compliance_regime_control (view) Content

  • Start Row: 0
  • Rows per Page: 50
  • Total Rows: 291
  • Current Page: 1
  • Total Pages: 6

Asset Management Approved Technologies Mechanisms exist to maintain a current list of approved technologies (hardware and software). Does the organization maintain a current list of approved technologies (hardware and software)? FII-SCF-AST-0001.4 A.03.04.08.c NIST
Asset Management Asset Inventories Mechanisms exist to perform inventories of technology assets that: ▪ Accurately reflects the current systems, applications and services in use; ▪ Identifies authorized software products, including business justification details; ▪ Is at the level of granularity deemed necessary for tracking and reporting; ▪ Includes organization-defined information deemed necessary to achieve effective property accountability; and ▪ Is available for review and audit by designated organizational personnel. Does the organization perform inventories of technology assets that: ▪ Accurately reflects the current systems, applications and services in use; ▪ Identifies authorized software products, including business justification details; ▪ Is at the level of granularity deemed necessary for tracking and reporting; ▪ Includes organization-defined information deemed necessary to achieve effective property accountability; and ▪ Is available for review and audit by designated organizational personnel? FII-SCF-AST-0002 164.310(d)(2)(iii) US HIPAA
Asset Management Asset Inventories Mechanisms exist to perform inventories of technology assets that: ▪ Accurately reflects the current systems, applications and services in use; ▪ Identifies authorized software products, including business justification details; ▪ Is at the level of granularity deemed necessary for tracking and reporting; ▪ Includes organization-defined information deemed necessary to achieve effective property accountability; and ▪ Is available for review and audit by designated organizational personnel. Does the organization perform inventories of technology assets that: ▪ Accurately reflects the current systems, applications and services in use; ▪ Identifies authorized software products, including business justification details; ▪ Is at the level of granularity deemed necessary for tracking and reporting; ▪ Includes organization-defined information deemed necessary to achieve effective property accountability; and ▪ Is available for review and audit by designated organizational personnel? FII-SCF-AST-0002 A.03.04.10.ODP[01] A.03.04.10.a A.03.04.10.b[01] A.03.04.10.b[02] NIST
Asset Management Data Action Mapping Mechanisms exist to create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed. Does the organization create and maintain a map of technology assets where sensitive/regulated data is stored, transmitted or processed? FII-SCF-AST-0002.8 A.03.04.11.a[01] A.03.04.11.a[02] A.03.04.11.a[03] A.03.04.11.b[01] A.03.04.11.b[02] NIST
Asset Management Re-Imaging Devices After Travel Mechanisms exist to re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. Does the organization re-image end user technology (e.g., laptops and mobile devices) when returning from overseas travel to an authoritarian country with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies? FII-SCF-AST-0025 A.03.04.12.b NIST
Asset Management Removal of Assets Mechanisms exist to authorize, control and track technology assets entering and exiting organizational facilities. Does the organization authorize, control and track technology assets entering and exiting organizational facilities? FII-SCF-AST-0011 164.310(d)(1) 164.310(d)(2) US HIPAA
Asset Management Return of Assets Mechanisms exist to ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement. Does the organization ensure that employees and third-party users return all organizational assets in their possession upon termination of employment, contract or agreement? FII-SCF-AST-0010 A.03.09.02.a.03 NIST
Asset Management Secure Disposal, Destruction or Re-Use of Equipment Mechanisms exist to securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components. Does the organization securely dispose of, destroy or repurpose system components using organization-defined techniques and methods to prevent information being recovered from these components? FII-SCF-AST-0009 164.310(d)(2)(i) 164.310(d)(2)(ii) US HIPAA
Asset Management Travel-Only Devices Mechanisms exist to issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies. Does the organization issue personnel travelling overseas with temporary, loaner or "travel-only" end user technology (e.g., laptops and mobile devices) when travelling to authoritarian countries with a higher-than average risk for Intellectual Property (IP) theft or espionage against individuals and private companies? FII-SCF-AST-0024 A.03.04.12.a NIST
Asset Management Updates During Installations / Removals Mechanisms exist to update asset inventories as part of component installations, removals and asset upgrades. Does the organization update asset inventories as part of component installations, removals and asset upgrades? FII-SCF-AST-0002.1 164.310(d)(2)(iii) US HIPAA
Asset Management Updates During Installations / Removals Mechanisms exist to update asset inventories as part of component installations, removals and asset upgrades. Does the organization update asset inventories as part of component installations, removals and asset upgrades? FII-SCF-AST-0002.1 A.03.04.10.c[01] A.03.04.10.c[02] A.03.04.10.c[03] NIST
Business Continuity & Disaster Recovery Accessibility Mechanisms exist to identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster. Does the organization identify and mitigate potential accessibility problems to the alternate processing site and possible mitigation actions, in the event of an area-wide disruption or disaster? FII-SCF-BCD-0009.2 164.310(a)(2)(i) US HIPAA
Business Continuity & Disaster Recovery Alternate Processing Site Mechanisms exist to establish an alternate processing site that provides security measures equivalent to that of the primary site. Does the organization establish an alternate processing site that provides security measures equivalent to that of the primary site? FII-SCF-BCD-0009 164.310(a)(2)(i) US HIPAA
Business Continuity & Disaster Recovery Alternate Storage Site Mechanisms exist to establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information. Does the organization establish an alternate storage site that includes both the assets and necessary agreements to permit the storage and recovery of system backup information? FII-SCF-BCD-0008 164.310(a)(2)(i) US HIPAA
Business Continuity & Disaster Recovery Business Continuity Management System (BCMS) Mechanisms exist to facilitate the implementation of contingency planning controls to help ensure resilient assets and services (e.g., Continuity of Operations Plan (COOP) or Business Continuity & Disaster Recovery (BC/DR) playbooks). Does the organization facilitate the implementation of contingency planning controls to help ensure resilient assets and services (e.g., Continuity of Operations Plan (COOP) or Business Continuity & Disaster Recovery (BC/DR) playbooks)? FII-SCF-BCD-0001 164.308(a)(7)(ii)(B) 164.308(a)(7)(ii)(C) 164.310(b) US HIPAA
Business Continuity & Disaster Recovery Contingency Plan Testing & Exercises Mechanisms exist to conduct tests and/or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan. Does the organization conduct tests and/or exercises to evaluate the contingency plan's effectiveness and the organization’s readiness to execute the plan? FII-SCF-BCD-0004 164.308(a)(7)(ii)(D) US HIPAA
Business Continuity & Disaster Recovery Cryptographic Protection Cryptographic mechanisms exist to prevent the unauthorized disclosure and/or modification of backup information. Are cryptographic mechanisms utilized to prevent the unauthorized disclosure and/or modification of backup information? FII-SCF-BCD-0011.4 A.03.08.09.a A.03.08.09.b NIST
Business Continuity & Disaster Recovery Data Backups Mechanisms exist to create recurring backups of data, software and/or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs). Does the organization create recurring backups of data, software and/or system images, as well as verify the integrity of these backups, to ensure the availability of the data to satisfying Recovery Time Objectives (RTOs) and Recovery Point Objectives (RPOs)? FII-SCF-BCD-0011 164.308(a)(7)(ii)(A) 164.310(d)(2)(iv) US HIPAA
Business Continuity & Disaster Recovery Identify Critical Assets Mechanisms exist to identify and document the critical systems, applications and services that support essential missions and business functions. Does the organization identify and document the critical systems, applications and services that support essential missions and business functions? FII-SCF-BCD-0002 164.308(a)(7)(ii)(E) US HIPAA
Business Continuity & Disaster Recovery Simulated Events Mechanisms exist to incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations. Does the organization incorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations? FII-SCF-BCD-0003.1 164.308(a)(7)(ii)(D) US HIPAA
Change Management Change Management Program Mechanisms exist to facilitate the implementation of a change management program. Does the organization facilitate the implementation of a change management program? FII-SCF-CHG-0001 A.03.04.03.d[01] A.03.04.03.d[02] NIST
Change Management Configuration Change Control Mechanisms exist to govern the technical configuration change control processes. Does the organization govern the technical configuration change control processes? FII-SCF-CHG-0002 A.03.04.03.a A.03.04.03.c[01] NIST
Change Management Control Functionality Verification Mechanisms exist to verify the functionality of cybersecurity and/or data privacy controls following implemented changes to ensure applicable controls operate as designed. Does the organization verify the functionality of cybersecurity and/or data privacy controls following implemented changes to ensure applicable controls operate as designed? FII-SCF-CHG-0006 A.03.04.04.b NIST
Change Management Permissions To Implement Changes Mechanisms exist to limit operational privileges for implementing changes. Does the organization limit operational privileges for implementing changes? FII-SCF-CHG-0004.4 A.03.04.05[06] NIST
Change Management Prohibition Of Changes Mechanisms exist to prohibit unauthorized changes, unless organization-approved change requests are received. Does the organization prohibit unauthorized changes, unless organization-approved change requests are received? FII-SCF-CHG-0002.1 A.03.04.03.b[02] A.03.04.05[05] NIST
Change Management Security Impact Analysis for Changes Mechanisms exist to analyze proposed changes for potential security impacts, prior to the implementation of the change. Does the organization analyze proposed changes for potential security impacts, prior to the implementation of the change? FII-SCF-CHG-0003 A.03.04.03.b[01] A.03.04.04.a NIST
Change Management Stakeholder Notification of Changes Mechanisms exist to ensure stakeholders are made aware of and understand the impact of proposed changes. Does the organization ensure stakeholders are made aware of and understand the impact of proposed changes? FII-SCF-CHG-0005 A.03.04.11.b[01] A.03.04.11.b[02] NIST
Change Management Test, Validate & Document Changes Mechanisms exist to appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment. Does the organization appropriately test and document proposed changes in a non-production environment before changes are implemented in a production environment? FII-SCF-CHG-0002.2 A.03.04.03.c[02] NIST
Compliance Cybersecurity & Data Protection Assessments Mechanisms exist to ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements. Does the organization ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements? FII-SCF-CPL-0003 164.308(a)(8) US HIPAA
Compliance Cybersecurity & Data Protection Assessments Mechanisms exist to ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements. Does the organization ensure managers regularly review the processes and documented procedures within their area of responsibility to adhere to appropriate cybersecurity & data protection policies, standards and other applicable requirements? FII-SCF-CPL-0003 A.03.12.01 NIST
Compliance Cybersecurity & Data Protection Controls Oversight Mechanisms exist to provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership. Does the organization provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership? FII-SCF-CPL-0002 164.308(a)(8) US HIPAA
Compliance Cybersecurity & Data Protection Controls Oversight Mechanisms exist to provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership. Does the organization provide a cybersecurity & data protection controls oversight function that reports to the organization's executive leadership? FII-SCF-CPL-0002 A.03.12.03[01] A.03.12.03[03] A.03.12.03[04] NIST
Compliance Functional Review Of Cybersecurity & Data Protection Controls Mechanisms exist to regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards. Does the organization regularly review technology assets for adherence to the organization’s cybersecurity & data protection policies and standards? FII-SCF-CPL-0003.2 A.03.12.03[02] NIST
Compliance Internal Audit Function Mechanisms exist to implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes. Does the organization implement an internal audit function that is capable of providing senior organization management with insights into the appropriateness of the organization's technology and information governance processes? FII-SCF-CPL-0002.1 A.03.12.01.ODP[01] NIST
Compliance Statutory, Regulatory & Contractual Compliance Mechanisms exist to facilitate the identification and implementation of relevant statutory, regulatory and contractual controls. Does the organization facilitate the identification and implementation of relevant statutory, regulatory and contractual controls? FII-SCF-CPL-0001 164.302 164.318 164.318(a) 164.318(a)(1) 164.318(a)(2) 164.318(b) 164.318(c) 164.534 164.534(a) 164.534(b) 164.534(c) US HIPAA
Configuration Management Approved Configuration Deviations Mechanisms exist to document, assess risk and approve or deny deviations to standardized configurations. Does the organization document, assess risk and approve or deny deviations to standardized configurations? FII-SCF-CFG-0002.7 A.03.04.02.b[01] A.03.04.02.b[02] NIST
Configuration Management Automated Central Management & Verification Automated mechanisms exist to govern and report on baseline configurations of systems through Continuous Diagnostics and Mitigation (CDM), or similar technologies. Does the organization use automated mechanisms to govern and report on baseline configurations of systems through Continuous Diagnostics and Mitigation (CDM), or similar technologies? FII-SCF-CFG-0002.2 A.03.04.03.d[01] A.03.04.03.d[02] NIST
Configuration Management Baseline Tailoring Mechanisms exist to allow baseline controls to be specialized or customized by applying a defined set of tailoring actions that are specific to: ▪ Mission / business functions; ▪ Operational environment; ▪ Specific threats or vulnerabilities; or ▪ Other conditions or situations that could affect mission / business success. Does the organization allow baseline controls to be specialized or customized by applying a defined set of tailoring actions that are specific to: ▪ Mission / business functions; ▪ Operational environment; ▪ Specific threats or vulnerabilities; or ▪ Other conditions or situations that could affect mission / business success? FII-SCF-CFG-0002.9 A.03.03.02.b NIST
Configuration Management Configuration Management Program Mechanisms exist to facilitate the implementation of configuration management controls. Does the organization facilitate the implementation of configuration management controls? FII-SCF-CFG-0001 A.03.04.03.a NIST
Configuration Management Configure Systems, Components or Services for High-Risk Areas Mechanisms exist to configure systems utilized in high-risk areas with more restrictive baseline configurations. Does the organization configure systems utilized in high-risk areas with more restrictive baseline configurations? FII-SCF-CFG-0002.5 A.03.04.12.ODP[01] A.03.04.12.ODP[02] NIST
Configuration Management Explicitly Allow / Deny Applications Mechanisms exist to explicitly allow (allowlist / whitelist) and/or block (denylist / blacklist) applications that are authorized to execute on systems. Does the organization explicitly allow (allowlist / whitelist) and/or block (denylist / blacklist) applications that are authorized to execute on systems? FII-SCF-CFG-0003.3 A.03.04.08.ODP[01] A.03.04.08.a A.03.04.08.b A.03.13.13.b[03] NIST
Configuration Management Least Functionality Mechanisms exist to configure systems to provide only essential capabilities by specifically prohibiting or restricting the use of ports, protocols, and/or services. Does the organization configure systems to provide only essential capabilities by specifically prohibiting or restricting the use of ports, protocols, and/or services? FII-SCF-CFG-0003 A.03.04.02.ODP[01] A.03.04.06.d NIST
Configuration Management Periodic Review Mechanisms exist to periodically review system configurations to identify and disable unnecessary and/or non-secure functions, ports, protocols and services. Does the organization periodically review system configurations to identify and disable unnecessary and/or non-secure functions, ports, protocols and services? FII-SCF-CFG-0003.1 A.03.04.06.ODP[06] NIST
Configuration Management Reviews & Updates Mechanisms exist to review and update baseline configurations: ▪ At least annually; ▪ When required due to so; or ▪ As part of system component installations and upgrades. Does the organization review and update baseline configurations: ▪ At least annually; ▪ When required due to so; or ▪ As part of system component installations and upgrades? FII-SCF-CFG-0002.1 A.03.04.01.ODP[01] A.03.04.01.b[01] A.03.04.01.b[02] A.03.04.01.b[03] A.03.04.01.b[04] A.03.04.06.c NIST
Configuration Management Sensitive / Regulated Data Access Enforcement Mechanisms exist to configure systems, applications and processes to restrict access to sensitive/regulated data. Does the organization configure systems, applications and processes to restrict access to sensitive/regulated data? FII-SCF-CFG-0008 A.03.01.02[01] NIST
Configuration Management System Hardening Through Baseline Configurations Mechanisms exist to develop, document and maintain secure baseline configurations for technology platforms that are consistent with industry-accepted system hardening standards. Does the organization develop, document and maintain secure baseline configurations for technology platforms that are consistent with industry-accepted system hardening standards? FII-SCF-CFG-0002 A.03.01.03[01] A.03.01.16.a[03] A.03.01.16.c A.03.01.18.a[02] A.03.03.08.a[02] A.03.04.01.a[01] A.03.04.01.a[02] A.03.04.02.a[01] A.03.04.02.a[02] A.03.04.06.ODP[01] A.03.04.06.ODP[02] A.03.04.06.ODP[03] A.03.04.06.ODP[04] A.03.04.06.ODP[05] A.03.04.06.b[01] A.03.04.06.b[02] A.03.04.06.b[03] A.03.04.06.b[04] A.03.04.06.b[05] A.03.05.04[01] A.03.05.04[02] A.03.05.07.c A.03.05.07.d A.03.05.07.e A.03.05.07.f A.03.07.05.b[02] NIST
Continuous Monitoring Access by Subset of Privileged Users Mechanisms exist to restrict access to the management of event logs to privileged users with a specific business need. Does the organization restrict access to the management of event logs to privileged users with a specific business need? FII-SCF-MON-0008.2 A.03.03.08.b NIST
Continuous Monitoring Anomalous Behavior Mechanisms exist to detect and respond to anomalous behavior that could indicate account compromise or other malicious activities. Does the organization detect and respond to anomalous behavior that could indicate account compromise or other malicious activities? FII-SCF-MON-0016 A.03.14.06.b NIST
Continuous Monitoring Automated Alerts Mechanisms exist to automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications. Does the organization automatically alert incident response personnel to inappropriate or anomalous activities that have potential security incident implications? FII-SCF-MON-0001.12 A.03.03.05.b NIST
Continuous Monitoring Centralized Collection of Security Event Logs Mechanisms exist to utilize a Security Incident Event Manager (SIEM), or similar automated tool, to support the centralized collection of security-related event logs. Does the organization utilize a Security Incident Event Manager (SIEM) or similar automated tool, to support the centralized collection of security-related event logs? FII-SCF-MON-0002 A.03.03.05.ODP[01] A.03.03.05.a A.03.03.05.c[01] NIST