
Applicable (Y)es / (N)o |
(C)onfidentiality |
(I)ntegrity |
(A)vailability |
RPN (C+I+A) |
(S)atisfactory |
||||||
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
L1 |
M2 |
H3 |
(O)ther than satisfactory +## |
||
|
|
|
|
|
|
|
|
|
|
|
|
###
ac-16 |
security attributes |
|||
|
assessment objective: Determine if the organization: |
|||
ac-16(a) |
ac-16(a)[1] |
defines types of security attributes to be associated with information: |
||
ac-16(a)[1][a] |
in storage; |
|||
ac-16(a)[1][b] |
in process; and/or |
|||
ac-16(a)[1][c] |
in transmission; |
|||
ac-16(a)[2] |
defines security attribute values for organization-defined types of security attributes; |
|||
ac-16(a)[3] |
provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information: |
|||
ac-16(a)[3][a] |
in storage; |
|||
ac-16(a)[3][b] |
in process; and/or |
|||
ac-16(a)[3][c] |
in transmission; |
|||
ac-16(b) |
ensures that the security attribute associations are made and retained with the information; |
|||
ac-16(c) |
ac-16(c)[1] |
defines information systems for which the permitted organization-defined security attributes are to be established; |
||
ac-16(c)[2] |
defines security attributes that are permitted for organization-defined information systems; |
|||
ac-16(c)[3] |
establishes the permitted organization-defined security attributes for organization-defined information systems; |
|||
ac-16(d) |
ac-16(d)[1] |
defines values or ranges for each of the established security attributes; and |
||
|
ac-16(d)[2] |
determines the permitted organization-defined values or ranges for each of the established security attributes. |
||
potential assessment methods and objects: Examine: [select from: Access control policy; procedures addressing the association of security attributes to information in storage, in process, and in transmission; information system design documentation; information system configuration settings and associated documentation; information system audit records; other relevant documents or records]. Interview: [select from: System/network administrators; organizational personnel with information security responsibilities; system developers]. Test: [select from: Organizational capability supporting and maintaining the association of security attributes to information in storage, in process, and in transmission]. |
||||