MEP Overview
Special Publication 800-171
Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations
Patricia Toth NIST MEP
Special Publication 800-171 Protecting Controlled Unclassified - - PowerPoint PPT Presentation
Special Publication 800-171 Protecting Controlled Unclassified Information in Nonfederal Information Systems and Organizations Patricia Toth NIST MEP MEP Overview What is Information Security? Cyber- Personnel security Security
MEP Overview
Patricia Toth NIST MEP
MEP Overview
2
Cyber- security Privacy Physical Security Contingency Planning & Disaster Recovery Operational Security Personnel Security
MEP Overview
MEP Overview
MEP Overview
MEP Overview
MEP Overview
MEP Overview
MEP Overview 9
information.
procedures.
MEP Overview
www.archives.gov/cui/registry/category-list.html
MEP Overview
11
Category-Subcategory: Proprietary Business Information-Manufacturer Category Description: Material and information relating to, or associated with, a company's products, business, or activities, including but not limited to financial information; data or statements; trade secrets; product research and development; existing and future product designs and performance specifications. Subcategory Description: Relating to the production of a consumer product to include that of a private labeler. Marking: MFC
MEP Overview
MEP Overview
MEP Overview
MEP Overview
MEP Overview
Basic Security Requirements: 3.2.1 Ensure that managers, systems administrators, and users of
informa)on systems are made aware of the security risks associated with their ac)vi)es and of the applicable policies, standards, and procedures related to the security of those
3.2.2 Ensure that organiza)onal personnel are adequately trained to carry out their assigned informa)on security-related du)es and responsibili)es. Derived Security Requirements: 3.2.3 Provide security awareness training on recognizing and repor)ng poten)al indicators of insider threat.
MEP Overview
Basic Security Requirements: 3.2.2 Ensure that organiza)onal personnel are adequately trained to carry out their assigned informa)on security-related du)es and responsibili)es. Mee:ng the Requirement:
MEP Overview
Basic Security Requirements: 3.2.2 Ensure that organiza)onal personnel are adequately trained to carry out their assigned informa)on security-related du)es and responsibili)es. Mee:ng the Requirement:
MEP Overview
Basic Security Requirements: 3.4.1 Establish and maintain baseline configura)ons and inventories of
firmware, and documenta)on) throughout the respec)ve system development life cycles. 3.4.2 Establish and enforce security configura)on seUngs for informa)on technology products employed in organiza)onal informa)on systems. Derived Security Requirements: 3.4.3 Track, review, approve/disapprove, and audit changes to informa)on systems. 3.4.4 Analyze the security impact of changes prior to implementa)on. 3.4.5 Define, document, approve, and enforce physical and logical access restric)ons associated with changes to the informa)on system. 3.4.5 ……………
MEP Overview
Basic Security Requirements: 3.4.1 Establish and maintain baseline configura)ons and inventories of
firmware, and documenta)on) throughout the respec)ve system development life cycles. Mee:ng the Requirements:
informa)on system
MEP Overview
Basic Security Requirements: 3.4.1 Establish and maintain baseline configura)ons and inventories of
firmware, and documenta)on) throughout the respec)ve system development life cycles. Mee:ng the Requirements:
MEP Overview
Basic Security Requirements: 3.1.1 Limit system access to authorized users, processes ac)ng on behalf of authorized users, or devices (including other systems). 3.1.2 Limit system access to the types of transac)ons and func)ons that authorized users are permi]ed to execute. Derived Security Requirements:
3.1.3 Control the flow of CUI in accordance with approved authoriza)ons. 3.1.4 Separate the du)es of individuals to reduce the risk of malevolent ac)vity without collusion. 3.1.5 Employ the principle of least privilege, including for specific security func)ons and privileged accounts. 3.1.6 Use non-privileged accounts or roles when accessing non-security func)ons. 3.1.7 Prevent non-privileged users from execu)ng privileged func)ons and audit the execu)on of such func)ons. 3.1.8 Limit unsuccessful logon a]empts.
MEP Overview
Derived Security Requirements:
3.1.8 Limit unsuccessful logon a]empts.
Mee:ng the Requirements:
period.
when max number of unsuccessful logon a]empts is exceeded.
algorithm.
network administrators
MEP Overview
Derived Security Requirements:
3.1.8 Limit unsuccessful logon a]empts.
Mee:ng the Requirements:
network administrators
MEP Overview
25
“If the Offeror proposes to vary from any of the security requirements specified by NIST SP 800-171 that are in effect at the >me the solicita>on is issued or as authorized by the Contrac>ng Officer, the Offeror shall submit to the Contrac>ng Officer, for considera>on by the DoD Chief Informa>on Officer (CIO), a wri-en explana>on of— (A) Why a par>cular security requirement is not applicable; or (B) How an alterna>ve but equally effec>ve, security measure is used to compensate for the inability to sa>sfy a par>cular requirement and achieve equivalent protec>on.”
MEP Overview
26
MEP Overview
27
MEP Overview
28
MEP Overview