Show/Hide Toolbars

ABCI Consultants

Guidance for NIST 800-171 Assessment & Compliance

Navigation: SA-FAMILY: SYSTEM AND SERVICES ACQUISITION

SA-15(7) DEVELOPMENT PROCESS, STANDARDS, AND TOOLS  |  AUTOMATED VULNERABILITY ANALYSIS

Scroll Prev Top Next More

Applicable

(Y)es / (N)o

(C)onfidentiality

(I)ntegrity

(A)vailability

RPN

(C+I+A)

(S)atisfactory

L1

M2

H3

L1

M2

H3

L1

M2

H3

(O)ther than satisfactory +##

 

 

 

 

 

 

 

 

 

 

 

 

###

sa-15(7)

development process, standards, and tools  | automated vulnerability analysis

 

assessment objective:

Determine if the organization:

sa-15(7)(a)

sa-15(7)(a)[1]

defines tools to be used to perform automated vulnerability analysis of the information system, system component, or information system service;

sa-15(7)(a)[2]

requires the developer of the information system, system component, or information system service to perform an automated vulnerability analysis using organization-defined tools;

sa-15(7)(b)

requires the developer of the information system, system component, or information system service to determine the exploitation potential for discovered vulnerabilities;

sa-15(7)(c)

requires the developer of the information system, system component, or information system service to determine potential risk mitigations for delivered vulnerabilities;

sa-15(7)(d)

sa-15(7)(d)[1]

defines personnel or roles to whom the output of the tools and results of the analysis are to be delivered; and

sa-15(7)(d)[2]

requires the developer of the information system, system component, or information system service to deliver the outputs of the tools and results of the analysis to organization-defined personnel or roles.

potential assessment methods and objects:

Examine: [select from: System and services acquisition policy; procedures addressing development process, standards, and tools; solicitation documentation; acquisition documentation; service-level agreements; acquisition contracts for the information system, system component, or information system service; vulnerability analysis tools and associated documentation; risk assessment reports; vulnerability analysis results; vulnerability mitigation reports; risk mitigation strategy documentation; other relevant documents or records].

Interview: [select from: Organizational personnel with system and services acquisition responsibilities; organizational personnel with information security responsibilities; system developer; organizational personnel performing automated vulnerability analysis on the information system].

Test: [select from: Organizational processes for vulnerability analysis of information systems, system components, or information system services under development; automated mechanisms supporting and/or implementing vulnerability analysis of information systems, system components, or information system services under development].

Hosted by ABCI Consultants for Information Security Management Systems | Implementations, Training and Assessments for Compliance | (800) 644-2056