Level 5 CMMC - CMMC Practices

SI.2.214  

Reference: CMMC 1.02

Family: SI

Level Introduced: 2

Practice:
Monitor system security alerts and advisories and take action in response.

CMMC Clarification:
Organizations should receive security alerts, advisories, and directives from reputable external organizations. You base identification of these organizations on sector, industry, and the technology you use. There are many ways to received alerts and advisories and may include:
• signing up for email distributions;
• subscribing to RSS feeds; and
• attending meetings.

Organizations should review alerts and advisories for applicability as they receive them. An organization decides on its own review cycle. The more frequent the alerts and advisories, the more frequent the reviews. This ensures that the organization has the most up-to-date information.

External alerts and advisories may prompt an organization to generate internal security alerts, advisories, or directives. Share these with all personnel with a need-to-know. The individuals should take action to respond to the alerts. Actions vary according to the alert or advisory. Sometimes it may require a system configuration update. Other times, the organization may use the information for situational awareness purposes.

Example
One of your IT responsibilities is to protect your organization’s computers. As part of your job you decide you need to pay attention to security alerts and advisories to keep aware of the latest threats and risks. You decide to receive alerts from US-CERT and a set of ISACs. You review the alerts on a weekly basis to determine if they are relevant to your organization. When you identify one you follow your plan to correct information system flaws in a timely manner, such as installing a patch.

3.14.3

Monitor system security alerts and advisories and take action in response.

Discussion:
There are many publicly available sources of system security alerts and advisories. For example, the Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) generates security alerts and advisories to maintain situational awareness across the federal government and in nonfederal organizations. Software vendors, subscription services, and industry information sharing and analysis centers (ISACs) may also provide security alerts and advisories. Examples of response actions include notifying relevant external organizations, for example, external mission/business partners, supply chain partners, external service providers, and peer or supporting organizations

[SP 800-161] provides guidance on supply chain risk management.

Source: NIST Special Publication 800-171 Rev. 2

SI-5

SECURITY ALERTS, ADVISORIES, AND DIRECTIVES

Description:
The organization:
    a. Receives information system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis;
    b. Generates internal security alerts, advisories, and directives as deemed necessary;
    c. Disseminates security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and
    d. Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.

Supplemental Guidance:
The United States Computer Emergency Readiness Team (US-CERT) generates security alerts and advisories to maintain situational awareness across the federal government. Security directives are issued by OMB or other designated organizations with the responsibility and authority to issue such directives. Compliance to security directives is essential due to the critical nature of many of these directives and the potential immediate adverse effects on organizational operations and assets, individuals, other organizations, and the Nation should the directives not be implemented in a timely manner. External organizations include, for example, external mission/business partners, supply chain partners, external service providers, and other peer/supporting organizations. Related control: SI-2.

Source: NIST Special Publication 800-53 Rev. 4

Source: CMMC v1.02