Info Security Memo
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org

Build Confidence

Focusing on Information Security 

Info Security Notes

Security Controls Based on NIST 800-53 Low Medium High Impact

10/19/2020

0 Comments

 
Security Controls Based on NIST 800-53 Low, Medium, High Impact

Since NIST 800-53 was first introduced, the number of controls has greatly expanded; the initial version of 800-53 contained approximately 300 controls and NIST 800-53 rev 4 contains 965 controls. 

Despite the complexity, each NIST 800-53 revision makes the controls set increasingly valuable. As things like mobile, IoT, and cloud evolve, NIST continuously enhances 800-53 to make migration an ongoing requirement.

800-53 (Rev. 4) Security Control Catalog

Low-Impact

Moderate-Impact

High-Impact

 


Security Objectives / Impact / Required Security Controls

 

Confidentiality

Integrity

Availability

Low

Login Audit
Encryption in transit
Patch Management
Centralized Authentication

Antivirus

Onsite Backup
Change Control
Patch Management
Vulnerability Management
SLAs

Moderate

Login Audit
System Health Monitoring
Encryption at rest
Encryption in transit
MFA
Secure Delete
DLP
Patch Management
Centralized Authentication
Machine Authentication
Role Based Authentication
Network IDS
Cloud Isolation

Antivirus
File Integrity Monitoring

High Availability
Onsite Backup
Change Control
Patch Management
Vulnerability Management
SLAs

High

Login Audit
System Health Monitoring
Encryption at rest
Encryption in transit
MFA
Priviledged Access Management
Patch Management
Machine authentication
Host IDS
Network IDS
SSL Decryption
Secure Delete
DLP
Penetration Testing
Centralized Authentication
Role Based Authentication
Cloud Isolation

Antivirus
File Integrity Monitoring

High Availability
Onsite/Offsite Backup
Scalability
DR Site
Change Control
Patch Management
Vulnerability Management
DDoS Protection
SLAs


The following list is showing those most common controls align with the impact level in 800-53. 

Impact / Required Security Controls (Based on 800-53))


 

Low

Moderate

High

Access Control / Firewall

 

 

 

Account Management

 

 

 

Security Awareness Training

 

 

 

Security Assessment / Categorization

 

 

 

System Inventory

 

 

 

Key Protection / Management

 

 

 

DoS Protection

 

 

 

Remote Access from External Network 

Monitoring, Managed,

Privileged Commands Controlled and Documents,

 Information Protected, Disabled non-secure network protocols

Wireless Access

Authentication, Encryption, Monitoring,

(Restrict Users)

 

Physical Access Control

 

 

 

System Maintenance

 

 

 

Patch Management

 

 

 

System / Login Audit / Response

 

 

 

System Health, Usage Monitoring

 

 

 

Encryption in transit

 

 

 

System Hardening

 

 

 

Software Usage Restrictions

 

 

 

Antivirus/Antimalware

 

 

 

Vulnerability Scanning

 

 

 

Onsite Backup / Recovery

 

 

 

Alternate Storage Site & Backup / Recovery

 

 

 

Access / Configuration Change Control

 

 

 

Least Privilege

 

 

 

PKI Certificates

 

 

 

Anti-SPAM

 

 

 

Endpoints Advanced Threat Protection

 

 

 

Encryption at Rest

 

 

 

Device Identification &  Authentication

 

 

 

Network IDS

 

 

 

File Integrity Monitoring

 

 

 

Role-based Authentication

 

 

 

Centralized Authentication

 

 

 

Separation of Duties

 

 

 

DLP

 

 

 

Application Partitioning

 

 

 

Multi Factor Authentication

 

 

 

Secure Delete

 

 

 

Penetration Testing

 

 

 

Vulnerability Management

 

 

 

Supply Chain Protection

 

 

 

Network Segregation (DMZ, Subnets, Mgmt Interface)

 

 

 

DR Site

 

 

 

Privileged Access Management

 

 

 

SIEM

 

 

 

Host IDS

 

 

 

 















via Blogger https://ift.tt/35dcbRJ
October 19, 2020 at 11:02AM Architecture
0 Comments



Leave a Reply.

    Categories

    All
    Architecture
    Blog
    Checkpoint
    Cisco
    Cloud
    CyberArk
    F5
    Fortigate
    Guardium
    Juniper
    Linux
    Network
    Others
    Palo Alto
    Qualys
    Raspberry Pi
    Security
    SIEM
    Software
    Vmware
    VPN
    Wireless

    Archives

    March 2024
    February 2024
    January 2024
    December 2023
    November 2023
    October 2023
    September 2023
    August 2023
    July 2023
    June 2023
    May 2023
    April 2023
    March 2023
    February 2023
    January 2023
    December 2022
    November 2022
    October 2022
    September 2022
    August 2022
    July 2022
    June 2022
    May 2022
    April 2022
    March 2022
    February 2022
    January 2022
    December 2021
    November 2021
    October 2021
    September 2021
    August 2021
    July 2021
    June 2021
    May 2021
    April 2021
    March 2021
    February 2021
    January 2021
    December 2020
    November 2020
    October 2020
    September 2020
    August 2020
    July 2020
    October 2019
    September 2019
    June 2019
    July 2018
    May 2018
    December 2017
    August 2017
    April 2017
    March 2017
    January 2017
    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016
    June 2016
    May 2016
    April 2016
    March 2016
    February 2016
    January 2016
    December 2015
    November 2015
    October 2015
    September 2015
    August 2015
    July 2015
    June 2015
    May 2015
    April 2015
    March 2015

    Print Page:

    RSS Feed

    Email Subscribe
Powered by Create your own unique website with customizable templates.
  • Blog
  • Sitemap
    • Categories
  • Contact
  • About
  • Resources
  • Tools
  • 51sec.org