U.S. Federal Cybersecurity Compliance Part II
You can find Part I of my U.S. Federal Cybersecurity Compliance blog, here.
NIST 800-53: Security and Privacy Controls for Information Systems and Organizations
As a Cybersecurity professional, engineering lead, or an analyst, this is one of the documents to keep bookmarked (or better yet, saved on your desktop but make sure you’re checking for updates). When you think of the NIST SP 800-53, think “security controls.”
According to the document’s abstract, “This publication provides a catalog of security and privacy controls for information systems and organizations to protect organizational operations and assets, individuals, other organizations, and the Nation from a diverse set of threats and risks, including hostile attacks, human errors, natural disasters, structural failures, foreign intelligence entities, and privacy risks. The controls are flexible and customizable and implemented as part of an organization-wide process to manage risk.” 1
Meet the Security Control Families
There are 20 families of security controls, and each of those families will contain controls related to the topic referenced by the family. The families all have a two-character unique identifier. Please see the table below:
ID | Familiy |
---|---|
AC | Access Control |
AT | Awareness and Training |
AU | Audit and Accountability |
CA | Assessment, Authorization, and Monitoring |
CM | Configuration Management |
CP | Contingency Planning |
IA | Identification and Authentication |
IR | Incident Response |
MA | Maintenance |
MP | Media Protection |
PE | Physical and Environmental Protection |
PL | Planning |
PM | Program Management |
PS | Personnel Security |
PT | PII Processing and Transparency |
RA | Risk Assessment |
SA | System and Services Acquisition |
SC | System and Communications Protection |
SI | System and Information Integrity |
SR | Supply Chain Risk Management |
In the cases where you’re looking to implement controls from the ground up, it is best to reference the NIST SP 800-53B publication, called Control Baselines for Information Systems and Organizations. These are the “…minimum set of controls mandatory to protect federal information and information systems.”
NIST SP 800-53B: Control Baselines for Information Systems and Organizations
On the NIST SP 800-53B publication, you will find not only the security control baseline allocations per family, but also those security control baselines that are specific for low-impact, moderate-impact, and high-impact systems.
If you’re starting from the ground up with a low-impact system, below is a breakdown of the minimum set of security and privacy control baselines recommended by NIST 800-53B:
ID | Family | Privacy | Low |
---|---|---|---|
AC | Access Control | AC-1, AC-3(14) | AC-1, AC-2, AC-3, AC-7, AC-8, AC-14, AC-17, AC-18, AC-19, AC-20, AC-22 |
AT | Awareness and Training | AT-1, AT-2, AT-3, AT-3(5), AT-4 | AT-1, AT-2, AT-2(2), AT-3, AT-4 |
AU | Audit and Accountability | AU-1, AU-2, AU-3(3), AU-11 | AU-1, AU-2, AU-3, AU-4, AU-5, AU-6, AU-8, AU-9, AU-11, AU-12 |
CA | Assessment, Authorization, and Monitoring | CA-1, CA-2, CA-5, CA-6, CA-7, CA-7(4) | CA-1, CA-2, CA-3, CA-5, CA-6, CA-7, CA-7(4), CA-9 |
CM | Configuration Management | CM-1, CM-4 | CM-1, CM-2, CM-4, CM-5, CM-6, CM-7, CM-8, CM-10, CM-11 |
CP | Contingency Planning | CP-1, CP-2, CP-3, CP-4, CP-9, CP-10 | |
IA | Identification and Authentication | IA-1, IA-2, IA-2(1), IA-2(2), IA-2(8), IA-2(12), IA-4, IA-5, IA-5(1), IA-6, IA-7, IA-8, IA-8(a), IA-8(2), IA-8(4), IA-11 | |
IR | Incident Response | IR-1, IR-2, IR-2(3), IR-3, IR-4, IR-5, IR-6, IR-7, IR-8, IR-8(1) | IR-1, IR-2, IR-4, IR-5, IR-6, IR-7, IR-8 |
MA | Maintenance | MA-1, MA-2, MA-4, MA-5 | |
MP | Media Protection | MP-1, MP-6 | MP-1, MP-2, MP-6, MP-7 |
PE | Physical and Environmental Protection | PE-8(3) | PE-1, PE-2, PE-3, PE-6, PE-8, PE-12, PE-12, PE-14, PE-15, PE-16 |
PL | Planning | PL-1, PL-2, PL-4, PL-4(1), PL-8, PL-9 | PL-1, PL-2, PL-4, PL-4(1), PL-10, PL-11 |
PM | Program Management | PM-3, PM-4, PM-5(1), PM-6, PM-7, PM-8, PM-9, PM-10, PM-11, PM-13, PM-14, PM-17, PM-18, PM-19, PM-20, PM-20(1), PM-21, PM-22, PM-24, PM-25, PM-26, PM-27, PM-28, PM-31 | As per NIST’s documentation: “Deployed organization-wide. Supports information security program. Independent of any system impact level.” |
PS | Personnel Security | PS-6 | PS-1, PS-2, PS-3, PS-4, PS-5, PS-6, PS-7, PS-8, PS-9 |
PT | PII Processing and Transparency | PT-1, PT-2, PT-3, PT-4, PT-5, PT-5(2), PT-6, PT-6(1), PT-6(2), PT-7, PT-7(1), PT-7(2), PT-8 | As per NIST’s documentation: “Personally Identifiable Information Processing and Transparency controls are not allocated to the security baselines. Privacy baseline controls are selected based on the selection criteria defined in Section 2.2.” |
RA | Risk Assessment | RA-1, RA-3, RA-7, RA-8 | RA-1, RA-2, RA-3, RA-3(1), RA-5, RA-5(2), RA-5(11), RA-7 |
SA | System and Services Acquisition | SA-1, SA-2, SA-3, SA-4, SA-8(33), SA-9, SA-11 | SA-1, SA-2, SA-3, SA-4, SA-4(10), SA-5, SA-8, SA-9, SA-22 |
SC | System and Communications Protection | SC-7(24) | SC-1, SC-5, SC-7, SC-12, SC-13, SC-15, SC-20, SC-21, SC-22, SC-39 |
SI | System and Information Integrity | SI-1, SI-12, SI-12(1), SI-12(2), SI-12(3), SI-18, SI-18(4), SI-19 | SI-1, SI-2, SI-3, SI-4, SI-5, SI-12 |
SR | Supply Chain Risk Management | SR-1, SR-2, SR-2(1), SR-3, SR-5, SR-8, SR-10, SR-11, SR-11(1), SR-11(2), SR-12 | |
Totals per baseline (privacy and low): | 96 | 149 |
That is a total of 96 privacy controls and 149 low-impact security controls that would need to be implemented. This can help you develop a roadmap and have a better understanding on security controls to prioritize for your organization.
Real-World Example: Protecting Personally Identifiable Information (PII)
Let’s bring this into the real world with an example that’s familiar to many: protecting Personally Identifiable Information (PII). We can take security control SI-12(2) as our reference, which talks about minimizing personally identifiable information particularly in testing, training, and research.
Here is how you can implement it practically:
- Create a Policy: Have a clear policy to enforce minimal PII use (SI-1).
- Use “Fake” Data: Whenever possible, substitute PII with mock data, especially in non-production environments.
- Be Mindful in Research: Sometimes, using real data is necessary, like in research. Make sure this aligns with your organization’s policy and is well-justified.
By following these steps, you help minimize data exposure risks, aligning with SI-12(2) and other privacy-focused controls.
-
Taken from the Abstract section of the NIST SP 800-53, rev5: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf ↩