CMMC Practice Number: SI.L2-3.14.3
CMMC Level: 2 CMMC Domain: System and Information Integrity (SI)
Practice Summary:
Monitor system security alerts and advisories and take action in response.
Contents:
CMMC Practice Implementation |
Assessment Objectives
Determine if:
[a] response actions to system security alerts and advisories are identified;
[b] system security alerts and advisories are monitored; and
[c] actions in response to system security alerts and advisories are taken.
Practice Clarification (DOD, CMU)
Solicit and receive security alerts, advisories, and directives from reputable external organizations. Identify sources relevant to the industry and technology used by your company. Methods to receive alerts and advisories may include:
• signing up for email distributions,
• subscribing to RSS feeds, and
• attending meetings [b].
Review alerts and advisories for applicability as they are received [b]. The frequency of the reviews should be based on the frequency of the alerts and advisories to ensure you have the most up-to-date information.
External alerts and advisories may prompt you to generate internal security alerts, advisories, or directives, and share these with all personnel with a need-to-know. The individuals should assess the risk related to a given alert and act to respond as appropriate [a,c]. Sometimes it may require a configuration update. Other times, the information may also require adjusting system architecture in order to thwart a threat described in an advisory.
Example
You monitor security advisories each week. You review the alert emails and online subscription service alerts to determine which ones apply [b]. You create a list of the applicable alerts and research what steps you need to take to address them. Next, you generate a plan that you review with your change management group so that the work can be scheduled [c].
Potential Assessment Considerations
• Are the responses to system security alerts and advisories identified in relation to the assessed severity of potential flaws (e.g., communicating with responsible personnel, initiating vulnerability scans, initiating system flaw remediation activities) [a]?
• Are system security alerts and advisories addressed (e.g., assessing potential severity or likelihood, communicating with responsible personnel, initiating vulnerability scans, initiating system flaw remediation activities) [a,c]?
Where To Look
- System and information integrity policy;
- procedures addressing security alerts, advisories, and directives;
- system security plan;
- records of security alerts and advisories;
- other relevant documents or records.
Who To Talk To
- Personnel with security alert and advisory responsibilities;
- personnel implementing, operating, maintaining, and using the system;
- personnel, organizational elements, and external organizations to whom alerts, advisories, and directives are to be disseminated;
- system or network administrators;
- personnel with information security responsibilities.
Perform Test On
- Organizational processes for defining, receiving, generating, disseminating, and complying with security alerts, advisories, and directives;
- mechanisms supporting or implementing definition, receipt, generation, and dissemination of security alerts, advisories, and directives;
- mechanisms supporting or implementing security directives.
Additional Information
The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness: https:// www.us-cert.gov/
Security directives are issued by designated organizations with the responsibility and authority to issue such directives. Compliance with security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on company operations and assets, individuals, and other organizations, should the directives not be implemented in a timely manner.
External organizations include, for example, external mission/business partners, supply chain partners, external service providers, and other peer/supporting organizations.
Cleared defense contractors are eligible for the Defense Industrial Base (DIB) Cybersecurity program, which is a voluntary cyber threat information sharing program between DOD and DIB participants. Under this partnership, the DOD Cyber Crime Center receives voluntary reporting from DIB participants and makes available to all the other DIB participants, as well as indicators from Government sources. See https://dibnet.dod.mil/portal/intranet/
CMMC Practice Background and References (DOD, CMU) |
Practice Discussion:
DISCUSSION FROM SOURCE: NIST SP 800-171 R2
There are many publicly available sources of system security alerts and advisories. The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government and in nonfederal organizations. Software vendors, subscription services, and relevant industry information sharing and analysis centers (ISACs) may also provide security alerts and advisories. Examples of response actions include notifying relevant external organizations, for example, external mission/business partners, supply chain partners, external service providers, and peer or supporting organizations.
NIST SP 800-161 provides guidance on supply chain risk management.
CMMC References:
· NIST SP 800-171 Rev 1 3.14.3
· CIS Controls v7.1 6.5, 6.6
· NIST CSF v1.1 RS.AN-5
· CERT RMM v1.2 IMC:SG2.SP1
· NIST SP 800-53 Rev 4 SI-5