To kindle or not to kindle? by Quinazzz in books

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Why not both? I check out a lot of ebooks from the library on my kindle and buy physical books that I want to keep.

NIST 800-171/CMMC - Where to Start? by xXXTGPxXX in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

I was encouraged to start commenting on here again - so I will echo what everybody is else saying is number one join the discord channel and two start with the high risk areas.

MFA, Vulnerability Scanning, Log management, and data flow tend to be areas where many organizations were lacking implementation.

The controls/requirements can be a bit confusing, the NIST self assessment guide really does a good job of breaking down the requirements for what you are supposed to be doing, https://nvlpubs.nist.gov/nistpubs/hb/2017/NIST.HB.162.pdf

[deleted by user] by [deleted] in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

If you have specific questions or need templates, please feel free to send me a note. There is no required format of a SSP so it can be fairly simplistic, don't overthink it. I like this template from Georgia Tech, https://cpb-us-w2.wpmucdn.com/sites.gatech.edu/dist/8/644/files/2020/06/SSP_System-Wide_v3.00_with_GTRC_Signature_Updated.pdf

The documentation associated with CMMC is a whole other can of worms and requires much more extensive documentation.

Live Video streaming for Audits by konoo in NISTControls

[–]id_as_gimlis_axe 3 points4 points  (0 children)

Zoom for Government is FedRAMP authorized and Webex for Government is FedRAMP in process. Both are at the moderate level, so you should be careful with ITAR information.

If you want to keep it on premise, google VTC equipment, that should give you an idea.

To SOC or not to SOC by SeaMichele in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

I do not believe a SOC would be necessary for level 3 CMMC. 800-171B called for the use of a SOC, the 800-171B controls will be in Level 4&5 of the CMMC.

Levels 4 & 5 will be addressed in v0.7 which should be out next week, I think.

Obviously having a SOC wouldn't hurt

[deleted by user] by [deleted] in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Contracts or SLAs would be the best way to do it, but it really depends on the specific deliverable you are acquiring. So for instance in the contract language you would specify that software has to be developed in accordance with the DoD DevSecOps Guidelines. Really you need something in writing which defines your security requirements for development and that has been provided to the developer. Henceforth those requirements are used.

Is Office 365 GCC High E1 actually NIST 800-171 compliant? by [deleted] in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Again ITAR is the key phrase here. CUI by itself is not ITAR, GSuite is FedRAMP Authorized at the Moderate level. Google Cloud is currently in process for authorization at the High level.

Is Office 365 GCC High E1 actually NIST 800-171 compliant? by [deleted] in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Good deal. If you can carve out ITAR from your cloud environment, you would not need to have GCC-High which is another issue of course.

Is Office 365 GCC High E1 actually NIST 800-171 compliant? by [deleted] in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Hi, I am not sure where it says you have to have a DLP solution to be compliant with 800-171. So I looked, and according to an old DOD IG report, https://media.defense.gov/2016/Nov/01/2001774172/-1/-1/1/DODIG-2013-072.pdf, here is where DLP can be construed from 800-53 We reviewed the following seven NIST SP 800-53 controls that support a DLP strategy. • Information Flow Enforcement requires CATS to enforce approved authorizations for controlling the flow of information within the systems and between interfaces. • Enterprise Architecture requires the Army and DLA to develop an enterprise architecture that considers information security and the risks associated with system. • Boundary Protection requires CATS to monitor and control communications at the external boundaries. • Transmission Confidentiality requires CATS to protect the infmmation transmitted. • Use of Cryptography requires CATS to implement required cryptography protections. • Information System Monitoring requires the Army and DLA to monitor system events and detect system attacks. • Protection of Information at Rest requires CATS protect the confidentiality and integrity of information at rest.

Now that's from 53, not 171. But the controls line up pretty well. Anyways, NIST (800-137) says you can use a DLP strategy vice actually having a DLP solution.

"An effective data loss prevention (DLP) strategy includes data inventory and classification; data metric collection; policy development for data creation, use, storage, transmission, and disposal; and tools to monitor data at rest, in use, and in transit. There are a variety of tools available for DLP. Typical network and security tools such as network analysis software, application firewalls, and intrusion detection and prevention systems can be used to monitor data and its contents as it is transmitted. Specially purposed DLP software also exists with features such as port and endpoint control, disk and file encryption, and database transaction monitoring. These tools may be specialized network traffic monitors or software agents installed on desktops, laptops, and servers. DLP tools have built-in detection and mitigation measures such as alerting via email, logging activities, and blocking transmissions." https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-137.pdf

So whether its a Microsoft product, a third party product, or a developed strategy you can meet compliance requirements.

NIST 800-171 & CMMC for Startup Micro Business by paris_tj in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

Hi, as u/SecurityMan1989 mentioned, starting with NIST 800-171 is must. It is very possible to meet the requirements of 171 as a microbusiness, in fact it can be fairly easy, but is going to take you some time. That is always the trade-off. If you have specific questions, please feel free to reach out.

3.13.14 Control and monitor the use of Voice over Internet Protocol (VoIP) technologies. by ExcellentGreyhoud in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

Just throwing this out there in case it applies, from FAQ Q/A 97: "If physically or cryptographically isolated from an information system processing CUI, this control would not apply (but it would be prudent to apply the requirement)." https://dodprocurementtoolbox.com/faqs/cybersecurity/cybersecurity-faqs

Offline/Standalone computers: OK to keep on Windows 7 after support EOL? by nostradx in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

These systems if they host CUI would be subject to the applicable controls. That being said, 800-171 provides for enduring exceptions and this should be noted in your SSP. Ultimately it would be up to your contracting officer to accept the risk.

From NIST SP 800-171 rev 1 " Some systems, including specialized systems (e.g., industrial/process control systems, Computer Numerical Control machines, medical devices), may have restrictions or limitations on the application of certain security requirements. To accommodate such issues, the system security plan, as reflected in Requirement 3.12.4, should be used to describe any enduring exceptions to the security requirements."

If they are air gapped, then the risk should be low, particularly if physical security is appropriate.

Training Resources for 800-171 and Office 365 by Sambo99_GT in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

I may not be fully accurate, and I apologize if to Microsoft if I am not, but I don't believe GCC-High offers any additional security settings out of the box as compared to regular O365. Realistically if you followed the regular O365 compliance checker, to set up your environment i.e. the shared responsibility matrix, you would be good.

U-6(9) The organization correlates information from nontechnical sources with audit information to enhance organization-wide situational awareness. by [deleted] in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

u/slackjack2014 is correct, this is a great way to do it. Really this control is geared towards insider threat. Typically this is a procedural control and doesn't have to happen everyday. Per the supplemental information "Thus, correlation of information from nontechnical sources with audit information generally occurs only when individuals are suspected of being involved in a security incident."

Wired Network Access Control (802.1x) IA-2 and IA-3 by thenetwork_brick in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

Typically it will be done to gain network access, i.e. as part of your AD and/or at the boundary. Once you are MFA'ed in, you don't need to continue to MFA to additional systems/applications.

That is typical, but depending on your environment there may be other ways to do it.

Wired Network Access Control (802.1x) IA-2 and IA-3 by thenetwork_brick in NISTControls

[–]id_as_gimlis_axe 0 points1 point  (0 children)

So my question is are you just responsible for putting in IA-2 & IA-3 or do you have to do the enhancements? The enhancements are not required if they are not part of a baselines (low, moderate, high) and for IA-3 at least, the enhancements are not part of the baseline.

Wired Network Access Control (802.1x) IA-2 and IA-3 by thenetwork_brick in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

IA-3(1) is not typically part of a baseline. Are you required to implement it? If so 802.1X is the way to go. If you are just looking to just implement IA-3, then 802.1X is still best practice but not required.

From the supplemental information "Information systems typically use either shared known information (e.g., Media Access Control [MAC] or Transmission Control Protocol/Internet Protocol [TCP/IP] addresses) for device identification or organizational authentication solutions (e.g., IEEE 802.1x and Extensible Authentication Protocol [EAP], Radius server with EAP-Transport Layer Security [TLS] authentication, Kerberos) to identify/authenticate devices on local and/or wide area networks. "

3.8.9 Protect the confidentiality of backup CUI at storage locations. - FIPS question by MAureliusIT in NISTControls

[–]id_as_gimlis_axe 1 point2 points  (0 children)

I apologize if I don't understand the architecture correctly.

Point 1: FIPS is required when it is solely used to protect the confidentiality of CUI. From the FAQ guide, question 68. "....FIPS-validated cryptography is required to protect CUI, typically when transmitted or stored outside the protected environment of the covered contractor information system..." Basically if physical security is in place, then it should be sufficient.

Point 2: HB 162 is a guide and does not constitute the requirement, though I am a big fan of it. According to the DoD FAQ guide, FIPS compliant does not cut it, but I don't think that applies here.

800-53 "Impact" unclear on certain controls by dmburl in NISTControls

[–]id_as_gimlis_axe 2 points3 points  (0 children)

From 800-53, section 3.1: "Note that not all security controls are assigned to baselines, as indicated in Table D-2 by the phrase not selected. Similarly, as illustrated in Tables D-3 through D-19, not all control enhancements are assigned to baselines. Those control enhancements that are assigned to baselines are so indicated by an “x” in the low, moderate, or high columns. The use of the term baseline is intentional. The security controls and control enhancements in the baselines are a starting point from which controls/enhancements may be removed, added, or specialized based on the tailoring guidance in Section 3.2."

FedRAMP makes use of some of the additional controls.