Identify Covered Defense Information
What exactly is Covered Defense Information (CDI) and why is identifying it so crucial?
This task acts as the cornerstone of your security strategy, ensuring that sensitive information is adequately protected. Without the proper identification, you risk exposing your organization to vulnerabilities. Dive into your data, scrutinize every piece, and flag on any lingering uncertainties. Be prepared for hiccups like mislabeling data and overcome them with precise classification protocols.
Equip yourself with robust data management tools to streamline this process.
-
1Technical Information
-
2Procurement Information
-
3Financial Information
-
4Legal Information
-
5Operational Information
Conduct Security Gap Analysis
Think you’ve got everything covered? Think again. Now it's time to pinpoint vulnerabilities that might be skimming under the radar. The security gap analysis stands between business continuity and potential security breaches. Engage a thorough audit of systems against the compliance standards.
Potential challenges include missing documentation—offset this with diligent record-keeping. The desired outcome? A secure infrastructure free of harmful gaps!
Who might be involved? Your IT team, of course!
-
1Nmap
-
2Wireshark
-
3OpenVAS
-
4Qualys
-
5Nessus
-
1Identify Assets
-
2Assess Existing Security Measures
-
3Compare with Standards
-
4Document Findings
-
5Propose Solutions
Security Gap Analysis Report
Document System Security Plan
Now that gap analysis is complete, documenting your System Security Plan (SSP) is next. Why rush this? With an unrecorded plan, you risk misunderstanding and miscommunication within your team.
This plan anchors your efforts, laying out every system detail that needs safeguarding.
It's a living document, improving over time as challenges like outdated information arise, patched by consistent updates. Use a template, simplifying the process, and securing the desired outcome.
-
1Monthly
-
2Quarterly
-
3Bi-Annually
-
4Annually
-
5As Needed
Implement Access Control Measures
Having a system is one thing, safeguarding access is another. Could anyone gain entry to your CDI, or do you have comprehensive barriers in place?
Define roles, set permissions, and manage authentication; it’s akin to fortifying your digital premises. However, challenges include enforcing policies and user complacencies, countered with regular training and policy reviews—ensuring each entry point is well-guarded.
-
1Password Policies
-
2Two-Factor Authentication
-
3Biometrics
-
4Role-Based Access Controls
-
5User Access Reviews
Control Physical Access
When was the last time you evaluated physical access controls? While digital security steals the spotlight, physical access remains a pivotal line of defense.
Benefits include preventing unauthorized entry and equipment theft.
Encounters with tailgating could be resolved with badge systems. Equip your premises with ID logs and surveillance systems, reinforcing the purpose this task fulfills.
-
1Establish Entry Points
-
2Install Surveillance
-
3Issue ID Badges
-
4Create Visitor Log
-
5Train Security Personnel
-
1SimpleEmoji
-
2Envoy
-
3Piimagni
-
4SwipedOn
-
5WhosOnLocation
Maintain Media Protection Protocols
Is your media protection strategy infallible? Consider the risks of breaches from lost devices or misplaced data drives.
This task keeps your media safe from unauthorized access or damage. As potential challenges like media mismanagement arise, counter them with strict encryption standards and regular inventory checks.
Your end goal is a secure media environment shielded from breaches.
-
1Hard Drives
-
2USB Devices
-
3Printers
-
4Mobile Phones
-
5CD/DVDs
Establish Personnel Security Checks
Do you know who has access to your classified information? Estimating a person’s trustworthiness is not a whimsy task.
Conduct comprehensive background checks, ensuring each individual has the integrity your organization demands.
Not doing so? You're inviting insider threats. Overcome this hurdle with strict vetting procedures and balanced confidentiality deals.
Your success rests on diligence—secure the right tools and personnel.
-
1Confidential
-
2Secret
-
3Top Secret
-
4No Access
-
5Pending Review
-
1Interview
-
2Background Check
-
3Reference Check
-
4Drug Test
-
5Final Assessment
Configure System and Communications Protections
Manage Security Awareness Training
Monitor System Audit Logs
Ensure Incident Response Capability
Conduct Risk Assessment
Approval: Security Plan Review
-
Identify Covered Defense InformationWill be submitted
-
Conduct Security Gap AnalysisWill be submitted
-
Document System Security PlanWill be submitted
-
Implement Access Control MeasuresWill be submitted
-
Control Physical AccessWill be submitted
-
Maintain Media Protection ProtocolsWill be submitted
-
Establish Personnel Security ChecksWill be submitted
-
Configure System and Communications ProtectionsWill be submitted
-
Manage Security Awareness TrainingWill be submitted
-
Monitor System Audit LogsWill be submitted
-
Ensure Incident Response CapabilityWill be submitted
-
Conduct Risk AssessmentWill be submitted
Conduct Annual Security Training
Update System Remediation Plans
The post NIST 800-171 Self-Assessment Checklist first appeared on Process Street.