Security Compliance: NIST 800-171 Questions
More digestible questions based off of the NIST 800-171 compliance framework.
Access Control
Is system access limited to approved individuals and limited to only the functions those individuals require to perform their jobs?
Are system functions restricted to only those deemed necessary?
Is the use of both personal and organizational devices restricted?
Awareness and Training:
Are all personnel trained in information security in accordance with their duties and responsibilities?
Audit and Accountability
Are all systems and machines logged to detect unauthorized or inappropriate system usage?
Is this information specific and protected?
Configuration Management
Is there a maintained baseline configuration for all systems?
Are all changes to system configurations tracked and approved before implementation?
Do these configurations restrict system usage to only essential functions?
Identification and Authorization
Are all users identified and authenticated using multi-factor processes?
Does the organization maintain strict password policies and protect authentication information?
Incident Response
Does the organization maintain a specific incident response plan?
Is this plan and the organization’s incident response capability tested regularly?
Maintenance
Does the organization perform system maintenance regularly?
Is this system maintenance performed with proper supervision and awareness of confidential information?
Media Protection
Is physical media containing confidential information properly marked, protected, and disposed of?
Personnel Security
Are individuals properly screened before accessing confidential information, and is confidential information protected during the termination or transfer of individuals?
Physical Protection
Is physical access to organizational facilities and systems limited to only authorized individuals and monitored?
Risk Assessment
Does the organization regularly perform an assessment determining the risk to organizational assets and remediate any found vulnerabilities in accordance with those assessments?
Security Assessment
Does the organization regularly perform an assessment determining the effectiveness of security controls in organizational systems, monitor said security controls for effectiveness, and correct any deficiencies found in these assessments?
System and Communications Protection
Does the organization have protections in place to protect information and communications internally and externally?
System and Information Integrity
Does the organization respond to system updates or alerts in a timely manner and maintain malicious code protection?
Are systems monitored for suspicious files, indicators of attack, and unauthorized usage?
Last updated