Appendix A – Mandatory and Discretionary Controls
NIST SP 800-53 Rev 4 Control |
Implemented |
Planned | |
Access Controls | |||
AC-2 |
Account Management |
X | |
AC-3 |
Access Enforcement |
X | |
AC-5 |
Separation of Duties |
X | |
AC-6 |
Least Privilege |
X | |
AC-7 |
Unsuccessful Login Attempts |
X | |
AC-8 |
System Use Notification* |
X | |
AC-11 |
Session Lock* |
In progress | |
Awareness and Security Training | |||
AT-2 |
Security Awareness Training |
X | |
AT-2.1 |
Practical Exercises |
X | |
AT-3 |
Role-Based Security Training |
X | |
AT-4 |
Security Training Records |
X | |
Audit and Accountability | |||
AU-2 |
Audit Events |
X | |
AU-3 |
Content of Audit Records |
X | |
AU-4 |
Audit Storage Capacity |
X | |
AU-6 |
Audit Review, Analysis, and Reporting |
X | |
AU-8 |
Time Stamps |
X | |
AU-11 |
Audit Records Retention |
X | |
Security Assessment and Authorization | |||
CA-2 |
Security Assessments |
X | |
CA-3 |
System Interconnections |
X | |
CA-5 |
Plan of Action and Milestones |
X | |
CA-6 |
Security Authorization |
X | |
CA-7 |
Continuous Monitoring |
X | |
Configuration Management | |||
CM-2 |
Baseline Configuration |
X | |
CM-2.1 |
Reviews and Updates |
X | |
CM-2.3 |
Retention of Previous Configurations |
X | |
CM-3 |
Configuration Change Control |
X | |
CM-4 |
Security Impact Analysis |
X | |
CM-6 |
Configuration Settings |
X | |
CM-7 |
Least Functionality |
X | |
CM-7.1a |
Periodic Review |
X | |
CM-7.1b |
Disable Unnecessary / Nonsecure Functions, Ports, Protocols, etc. |
X | |
CM-9 |
Configuration Management Plan |
X |
*not referenced by a program or plan
NIST SP 800-53 Rev 4 Control |
Implemented |
Planned | |
Contingency Planning | |||
CP-1 |
Contingency Planning Policy and Procedures |
X | |
CP-2 |
Contingency Plan |
X | |
CP-3 |
Contingency Training |
X | |
CP-4 |
Contingency Plan Testing |
X | |
CP-6 |
Alternate Storage Site |
X | |
CP-9 |
Information System Backup |
X | |
CP-10 |
Information System Recovery and Reconstitution |
X | |
Identification and Authentication | |||
IA-1 |
Identification and Authentication Policy and Procedures |
X | |
IA-4 |
Identifier Management |
X | |
IA-5 |
Authenticator Management |
X | |
IA-6 |
Authenticator Feedback |
X | |
Incident Response | |||
IR-3 |
Incident Response Testing |
X | |
IR-4 |
Incident Handling |
X | |
IR-5 |
Incident Monitoring |
X | |
IR-6 |
Incident Reporting |
X | |
IR-7 |
Incident Response Assistance |
X | |
IR-8 |
Incident Response Plan |
X | |
Media Protection | |||
MP-1 |
Media Protection Policy and Procedures |
X | |
MP-2 |
Media Access |
X | |
MP-4 |
Media Storage |
X | |
MP-5 |
Media Transport |
X | |
MP-6 |
Media Sanitization |
X | |
MP-7 |
Media Use |
X | |
Physical and Environmental Protection | |||
PE-2 |
Physical Access Authorizations |
X | |
PE-3 |
Physical Access Control |
X | |
PE-6 |
Monitor Physical Access |
X | |
PE-8 |
Visitor Access Records |
X | |
PE-10 |
Emergency Shutoff |
X | |
PE-11 |
Emergency Power |
X | |
PE-12 |
Emergency Lighting |
X | |
PE-13 |
Fire Protection |
X | |
PE-14 |
Temperature and Humidity Controls |
X | |
Personnel Security | |||
PS-3 |
Personnel Screening |
X | |
PS-4 |
Personnel Termination |
X | |
PS-7 |
Third-Party Personnel Security |
X | |
PS-8 |
Personnel Sanctions |
X |
NIST SP 800-53 Rev 4 Control |
Implemented |
Planned | |
Risk Assessment | |||
RA-2 |
Security Categorization |
X | |
RA-3 |
Risk Assessment |
X | |
RA-3a |
Conduct Risk Assessment |
X | |
RA-3b |
Documents Risk Assessment Results |
X | |
RA-3c |
Reviews Risk Assessment Results |
X | |
RA-5 |
Vulnerability Scanning |
X | |
System and Communications Protection | |||
SC-1 |
System and Communications Protection Policy and Procedures |
X | |
SC-5 |
Denial of Service Protection |
X | |
SC-7 |
Boundary Protection |
X | |
SC-12 |
Cryptographic Key Establishment and Management |
X | |
SC-15 |
Collaborative Computing Devices |
X | |
SC-20 |
Secure Name /Address Resolution Service (Authoritative Source) |
X | |
SC-21 |
Secure Name /Address Resolution Service (Recursive or Caching Resolver) |
X | |
SC-22 |
Architecture and Provisioning for Name/Address Resolution Service |
X | |
System and Information Integrity | |||
SI-1 |
System and Information Integrity Policy and Procedures |
X | |
SI-2 |
Flaw Remediation |
X | |
SI-3 |
Malicious Code Protection |
X | |
SI-4 |
Information System Monitoring |
X | |
SI-8 |
Spam Protection |
X | |
SI-12 |
Information Output Handling and Retention |
X |