Evidence of NIST Compliance
Evidence of NIST Compliance
Evidence of NIST Compliance
Assessment
Evidence of NIST Compliance
02-Jan-2020
Evidence of NIST Compliance
NIST ASSESSMENT
Table of Contents
1 - Overview
2 - Overall Risk
3 - Identify (ID)
3.1 - Asset Management (ID.AM)
3.1.1 - Physical devices and system
3.1.2 - Software platforms and applications
3.1.3 - Organization communication and data flows
3.1.4 - External information systems
3.1.5 - Resource prioritization
3.1.6 - Cybersecurity roles and responsibilities
3.2 - Business Environment (ID.BE)
3.2.1 - Role in Supply Chain
3.2.2 - Role in Critical Infrastructure and Industry Sector
3.2.3 - Priorities for Organizational Mission, Objectives, and Activities
3.2.4 - Delivery of Critical Services
3.2.5 - Resilience Requirements
3.3 - Governance (ID.GV)
3.3.1 - Organizational Cybersecurity Policy
3.3.2 - Cybersecurity Roles and Responsibilities
3.3.3 - Legal and Regulatory Requirements Regarding Cybersecurity
3.3.4 - Addressing Cybersecurity Risks
3.4 - Risk Assessment (ID.RA)
3.4.1 - Asset Vulnerabilities
3.4.2 - Cyber Threat Intelligence
3.4.3 - Risk Assessment
3.5 - Risk Management Strategy (ID.RM)
3.5.1 - Risk Management Strategy
3.6 - Supply Chain Risk Management (ID.SC)
3.6.1 - Supply Chain Risk Management
3.6.2 - Supply Chain Risk Assessment
3.6.3 - Supply Chain Contracts
3.6.4 - Assessment of Suppliers and Third-Party Partners
1 - Overview
While our organization currently does not have written Policies & Procedures that describe in detail the
tasks that we have committed to undertake to adhere to the NIST Cyber Security Framework (CSF), we
are committed to adopting one. *
We perform a periodic assessment of our environment with regards to the principals and functions set as
part of the NIST CSF. The assessment consists of automated scans in conjunction with a review by an
Internal Auditor. This document contains both direct evidence of compliance along with attestations by
the Internal Auditor based on a review of materials and supporting documentation. The methodology for
the review and supporting documentation can be found in the various worksheets and documents
(referenced in the NIST Auditor Checklist). Issues are noted in the Risk Analysis and Risk Treatment
Plan.
This document supplements the Risk Analysis and Risk Treatment Plan and offers substantiation and
verification of policy compliance.
Security Officer
Name of Security Officer:
J Simpson
jsimpson@myclientsnetwork.com
2 - Overall Risk
We have performed a Risk Assessment as part of our routine NIST compliance review. See the attached
NIST Risk Analysis and NIST Risk Treatment Plan.
3 - Identify (ID)
ID.AM-1: Physical devices and systems within the organization are inventoried
An automated inventory of assets in the network was performed as part of this assessment. The
discovered assets can be seen in the Asset Inventory Worksheet.
ID.AM-2: Software platforms and applications within the organization are inventoried
An automated inventory of installed software was performed as part of this assessment. The discovered
assets can be seen in the Application Inventory Worksheet.
ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized
based on their classification, criticality, and business value
As part of the assessment process, resources are assessed for their criticality. Prioritization is placed on
critical assets over less critical assets.
ID.AM-6: Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders
(e.g., suppliers, customers, partners) are established
Cybersecurity roles and responsibilities for the entire workforce and third-party stakeholders are
not established in the organization's Policies and Procedures.
ID.BE-1: The organization's role in the supply chain is identified and communicated
The organization's role in the supply chain has not been identified and communicated to key
stakeholders.
ID.BE-2: The organization's place in critical infrastructure and its industry sector is identified and
communicated
The organization's role in critical infrastructure and its industry sector has not been identified and
communicated to key stakeholders.
ID.BE-3: Priorities for organizational mission, objectives, and activities are established and
communicated
The priorities for organizational mission, objectives, and activities have not been established and
communicated to key stakeholders.
ID.BE-4: Dependencies and critical functions for delivery of critical services are established
The dependencies and critical functions for delivery of critical services have not been established.
ID.BE-5: Resilience requirements to support delivery of critical services are established for all operating
states (e.g. under duress/attack, during recovery, normal operations)
The resilience requirements to support delivery of critical services are not established for all
operating states (e.g. under duress/attack, during recovery, normal operations).
The organizational cybersecurity policy has not been established and communicated.
ID.GV-2: Cybersecurity roles and responsibilities are coordinated and aligned with internal roles and
external partners
Cybersecurity roles and responsibilities are not coordinated and aligned with internal roles and
external partners.
ID.GV-3: Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties
obligations, are understood and managed
Legal and regulatory requirements regarding cybersecurity, including privacy and civil liberties
obligations, are not understood and managed.
Our governance and risk management processes are designed to address cybersecurity risks through
continuous risk assessment and remediation.
As part of the Risk Assessment process, a scan for missing critical security patches on Windows assets
was performed. The results are found in the Windows Patch Summary Report.
ID.RA-2: Cyber threat intelligence is received from information sharing forums and sources
As part of our efforts to stay informed on the latest cyber threats, our organization subscribes to the
following sources:
Source URL
Mitre www.mitre.org
ID.RA-3: Threats, both internal and external, are identified and documented
ID.RA-4: Potential business impacts and likelihoods are identified
ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk
ID.RA-6: Risk responses are identified and prioritized
As part of this assessment process, our organization performs a Risk Assessment that identifies risk both
internal and external. Discovered issues are documented in the following documents:
Business, impact, likelihood, along with prioritization, can be found in the Risk Treatment Plan.
ID.RM-1: Risk management processes are established, managed, and agreed to by organizational
stakeholders
ID.RM-2: Organizational risk tolerance is determined and clearly expressed
ID.RM-3: The organization's determination of risk tolerance is informed by its role in critical
infrastructure and sector specific risk analysis
Our organization currently does not have a Risk Management Strategy that meets the criteria set
forth in the NIST Cybersecurity Framework.
Supply Chain Risk Management (ID.SC): The organization's priorities, constraints, risk tolerances,
and assumptions are established and used to support risk decisions associated with managing supply
chain risk. The organization has established and implemented the processes to identify, assess and
manage supply chain risks.
ID.SC-1: Cyber supply chain risk management processes are identified, established, assessed,
managed, and agreed to by organizational stakeholders
Our organization currently does not have an established, assessed, and managed Supply Chain
Risk Management Strategy agreed to by organizational stakeholders.
ID.SC-2: Suppliers and third-party partners of information systems, components, and services are
identified, prioritized, and assessed using a cyber supply chain risk assessment process
None
ID.SC-3: Contracts with suppliers and third-party partners are used to implement appropriate measures
designed to meet the objectives of an organization's cybersecurity program and Cyber Supply Chain
Risk Management Plan.
A description of the cyber supply chain risk assessment process was not provided.
ID.SC-4: Suppliers and third-party partners are routinely assessed using audits, test results, or other
forms of evaluations to confirm they are meeting their contractual obligations
Our suppliers and third-party partners are not routinely assessed using audits, test results, or
other forms of evaluations to confirm they are meeting their contractual obligations.
ID.SC-5: Response and recovery planning and testing are conducted with suppliers and third-party
providers
Our organization does not include our suppliers and third-party providers as part of our response
and recovery planning and testing.
4 - Protect (PR)
PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized
devices, users and processes
Our organization does not have a documented process in place to issue, manage, verify, revoke
and audit for authorized devices, users and processes.
As part of the assessment process an audit of authorized devices and users was performed.
Details of the audit can be found in the User Access Review Worksheet and the Asset Inventory
Worksheet.
Audit Results
PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least
privilege and separation of duties
As part of the assessment process, an Administrator review and review of Security Groups is performed.
Administrator Review
Domain Administrators and Administrators in general tend to have a higher level of access than another
user and should be clearly identified. The following is a list of all users with administrative roles regarding
the network environment.
Domain: myclientsnetwork.com
More than 30 % of the users are in the Domain Administrator group and have unfettered access to
files and system resources. *
Security Groups
Security Groups are used to segment permissions allowing for least privilege access to resources.
Domain: myclientsnetwork.com
Account Operators
(myclientsnetwork.com/Builtin/Account
Operators)
0 Total: 0 Enabled, 0 Disabled
Backup Operators
(myclientsnetwork.com/Builtin/Backup
Operators)
0 Total: 0 Enabled, 0 Disabled
Cert Publishers
(myclientsnetwork.com/Users/Cert
Publishers)
0 Total: 0 Enabled, 0 Disabled
Cryptographic Operators
(myclientsnetwork.com/Builtin/Cryptogr
aphic Operators)
0 Total: 0 Enabled, 0 Disabled
Denied RODC Password Replication Enabled: A Smith, Administrator, D Brown, D Kindle, D White, DC01,
Group DC02, J Shearing, J Westerfield, L Wilson, M Green, M Peters, M
(myclientsnetwork.com/Users/Denied Simpson, P Kettering, P Sulu, T Harris, unitbdr admin, W Paulson
RODC Password Replication Group) Disabled: A Branaugh, S Kulynee
20 Total: 18 Enabled, 2 Disabled
DHCP Administrators
DHCP Users
(myclientsnetwork.com/Users/DHCP
Users)
0 Total: 0 Enabled, 0 Disabled
DnsAdmins
(myclientsnetwork.com/Users/DnsAdmi
ns)
0 Total: 0 Enabled, 0 Disabled
DnsUpdateProxy
(myclientsnetwork.com/Users/DnsUpda
teProxy)
0 Total: 0 Enabled, 0 Disabled
Human Resources Enabled: Aaron Rogers, Eric Bland, Jabez Kristian, Jerry Coleman, Marley
(myclientsnetwork.com/Groups/Human Jones, Pat Wysocki, Stan James
Resources)
7 Total: 7 Enabled, 0 Disabled
Hyper-V Administrators
(myclientsnetwork.com/Builtin/Hyper-V
Administrators)
0 Total: 0 Enabled, 0 Disabled
IIS_IUSRS
(myclientsnetwork.com/Builtin/IIS_IUSR
S)
0 Total: 0 Enabled, 0 Disabled
Key Admins
(myclientsnetwork.com/Users/Key
Admins)
0 Total: 0 Enabled, 0 Disabled
Print Operators
(myclientsnetwork.com/Builtin/Print
Operators)
0 Total: 0 Enabled, 0 Disabled
Protected Users
(myclientsnetwork.com/Users/Protected
Users)
0 Total: 0 Enabled, 0 Disabled
Replicator
(myclientsnetwork.com/Builtin/Replicato
r)
0 Total: 0 Enabled, 0 Disabled
Server Operators
(myclientsnetwork.com/Builtin/Server
Operators)
0 Total: 0 Enabled, 0 Disabled
Our organization does not currently protect network integrity through network segregation,
network segmentation, or other means.
PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions
Our organization uses Active Directory for user management to assert identities and verify them against
credentials. The users are used as the basis for determining access rights.
The following applications and external systems were verified for use of authentication:
PR.AC-7: Users, devices, and other assets are authenticated (e.g., single-factor, multi-factor)
commensurate with the risk of the transaction (e.g., individuals' security and privacy risks and other
organizational risks)
A review of the authentication methods used for users, devices, and other assets was performed looking
for deficiencies where the method of authentication (e.g., single-factor, multi-factor) not commensurate
with the risk of the transaction (e.g., individuals' security and privacy risks and other organizational risks)
All users have not received cybersecurity awareness education and training as part of their on-
boarding and on a routine basis.
Privileged users have not received enhanced cybersecurity awareness education and training
describing their roles and responsibilities.
PR.AT-3: Third-party stakeholders (e.g., suppliers, customers, partners) understand their roles and
responsibilities
We have not communicated to third-party stakeholders their roles and responsibilities with
regards to cybersecurity.
Senior executives have not received enhanced cybersecurity awareness education and training
describing their roles and responsibilities.
PR.AT-5: Physical and cybersecurity personnel understand their roles and responsibilities
Physical and cybersecurity personnel have not received enhanced cybersecurity awareness
education and training describing their roles and responsibilities.
4.3.1 - Data-at-rest
4.3.2 - Data-in-transit
PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition
Our organization does not formally manage assets throughout removal, transfers, and
disposition.
Our organization does not employ a monitoring system to ensure adequate disk and storage is
available to ensure data availability.
Firewalls
Our organization does not deploy firewalls between the internal network and all externally facing
network connections.
PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information
integrity
Our organization does not employ integrity checking mechanisms to verify software, firmware,
and information integrity.
PR.DS-7: The development and testing environment(s) are separate from the production environment
The Development and Testing Environments are not separated from the production environment.
Our organization does not employ integrity checking mechanisms to verify hardware integrity.
Our organization has not created and maintained a baseline configuration of information
technology/industrial control systems incorporating security principles (e.g. concept of least
functionality).
Our organization has not implemented a System Development Life Cycle to manage systems.
PR.IP-5: Policy and regulations regarding the physical operating environment for organizational assets
are met
Policy and regulations regarding the physical operating environment for organizational assets are
not met.
PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident
Recovery and Disaster Recovery) are in place and managed
Response plans (Incident Response and Business Continuity) and recovery plans (Incident
Recovery and Disaster Recovery) are not in place and managed.
PR.MA-1: Maintenance and repair of organizational assets are performed and logged, with approved
and controlled tools
Maintenance and repair of organizational assets are not performed and logged, with approved and
controlled tools.
Remote maintenance of organizational assets is not approved, logged, and performed in a manner
that prevents unauthorized access.
PR.PT-1: Audit/log records are determined, documented, implemented, and reviewed in accordance
with policy
Audit/log records are not determined, documented, implemented, and reviewed in accordance
with policy.
PR.PT-2: Removable media is protected and its use restricted according to policy
Removable media is not protected and its use restricted according to policy
PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only
essential capabilities
The principle of least functionality is not incorporated by configuring systems to provide only
essential capabilities.
PR.PT-5: Mechanisms (e.g., failsafe, load balancing, hot swap) are implemented to achieve resilience
requirements in normal and adverse situations
Mechanisms (e.g., failsafe, load balancing, hot swap) are not implemented to achieve resilience
requirements in normal and adverse situations.
5 - Detect (DE)
DE.AE-1: A baseline of network operations and expected data flows for users and systems is
established and managed
A baseline of network operations and expected data flows for users and systems is established and
managed using the following tools:
● Visio
DE.AE-2: Detected events are analyzed to understand attack targets and methods
Detected events are not analyzed to understand attack targets and methods.
DE.AE-3: Event data are collected and correlated from multiple sources and sensors
Event data are not collected and correlated from multiple sources and sensors.
The network is monitored to detect potential cybersecurity events using the following tools:
● Cyber Hawk
CCTV implemented and monitored throughout the organization's physical office location.
Network user access logs are reviewed on a weekly basis to identify network access anomalies. When
such anomalies are identified, the internal security team investigates the anomaly and identifies the
anomaly's root cause. Then corrective action is taken.
As part of this assessment process, an automated scan of the various end points was performed to
ensure anti-malware applications are in place. Below is a summary of the findings. See the Antivirus
Verification Worksheet for detailed findings.
● EXCHSVR01
● SQLSVR01
DE.CM-6: External service provider activity is monitored to detect potential cybersecurity events
External service providers are contractually required to report all cyber security events to the
organization.
DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed
Network user access logs are reviewed on a weekly basis to identify network access anomalies. When
such anomalies are identified, the internal security team investigates the anomaly and identifies the
anomaly's root cause. Then corrective action is taken.
As part of the assessment process, vulnerabilities are scanned for and detected within the network.
Issues are noted in the Risk Treatment Plan.
Additionally, an external vulnerability scan was performed. The results are summarized below and in the
NIST External Vulnerability Scan Detail by Issue Report.
See the NIST External Vulnerability Scan Detail by Issue Report for complete results.
97.72.92.49 (97-72-92-49-static.atl.earthlinkbusiness.net)
Medium (CVSS: 5)
NVT: OpenSSH auth2-gss.c User Enumeration Vulnerability (Windows) (OID: 22
1.3.6.1.4.1.25623.1.0.813887)
This host is installed with openssh and is prone to user enumeration vulnerability.
Medium (CVSS: 5)
NVT: OpenSSH sftp-server Security Bypass Vulnerability (Windows) (OID: 22
1.3.6.1.4.1.25623.1.0.812050)
This host is installed with openssh and is prone to security bypass vulnerability.
Medium (CVSS: 5)
NVT: OpenSSH User Enumeration Vulnerability-Aug18 (Windows) (OID: 22
1.3.6.1.4.1.25623.1.0.813863)
This host is installed with openssh and is prone to user enumeration vulnerability.
DE.DP-1: Roles and responsibilities for detection are well defined to ensure accountability
Roles and responsibilities for detection are not well defined to ensure accountability.
Cyber Hawk alerts are reviewed for accuracy and consistency on a monthly basis.
6 - Respond (RS)
RS.CO-1: Personnel know their roles and order of operations when a response is needed
Our personnel have not been trained to know their roles and order of operations when a response
is needed.
Coordination with stakeholders does not occur consistent with response plans.
RS.CO-5: Voluntary information sharing occurs with external stakeholders to achieve broader
cybersecurity situational awareness
Voluntary information sharing does not occur with external stakeholders to achieve broader
cybersecurity situational awareness.
As part of the assessment process, we reviewed our organization's response plan and recent response
plan executions to ensure proper analysis has been or will be performed.
As part of the assessment process, we reviewed our organization's response plan and recent response
plan executions to ensure proper mitigation has been or will be performed.
Our response strategies have not been reviewed and updated within the past 90 days.
7 - Recover (RC)
See:
The recovery plan has not been or may not be executed during or after an incident.
Our recovery strategies have not been reviewed and updated within the past 90 days.
As part of the recovery strategy, public relations are considered and managed.
See:
As part of the recovery strategy, a program is not in place to repair reputation both internally and
externally.
RC.CO-3: Recovery activities are communicated to internal and external stakeholders as well as
executive and management teams
Recovery activities are not communicated to internal and external stakeholders as well as
executive and management teams.