Объединенная экспертная группа по инициативе преобразования



страница12/48
Дата09.05.2018
Размер6.15 Mb.
1   ...   8   9   10   11   12   13   14   15   ...   48

CM-6

Configuration Settings

P1

CM-6

CM-6

CM-6 (1) (2)

CM-7

Least Functionality

P1

CM-7

CM-7 (1) (2) (4)

CM-7 (1) (2) (5)

CM-8

Information System Component Inventory

P1

CM-8

CM-8 (1) (3) (5)

CM-8 (1) (2) (3) (4) (5)

CM-9

Configuration Management Plan

P1

Not Selected

CM-9

CM-9

CM-10

Software Usage Restrictions

P2

CM-10

CM-10

CM-10

CM-11

User-Installed Software

P1

CM-11

CM-11

CM-11

Планирование действий в чрезвычайных ситуациях

CP-1

Contingency Planning Policy and Procedures

P1

CP-1

CP-1

CP-1

CP-2

Contingency Plan

P1

CP-2

CP-2 (1) (3) (8)

CP-2 (1) (2) (3) (4) (5) (8)

CP-3

Contingency Training

P2

CP-3

CP-3

CP-3 (1)

CP-4

Contingency Plan Testing

P2

CP-4

CP-4 (1)

CP-4 (1) (2)

CP-5

Withdrawn

---

---

---

---

CP-6

Alternate Storage Site

P1

Not Selected

CP-6 (1) (3)

CP-6 (1) (2) (3)

CP-7

Alternate Processing Site

P1

Not Selected

CP-7 (1) (2) (3)

CP-7 (1) (2) (3) (4)

CP-8

Telecommunications Services

P1

Not Selected

CP-8 (1) (2)

CP-8 (1) (2) (3) (4)

CP-9

Information System Backup

P1

CP-9

CP-9 (1)

CP-9 (1) (2) (3) (5)

CP-10

Information System Recovery and Reconstitution


P1

CP-10

CP-10 (2)

CP-10 (2) (4)

CP-11

Alternate Communications Protocols

P0

Not Selected

Not Selected

Not Selected

CP-12

Safe Mode

P0

Not Selected

Not Selected

Not Selected

CP-13

Alternative Security Mechanisms

P0

Not Selected

Not Selected

Not Selected

Идентификация и аутентификация

IA-1

Identification and Authentication Policy and Procedures


P1

IA-1

IA-1

IA-1

IA-2

Identification and Authentication (Organizational Users)

P1

IA-2 (1) (12)

IA-2 (1) (2) (3) (8) (11) (12)

IA-2 (1) (2) (3) (4) (8) (9) (11) (12)

IA-3

Device Identification and Authentication

P1

Not Selected

IA-3

IA-3

IA-4

Identifier Management

P1

IA-4

IA-4

IA-4

IA-5

Authenticator Management

P1

IA-5 (1) (11)

IA-5 (1) (2) (3) (11)

IA-5 (1) (2) (3) (11)

IA-6

Authenticator Feedback

P2

IA-6

IA-6

IA-6

IA-7

Cryptographic Module Authentication

P1

IA-7

IA-7

IA-7

IA-8

Identification and Authentication (Non-Organizational Users)

P1

IA-8 (1) (2) (3) (4)

IA-8 (1) (2) (3) (4)

IA-8 (1) (2) (3) (4)

IA-9

Service Identification and Authentication

P0

Not Selected

Not Selected

Not Selected

IA-10

Adaptive Identification and Authentication

P0

Not Selected

Not Selected

Not Selected

IA-11

Re-authentication

P0

Not Selected

Not Selected

Not Selected

Реагирование на инциденты

IR-1

Incident Response Policy and Procedures

P1

IR-1

IR-1

IR-1

IR-2

Incident Response Training

P2

IR-2

IR-2

IR-2 (1) (2)

IR-3

Incident Response Testing

P2

Not Selected

IR-3 (2)

IR-3 (2)

IR-4

Incident Handling

P1

IR-4

IR-4 (1)

IR-4 (1) (4)

IR-5

Incident Monitoring

P1

IR-5

IR-5

IR-5 (1)

IR-6

Incident Reporting

P1

IR-6

IR-6 (1)

IR-6 (1)

IR-7

Incident Response Assistance

P3

IR-7

IR-7 (1)

IR-7 (1)

IR-8

Incident Response Plan

P1

IR-8

IR-8

IR-8

IR-9

Information Spillage Response

P0

Not Selected

Not Selected

Not Selected

IR-10

Integrated Information Security Analysis Team


P0

Not Selected

Not Selected

Not Selected

Поддержка

MA-1

System Maintenance Policy and Procedures

P1

MA-1

MA-1

MA-1

MA-2

Controlled Maintenance

P2

MA-2

MA-2

MA-2 (2)

MA-3

Maintenance Tools

P3

Not Selected

MA-3 (1) (2)

MA-3 (1) (2) (3)

MA-4

Nonlocal Maintenance

P2

MA-4

MA-4 (2)

MA-4 (2) (3)

MA-5

Maintenance Personnel

P2

MA-5

MA-5

MA-5 (1)

MA-6

Timely Maintenance

P2

Not Selected

MA-6

MA-6

Защита носителей

MP-1

Media Protection Policy and Procedures

P1

MP-1

MP-1

MP-1

MP-2

Media Access

P1

MP-2

MP-2

MP-2

MP-3

Media Marking

P2

Not Selected

MP-3

MP-3

MP-4

Media Storage

P1

Not Selected

MP-4

MP-4

MP-5

Media Transport

P1

Not Selected

MP-5 (4)

MP-5 (4)

MP-6

Media Sanitization

P1

MP-6

MP-6

MP-6 (1) (2) (3)

MP-7

Media Use

P1

MP-7

MP-7 (1)

MP-7 (1)

MP-8

Media Downgrading

P0

Not Selected

Not Selected

Not Selected

Физическая защита и защита окружения

PE-1

Physical and Environmental Protection Policy and Procedures

P1

PE-1

PE-1

PE-1

PE-2

Physical Access Authorizations

P1

PE-2

PE-2

PE-2

PE-3

Physical Access Control

P1

PE-3

PE-3

PE-3 (1)

PE-4

Access Control for Transmission Medium

P1

Not Selected

PE-4

PE-4

PE-5

Access Control for Output Devices

P2

Not Selected

PE-5

PE-5

PE-6

Monitoring Physical Access

P1

PE-6

PE-6 (1)

PE-6 (1) (4)

PE-7

Withdrawn

---

---

---

---

PE-8

Visitor Access Records

P3

PE-8

PE-8

PE-8 (1)

PE-9

Power Equipment and Cabling

P1

Not Selected

PE-9

PE-9

PE-10

Emergency Shutoff

P1

Not Selected

PE-10

PE-10

PE-11

Emergency Power

P1

Not Selected

PE-11

PE-11 (1)

PE-12

Emergency Lighting

P1

PE-12

PE-12

PE-12

PE-13

Fire Protection

P1

PE-13

PE-13 (3)

PE-13 (1) (2) (3)

PE-14

Temperature and Humidity Controls

P1

PE-14

PE-14

PE-14

PE-15

Water Damage Protection

P1

PE-15

PE-15

PE-15 (1)

PE-16

Delivery and Removal

P2

PE-16

PE-16

PE-16

PE-17

Alternate Work Site

P2

Not Selected

PE-17

PE-17

PE-18

Location of Information System Components

P3

Not Selected

Not Selected

PE-18

PE-19

Information Leakage

P0

Not Selected

Not Selected

Not Selected

PE-20

Asset Monitoring and Tracking

P0

Not Selected

Not Selected

Not Selected



Поделитесь с Вашими друзьями:
1   ...   8   9   10   11   12   13   14   15   ...   48


База данных защищена авторским правом ©vossta.ru 2019
обратиться к администрации

    Главная страница