- UO.1 CMS:Registration
- UO.2 CMS: Management (OS)
- UO.3 CMS: Management (Apps)
- UO.4 Vulnerability Scanning
- UO.5 Penetration Testing
- UO.6 Organizational communication and data flows are mapped
- UO.7 Externals services must be compliant with UO Minimum Security Standards & Controls
- UO.8 Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification
- UO.9 Cybersecurity roles and responsibilities for the entire userbase are established
- UO.10 Cybersecurity roles and responsibilities for the third party stakeholders (e.g., suppliers, customers, partners) are established
- UO.11 The organization’s place in critical infrastructure and its industry sector is identified and communicated
- UO.12 Priorities for organizational mission, objectives, and activities are established and communicated
- UO.13 Privileged users understand their roles and responsibilities
- UO.14 Conduct a Risk Assessment
- UO.15 Physical Security
- UO.16 Wall Jack Access Control
- UO.17 System Hardening
- UO.18 Security Baseline
- UO.19 Security Updates
- UO.20 Application Blocklisting
- UO.21 Anti-malware
- UO.22 Auto-lock screens or consoles
- UO.23 Firewall (Host-based)
- UO.24 Firewall (Network)
- UO.25 Encryption: Data-at-Rest
- UO.26 Encryption: Data-in-Transit
- UO.27 Encryption: Full Disk
- UO.28 User Access Control: Unique Access Account
- UO.29 User Access Control: Least Privilege Access
- UO.30 User Access Control: Access Approval
- UO.31 User Access Control: Authentication
- UO.32 User Access Control: Limit Failed Login Attempts
- UO.33 User Access Control: Inactive Session Timeout
- UO.34 User Access Control: Two-Factor Authentication
- UO.35 User Access Control: Remote Privileged Access Session Security
- UO.36 Web Reputation Filtering
- UO.37 Security and privacy architectures
- UO.38 Power requirements
- UO.39 Remote access is managed
- UO.40 All users are informed and trained
- UO.41 Data is destroyed according to policy
- UO.42 Cybersecurity is included in human resources practices (e.g. personnel screening, deprovisioning)
- UO.43 Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes
- UO.44 Incident Response Plan is developed
- UO.45 Logging and Retention
- UO.46 Log Monitoring
- UO.47 File Integrity Monitoring
- UO.48 Incident Recovery: Backup & Recovery
- UO.49 Incident Recovery: Restoration Testing
- UO.50 Determine critically of Information system components
- UO.51 Resiliency requirements will be established based on data classification
- UO.52 Organizational cybersecurity policy is established and communicated
- UO.53 Cyber threat intelligence is received from information sharing forums and sources
- UO.54 Risk management processes are established, managed, and agreed to by organizational stakeholders
- UO.55 Cyber supply chain risk management processes are identified, established, assessed, managed, and agreed to by organizational stakeholders
- UO.56 Separation of system and user functionality
System Operating Systems shall be managed via an ISO approved Configuration Management System (CMS).
- 30 days for critical risk vulnerabilities (CVSS 9.0 -10.0)
- 90 days for high risk vulnerabilities (CVSS 7.0 -8.9)
- 120 days for medium risk vulnerabilities (CVSS 4.0 -6.9)
- As time allows for low risk vulnerabilities (CVSS 0.1 -3.9)
Our adversaries are constantly scanning our environment in search of vulnerable systems that can be exploited. Addressing ISO identified vulnerabilities in an expeditious manner significantly reduces the risk of the systems and data compromise.
UO.14 Conduct a Risk Assessment
Conducting risk assessments includes the following specific tasks:
- Identify threat sources that are relevant to organizations
- Identify threat events that could be produced by those sources
- Identify vulnerabilities within organizations that could be exploited by threat sources through specific threat events and the predisposing conditions that could affect successful exploitation
- Determine the likelihood that the identified threat sources would initiate specific threat events and the likelihood that the threat events would be successful
- Determine the adverse impacts to organizational operations and assets, individuals, other organizations, and the Nation resulting from the exploitation of vulnerabilities by threat sources (through specific threat events)
- Determine information security risks as a combination of likelihood of threat exploitation of vulnerabilities and the impact of such exploitation, including any uncertainties associated with the risk determinations.
Track risk to system and data by:
UO.20 Application Blocklisting
Application Blocklist shall be used to prevent “known bad” applications from executing.
UO.29 User Access Control: Least Privilege Access
Least privilege shall be employed to provide the minimum privileges to users and processes.
UO.30 User Access Control: Access Approval
Access and privileges shall be authorized by the system owner and reviewed at regular intervals.
UO.31 User Access Control: Authentication
Authentication shall be required for all access to the system.
UO.34 User Access Control: Two-Factor Authentication
Two-factor authentication refers to the combination of any two of the following factors:
- something you know(e.g., a password or PIN)
- something you have(e.g., a phone, a token, proximity access card, a digital certificate)
- something you are(e.g., finger print, hand scan, iris scan, etc.)
UO.35 User Access Control: Remote Privileged Access Session Security
Encrypted communication protocols shall be used for remote privileged access to the system.
UO.41 Data is destroyed according to policy
Data is destroyed according to this standard and in accordance to Data Retention policy.
UO.51 Resiliency requirements will be established based on data classification
Data classification (Red, Amber, and Green) accounts for both criticality and sensitivity of data.
UO.52 Organizational cybersecurity policy is established and communicated
UO.53 Cyber threat intelligence is received from information sharing forums and sources
Monitoring the websites of your software vendors and reading relevant industry publications for news about emerging threats and available defenses.
UO.56 Separation of system and user functionality
Separate user functionality, including user interface services, from system management.