers attacks (SQL, command, etc.) by sanitizing and verifying user inputs against predefined rules.
    • SC-30: Security Testing | Conduct regular security testing throughouton the selected system development lifecycle,life includingcycle unitmethodology, tests,ensuring integrationconsistent tests, penetration tests,application and redunderstanding teamof exercises.
    • methodologies across

      Systemprojects and Servicesteams.

      PR-13 Risk- Automated Security Configuration ManagementProgram ManagementImplement automated security configuration management processes that enforce organizational security policies and standards across diverse systems and environments, reducing manual errors and improving consistency.
      CA-13 - Media Protection Service for ContractorsMobile |Devices Device informationManagementEstablish a media protection service specifically designed for mobile devices used within the organization's system landscape, ensuring encryption, access controls, and secure disposal processes are in place for digital artifacts accessed or stored on these devices.
      SC-20 - Security Monitoring for Cloud ServicesSystem Architecture Design and ImplementationImplement security riskmonitoring managementcapabilities practicesspecifically intailored contractorfor agreementscloud toservices ensureand platforms integrated into the organization's system landscape, ensuring ongoing compliance with organizationalservice policieslevel agreements (SLAs) and regulatorysecurity requirementsstandards.
      acquisition

      Plain processes.English

    • SA-2: Security AssessmentExplanation of Third-PartyNIST Products/ServicesControls:

      | Evaluate the security of third-party products or services before integration into your environment using formal assessment methodologies and reputable certification programs.
      1. SA-3:AC-2: ContractEncrypt Language for Information System Security | Include detailed information security requirementsData in contract language to ensure vendors understand and adhere to established security standards during product development or service delivery.

      2. SA-4Transit: Contractor Personnel Security | Ensure contractors follow organizational security policies, undergo necessary background checks, and receive appropriate training to maintain secure handling of sensitive data and systems.
      3. System and Communications Protection (SP)

        • SP-1:Use Mediaencryption Protectionprotocols |such as Transport Layer Security (TLS) or Secure mediaSockets usedLayer for the storage and transmission of information with encryption and physical protection measures against unauthorized access or tampering.
        • SP-2: Information in Transit Protection | Implement strong cryptographic protocols(SSL) to protect data whileduring ittransmission, isensuring transmittedsensitive overinformation networks,remains especiallyconfidential whenand leavingsecure thefrom organization'sunauthorized environment.access.
      4. SP-3: Information in Process Protection | Safeguard information during processing within computing systems using encryption and access controls that limit exposure based on least privilege principles.

      5. SP-4: Wireless Security |AC-5: Implement secure configurations for wireless devices and networks to protect against eavesdropping, unauthorized access, or data leakage.
      6. SP-5:a Public Key Infrastructure (PKI)

        Protection
          |
        • Establish Protecta PKI componentsframework fromthat compromiseincludes throughcertificate strongauthorities, authenticationregistration mechanisms, regular audits,authorities, and securekey storagemanagement practices.processes to securely manage digital certificates for identity verification, data encryption, and nonrepudiation in electronic transactions.

        System

      7. and
      8. Communications

        AU-2: ProtectionControl (SC)

      Nonpublic Facing Ports

      • SC-7:Implement Networkaccess Segmentationcontrols |and Dividefirewall networks into smaller segmentsrules to isolaterestrict criticalunauthorized access to nonpublic facing ports on systems and limitdevices within the attack surface by restricting lateral movement betweenorganization's network zones.perimeter, ensuring only authorized traffic can traverse these communication channels.
    • SC-8AU-5: Protect System Components from Unintended Modification:

      Non-Broadcast
        Distribution
      • Utilize |file Employintegrity monitoring tools, access controls, and configuration management practices to detect unauthorized changes to system components, software, and configurations, ensuring the security and stability of organizational systems.
    • BM-3: Implement a Data Backup and Restore Plan

      • Develop and maintain a comprehensive data backup plan that includes regular backups of critical data assets, secure storage, and a tested restore process to minimize the impact of potential data transmission methods that avoid broadcast mechanisms, such as unicastloss or multicastsystem protocolsfailures on organizational operations.
    • DM-5: Implement an Access Request and Approval Process

      • Establish formal access request and approval processes for granting user access to systems, resources, and data within the organization's environment, ensuring proper authorization is provided based on job responsibilities and security clearance levels.
    • IA-2: Maintain System Inventory and Documentation

      • Track and document all hardware, software, firmware, and configuration settings within the organization's system landscape to ensure accurate asset management, facilitating efficient maintenance, upgrades, and incident response efforts.
    • MP-10: Implement Automated Tools for Software Update Management

      • Utilize automated tools and processes to manage software updates across organizational systems, ensuring timely installation of security patches, bug fixes, and feature enhancements while minimizing potential disruptions or errors in the update process.
    • PM-4: Protect Against Unauthorized Data Transfer

      • Implement access controls, network segmentation, and monitoring mechanisms to prevent unauthorized data transfer within the organization's system landscape, safeguarding sensitive information exchange within internal networks.
      • SC-10: Network Traffic Encryption | Encrypt all network traffic, especially when transmitting sensitive data outside secure facilities to prevent eavesdropping and interception by adversaries.
      • SC-24: Communication Authentication | Implement strong authentication mechanisms between communicating systems to verify their identities and prevent man-in-the-middle attacks or impersonation attempts.

      Personnel Security (PS)

      • PS-1: Background Investigations | Conduct comprehensive background checks on employees and contractors with access to critical information systems, ensuring they meet organizational standards for trustworthiness.
      • PS-2: Personnel Screening | Implement continuous monitoring of security clearances, including periodic reinvestigation as needed to ensure ongoing eligibility based on updated investigative findings or changed circumstances.
      • PS-3: Security Education and Training | Provide regular information security awareness training for employees to enhance their understanding of threats, best practices, and organizational policies that affect their roles.
      • PS-4: Separation of Duties | Implement job role definitions and access controls that enforce separation of duties principle, preventing any single individual from possessing the ability to perform critical security-impacting activities without oversight or approval.
      • PS-5: Information System Access Monitoring | Monitor user activity within information systems for detecting anomalous behavior indicative of potential insiderexfiltration threats or unauthorized access attempts.
      • PS-6: Workforce and Mobile Device Security | Develop policies and procedures to secure workstations, laptops, and mobile devices used by employees accessing sensitive information, including encryption, password protections, and physical safeguards against theft or loss.
      • PS-7: Personnel Screening | Conduct thorough background checks on all personnel with access to critical systems or data, verifying their credentials, references, and eligibility for assigned security clearances as required by organizational policies and regulatory standards.
      • PS-8: Continuous Monitoring | Implement ongoing surveillance of personnel activities, system configurations, and security events to identify emerging threats or deviations from established security baselines proactively.

      Incident Response (IR)

      • IR-1: Planning for Information Systems Incidents | Develop a comprehensive incident response plan detailing roles, responsibilities, communication protocols, and recovery procedures specific to various types of cybersecurity events affecting information systems.
      • IR-2: Security Assessments of Incident Response Capabilities | Regularly test the effectiveness of incident response plans through exercises or simulations that cover different scenarios and potential vulnerabilities in organizational preparedness and response capabilities.
      • IR-3: Security Assessment of Incident Handling Procedures | Evaluate the thoroughness of procedures for documenting, investigating, and responding to security incidents to ensure they meet regulatory requirements and best practices for effective incident management.
      • IR-4: Incident Response Team Training and Exercises | Provide regular training sessions for incident response teams to enhance their skills in threat detection, containment, eradication, recovery, and post-incident analysis, supplemented by periodic simulations of realistic cybersecurity events to validate readiness and identify improvement areas.
      • IR-5: Information System Incidents | Develop procedures for detecting, reporting, and responding to security incidents affecting information systems, including escalation paths and communication strategies for various stakeholders involved in managing the event.
      • IR-6: Media Protection During Incident Response | Implement measures to safeguard sensitive media (physical or digital) during the course of an incident response effort, ensuring data integrity, confidentiality, and availability while preventing unauthorized access or tamperingattempts by malicious actors or inadvertentinsider disclosures.
      • IR-7: Media Sanitization | Establish protocols for securely removing data from media used during incident response activities, following industry best practices such as cryptographic erasure techniques to ensure information cannot be recovered by unauthorized parties subsequently gaining access to the storage devices.threats.
    • RA-5: Perform Regular System Vulnerability Scans

      • Conduct regular vulnerability assessments of organizational systems and applications using automated scanning tools to identify potential weaknesses in security configurations, software versions, or patch levels, enabling proactive remediation efforts to address identified vulnerabilities.
    • These plain English explanations provide practical guidance for implementing the respective NIST security controls, facilitating a clear understanding of the necessary actions to achieve compliance and enhance organizational cybersecurity posture.