best security practices checklist

121
Be st Practices Securi ty Ch ec kl is t V2 R1 Januar y 29 , 2007 Field Securi ty Operations Checklist Defense Information Systems Agency Checklist Unclassified UNTIL FILLED IN CIRCLE ONE FOR OFFICIAL USE ONLY (mark each page) CONFIDENTIAL and SECRET (mark each page and each finding) Classification is based on classification of system reviewed: Unclassified System = FOUO Checklist Confidential System = CONFIDENTIAL Checklist Secret System = SECRET Checklist Top Secret System = SECRET Checklist STIGs do not apply to the service provided architecture, but STIGs must apply to the DoD Client architecture. V erify the application will function using a STIGed Client workstation and STIGed firewall. UNCLASSIFIED Reviewer: Date: System: Totals: Comments: Description: Documentation: Documentation: Total: 1

Upload: gaigoleb2

Post on 08-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 1/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security

Operations

Checklist Defense Information

Systems Agency

Checklist

Unclassified UNTIL FILLED IN

CIRCLE ONE

FOR OFFICIAL USE ONLY (mark each page)

CONFIDENTIAL and SECRET (mark each page and each finding)

Classification is based on classification of system reviewed:

Unclassified System = FOUO ChecklistConfidential System = CONFIDENTIAL Checklist

Secret System = SECRET Checklist

Top Secret System = SECRET Checklist

Reviewer: Date:

System:

Totals: Comments:

Description:

Documentation:

Documentation:

Total:

Page 2: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 2/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

GeneralVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

1 Does the vendor have a

documented and provable

security policy for IT?

List of Items to be Included1. Statement of Purpose

2. Organization structure

3. Physical Security

4. Hiring & termination

 procedures5. Data Classification

6. Access Control

7. Operating Systems

8. Hardware & Software

9. Internet Use

10. Email

11. Technical Support

12. Virus protection, firewall,

VPN, remote access

13. Backups & disaster recovery

14. Intrusion detection & incident

response

15. Personnel Security

16. Software Development

17. Outsourcing (off shore)

18. Help Desk Development

DCSD-1 Does not have a

 policy or cannot

describe policy = 0

Can describe policy = 1

Does not have a

 policy or policy is

not documented or documented but

does not include anyof the noted

items = 0 

Documented &

includes 1-9 of 18items = 1 

Documented &

included 10 – 18

items = 2

Does not have a

 policy or Site

cannot demonstrate policy = 0 

Site can

demonstrate policy but does not include

any of the noted

items = 1

Site candemonstrate policy

& it includes 1-9 of 

18 items = 2

Site candemonstrate policy

& it includes 10 – 18 of 18 items = 3

Score

UNCLASSIFIED2

Page 3: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 3/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

2 Is this policy reviewed and

updated on a regular basis?

Question to Ask 1. How often is the policy

updated?

DCAR-1 Does not have a

 policy or Cannotdescribe review &

update process = 0

Can describe

review & update process = 1

Does not have a

 policy or Policyreview & update is

not documented = 0

Can providedocumentation for 

review & update to

 be completed lessfrequently than

yearly = 1 

Can provide

documentation for review & update to

 be completed yearlyor more frequently

= 2

 Not Applicable

Score

UNCLASSIFIED3

Page 4: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 4/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

3 Does the vendor havemanagement buy-in to

security?

Does not have acorporate security policy with

management

approval or cannotdescribe their 

corporate security policy = 0

Can describe their 

corporate security policy = 1

Does not have acorporate security policy with

management

approval or cannot provide

documentation of their corporate

security policy = 0 

Can providedocumentation of their corporate

security policy = 2

 Not Applicable

Score

UNCLASSIFIED4

Page 5: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 5/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Access ControlVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

4 Is the application PKI enabled

for the client?

Question to Ask 1. Does the application use DoD

PKI or non-DoD PKI?

DCBP-1

DCMC-1

DCNR-1IAKM-1

IATS-1

Application is not

PKI enabled for theclient= 0 

Can describe

how their applicationuses PKI for their 

client = 1

Cannot provide

documentation thatdescribes

application PKIenabled for the

client = 0 

Can provide

documentation theapplication uses

non-DoD PKI = 1 

Can provide

documentation theapplication uses

DoD PKI = 2

Cannot demonstrate

the application isPKI enabled = 0 

Can demonstrate

the application usesnon-DoD PKI = 1 

Can demonstratethe application uses

DoD PKI = 2

Score

UNCLASSIFIED5

Page 6: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 6/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

5 Is the application PKI enabledfor the server and configured

to require PKI for

authentication?

Question to Ask 1. Does the application use DoD

PKI or non-DoD PKI?

DCBP-1DCMC-1

DCNR-1IAKM-1

IATS-1

Application is notPKI enabled for server & configured

to require PKI for 

authentication = 0 

Can describehow their application

is PKI enabled for the server &

configured to requirePKI for authentication = 1

Application is notPKI enabled for server & configured

to require PKI for 

authentication or cannot provide

documentation = 0 

Can providedocumentation

application is non-DoD PKI enabledfor the server &

configured torequire non-DoD

PKI for 

authentication = 1 

Can providedocumentation

application is DoDPKI enabled for the

server & configured

to require DoD PKIfor 

authentication = 2

Application is notPKI enabled for theserver & configured

to require PKI for 

authentication or cannot demonstrate

= 0 

Can demonstratethe application is

non-DoD PKIenabled for theserver & configured

to require non-DoDPKI for 

authentication = 2 

Can demonstrate

application is DoDPKI enabled for the

server & configuredto require DoD PKI

for 

authentication = 3

Score

UNCLASSIFIED6

Page 7: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 7/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

6 Does the vendor have robust

revocation checking?

PRAS-1 Does not have robust

revocationchecking = 0 

Does have robust

revocationchecking = 1

Do not have robust

revocationChecking or cannot provide

documentation = 0 

Can provide

documentation = 2

Do not have robust

revocationchecking or cannotdemonstrate = 0 

Can demonstrate process = 3

Score

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria7 Is there a registration process

for new users?

Question to Ask 1. Is the registration process

 provided to new users?

PRAS-1

EBBD-2

Does not have

registration processfor new users = 0 

Does have

registration processfor new

users = 1

Does not have

registration processfor new users or 

 process is notdocumented = 0 

Can provide

documentation but it

is not provided to

new users = 1 

Can provide

documentation & it

is provided to newusers = 2

Does not have

registration processfor new users or 

cannot demonstrateregistration process

= 0 

Can demonstrate

new user 

registration process= 3

Score

UNCLASSIFIED7

Page 8: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 8/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

8 Does the vendor have anaccess request form such as

Form 2875, System

Authorization Access Request

(SAAR)?

List of Items to be Included1. * Type of request (Initial,

Modification, Deactivation)

2. * System Name

3. System Location

4. * Date5. * Name

6. Social Security

 Number/Employee Number 

7. Organization

8. Phone Number 

9. * Email Address

10. Job Title

11. Physical Address

12. * Citizenship

13. User Agreement

14. * Justification for 

Access/Need to Know15. * Type of Access

16. * Supervisor Approval

17. * Security Manager 

Verification

18. * Verification of Need to

Know

PRAS-1ECAN-1ECPA-1

Does not have aform = 0

Can describeform = 1

Does not have aform or cannot provide form = 0

 Can provide blank 

form & it containsall of the asterisked

items = 1 

Can provide blank 

form & it containsall of the asterisked

items & all of thenon-asterisked

items = 2

Does not have aform or cannot provide form = 0

Can provide

completed form &it contains all of the

asterisked

items = 1 

Can providecompleted form &

it contains all of theasterisked

items & 1 – 4 of the

7 non-asteriskeditems = 2

Can provide

completed form &

it contains all of theasterisked

items & 5 - 7 of the7 non-asterisked

items = 3

Score

UNCLASSIFIED8

Page 9: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 9/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

9 Does the vendor have a role-based policy for user access?

Questions to Ask 

1. Do administrators have an

account for administrator 

work only & have an

additional account for other 

 purposes?

2. Are administrator privileges

only granted to administrators

& not to all users?3. Are limits put on each user 

who has access to the

application?

4. Are user privileges based on

need-to-know?

5. Are permissions periodically

reviewed to include

Superusers?

DCFA-1DCSD-1ECCD-1

ECPA-1,

ECAN-1ECIC-1

ECLP-1IAAC-1

PRNK-1

Does not have arole-based policy for user access or cannot

describe their role-

 based policy = 0

Can describe their 

role-based policy for 

user access = 1

Does not have arole-based policy for user access or 

cannot provide

documentation or can provide

documentation butthe documentation

includes answers toonly 1 - 2 of 

questions = 0 

Can providedocumentation &

the documentation

includes answers to3 - 4 of questions

= 1 

Can provide

documentation &the documentation

includes answers toall of the 5 questions

= 2

Does not have arole-based policyfor user access or 

cannot demonstrate

their policy = 0

Can demonstrate

the answers to 1 - 2of 5 questions = 1 

Can demonstrate

the answers to 3 - 4

of 5questions = 2

Can demonstrate

the answers to 5 of 

questions = 3

Score

UNCLASSIFIED9

Page 10: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 10/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

10 Is there a process for checkingfor inactive and terminated

users?

IAAC-1 Does not have a process for checkingfor inactive &

terminated

users or cannotdescribe process = 0

Can describe their 

 process for checkingfor inactive &

terminatedusers = 1

Does not have a process for checkingfor inactive &

terminated

users or the processis not documented

= 0 

Can providedocumentation for a

manual process = 1

Can provide

documentation for an automated

 process = 2

Does not have a process for checking for 

inactive &

terminatedusers or the process

cannot bedemonstrated = 0 

Can demonstrate

manual process = 2

Can demonstrate

automated process = 3

Score

UNCLASSIFIED10

Page 11: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 11/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

11 What is the period forrevocation of users? (the

length of the contract, one

year or which ever comes first)

Question to Ask 1. What is the length of the

revocation period?

IAIA-1 Does not have a period for revocationof users or cannot

describe period of 

revocation = 0 

Can describe periodfor revocation of 

users = 1

Does not have a period for revocation of 

users or cannot

 providedocumentation = 0 

Can provide

documentation for revocation of users

& the period is lessfrequently than thelength of the

contract or oneyear = 1

Can providedocumentation for 

revocation of users& the period is the

length of thecontract, or one

year or more

frequently = 2

Does not have a period for revocation of 

users or cannot

demonstrate thatusers are revoked

= 0 

Can demonstratethe revocation of 

users & the periodis less frequentlythan the length of 

the contract or oneyear = 2

Can demonstratethe revocation of 

users & the periodis the length of the

contract, or oneyear or more

frequently = 3

Score

UNCLASSIFIED11

Page 12: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 12/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

12 Does the vendor have a strongpassword policy?

List of Items to be Included

1. A minimum of nine characters

2. Includes at least one

uppercase alphabetic

character 

3. Includes at least one

lowercase alphabetic

character 

4. Includes at least one non-alphanumeric (special)

character 

5. Includes at least one numeric

character 

6. Expires after 60 days

7. Is different than the previous

10 passwords used

8. Is changeable by the

administrator at any time

9. Is changeable by the

associated user only once in a

24 hour period (for humanuser accounts)

10. Is not changeable by users

other than the administrator or 

the user with which the

 password is associated

IAIA-1 Does not have a password policy or cannot describe

 policy = 0

Can describe their  password policy =1

Does not have a password policy or  policy is not

documented = 0

 

Can providedocumentation for 

their policy & it

includes 1 – 5 of listed items = 1 

Can provide

documentation for their policy & it

includes 6 – 10 of 

listed items = 2 

Does not have a password policy or cannot demonstrate

their policy = 0

Can demonstratetheir policy & it

includes 1 – 4 of 

listed items = 1 

Can demonstratetheir policy & it

includes 5 – 7 of listed items = 2 

Can demonstratetheir policy & it

includes 8 - 10 of listed items = 3 

Score

UNCLASSIFIED12

Page 13: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 13/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

13 Does the vendor permit the

use of default accounts, defaultpasswords, community strings

or other default access control

mechanisms?

IAIA-1 Uses default access

controlmechanisms or cannot describe the

 prohibition of these

mechanisms = 0 

Can describe howthey do not use

default access controlmechanisms = 1

Uses default access

controlmechanisms or cannot provide

documentation for 

 prohibiting thesemechanisms = 0 

Can provide

documentation thatno default access

control mechanismsare used = 2

Uses default access

controlmechanisms or cannot demonstrate

that these are not in

use = 0 

Can demonstratethat no default

access controlmechanisms are

used = 3

Score

UNCLASSIFIED13

Page 14: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 14/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

14 Does the vendor permit theuse of shared accounts?

IAIA-1 Permits sharedaccounts or cannotdescribe how shared

accounts are not

 permitted = 0 

Can describe howshared accounts are

not permitted = 1

Permits sharedaccounts or cannot provide

documentation

which prohibitsshared accounts = 0

Can provide

documentation that prohibits shared

accounts = 2

Permits sharedaccounts or cannotdemonstrate that no

shared accounts are

used = 0 

Can demonstratethat no shared

accounts areused = 3

Score

UNCLASSIFIED14

Page 15: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 15/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

ConfidentialityVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

15 Does the vendor utilize

appropriate file permissions

on sensitive data?

Question to Ask 1. Are file permissions based on

roles & need to know?

DCSR-2

ECCD-1

ECIC-1ECPA-1

ECTP-1

Does not have

appropriate file

 permissions onsensitive data or 

cannot describe their file permissions on

sensitive data = 0

Can describe their 

file permissions &they are appropriate

for sensitive data = 1

Does not have

appropriate file

 permissions onsensitive data or 

cannot providedocumentation on

sensitive data file permissions = 0

 

Can providedocumentation that

system file

 permissions areappropriate for 

sensitive data = 1 

Can providedocumentation that

system file &

application file permissions are

appropriate for sensitive data = 2

Does not have

appropriate file

 permissions onsensitive data or 

cannot demonstratefile permissions on

sensitive data = 0

Can demonstrate

that system file permissions are

appropriate for 

sensitive data = 2 

Can demonstrate

that system file &application file

 permissions are

appropriate for sensitive data = 3

Score

UNCLASSIFIED15

Page 16: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 16/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

16 Are authentication credentialsstored in an encrypted

format?

DCNR-1DCSR-2ECCR-1

IAIA-1

IAKM-1

Authenticationcredentials are notstored in encrypted

format or cannot

describe howencryption is used to

store authenticationcredentials = 0 

Can describe how

authenticationcredentials are storedin encrypted format

= 1

Authenticationcredentials are notstored in encrypted

format or cannot

 providedocumentation of 

the requirement = 0

Can providedocumentation that

authenticationcredentials arestored in encrypted

format = 2

Authenticationcredentials are notstored in encrypted

format or cannot

demonstrate thatauthentication

credentials arestored in encrypted

format = 0 

Can demonstratethat authenticationcredentials are

stored in encryptedformat = 3

Score

UNCLASSIFIED16

Page 17: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 17/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

17 Is NIST-certifiedcryptography (SSL) used with

unclassified, sensitive web

traffic?

DCMC-1DCNR-1DCSR-2

ECCT-1ECNK-1

 NIST-certifiedcryptography is notused for unclassified,

sensitive web

traffic or cannotdescribe how it is

used = 0 

Can describe howSSL is used with

unclassified,sensitive web traffic= 1

 NIST-certifiedcryptography is notused for 

unclassified,

sensitive webtraffic or cannot

 providedocumentation of 

the requirement touse NIST-certified

cryptography = 0 

Can provide

documentation thatSSL is used with

unclassified,

sensitive web traffic= 2

 NIST-certifiedcryptography is notused for 

unclassified,

sensitive webtraffic or cannot

demonstrate how itis used = 0 

Can demonstrate

that SSL is usedwith unclassified,sensitive web traffic

= 3

Score

UNCLASSIFIED17

Page 18: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 18/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

18 Is NIST-certifiedcryptography (SSL) used to

protect DoD sensitive data and

data in transit?

DCMC-1DCNR-1DCSR-2

ECCT-1ECNK-1

 NIST-certifiedcryptography is notused to protect DoD

Sensitive data & data

in transit or cannotdescribe how it is

used = 0 

Can describe howSSL is used to

 protect DoDSensitive data & datain transit = 1

 NIST-certifiedcryptography is notused to protect DoD

Sensitive data &

data in transit or cannot provide

documentationwhich states this

requirement = 0 

Can providedocumentation thatSSL is used to

 protect DoDSensitive data &

data in transit = 2

 NIST-certifiedcryptography is notused to protect DoD

Sensitive data &

data in transit or cannot demonstrate

this requirement = 0

Can demonstratethat SSL is used to

 protect DoDSensitive data &data in transit = 3

Score

UNCLASSIFIED18

Page 19: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 19/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

19 Are the authenticationcredentials encrypted during

transmission?

DCNR-1DCSR-2ECCR-1

IAIA-1

IAKM-1

Authenticationcredentials are notencrypted during

transmission or 

cannot describe howthey are encrypted

= 0 

Can describe howauthentication

credentials areencrypted duringtransmission = 1

Authenticationcredentials are notencrypted during

transmission or 

cannot providedocumentation of 

this requirement = 0

Can providedocumentation that

authenticationcredentials areencrypted during

transmission = 2

Authenticationcredentials are notencrypted during

transmission or 

cannot demonstratethis requirement = 0

 Can demonstrate

that authenticationcredentials are

encrypted duringtransmission = 3

Score

UNCLASSIFIED19

Page 20: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 20/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

20 Does the vendor maintainseparation of data to prevent

disclosure of DoD

information?

DCFA-1DCSR-1ECIC-1

Does not maintainseparation of data or cannot describe how

data will be separated

= 0 

Can describe howthey will maintain

separation of data= 1

Does not maintainseparation of data or cannot provide

documentation

requiring separationof data = 0 

Can provide

documentation thatVendor does

maintain separationof data = 2

Does not maintainseparation of dataor cannot

demonstrate the

separation of data =0 

Can demonstrate

that Vendor doesmaintain separation

of data = 3

Score

UNCLASSIFIED20

Page 21: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 21/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

IntegrityVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria21 Does the vendor have a trust

mark or site seal to validate

users have reached the vendor

site?

Does not have a trust

mark or site seal or 

cannot describe their trust mark or site seal

= 0 

Has a trust mark or site seal = 1

Does not have a

trust mark or site

seal or thisrequirement is not

documented = 0 

Can providedocumentation that

Vendor has a trust

mark or site seal = 2

Does not have a

trust mark or site

seal or cannot showtheir trust meal or 

site seal = 0 

Can show thatVendor has a trust

mark or site seal =

3Score

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

22 Are the documents loaded to

the vendor site scanned for

viruses prior to posting?

ECVP-1 Does not virus scan

documents prior to

 posting or cannotdescribe their 

scanning process = 0

Can describe their  process for virus

scanning documents

 prior to posting = 1

Does not virus scan

documents prior to

 posting or process isnot documented = 0

Can providedocumentation thatVendor does virus

scan documents

 prior to posting = 2

Does not virus scan

documents prior to

 posting or cannotdemonstrate

scanning = 0 

Can demonstratethat Vendor does

virus scan

documents prior to posting = 3

Score

UNCLASSIFIED21

Page 22: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 22/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

23 Are virus signatures updatedat least every 14 days?

Question to Ask 1. Is the process manual or 

automated?

ECVP-1 Virus signatures arenot updated at leastevery 14 days or 

vendor cannot

describe update process = 0 

Can describe process

used to update Virussignatures at least

every 14 days = 1

Virus signatures arenot updated at leastevery 14 days or 

update process is

not documented = 0

Can providedocumentation that

Virus signatures areupdated at least

every 14 days usinga manual process= 1

Can provide

documentation that

Virus signatures areupdated at least

every 14 days usinga automated process

= 2

Virus signatures arenot updated at leastevery 14 days or 

update process

cannot bedemonstrated = 0 

Can demonstrate

that Virussignatures are

updated at leastevery 14 days usinga manual process

= 2

Can demonstrate

that Virussignatures are

updated at leastevery 14 days using

a automated process= 3

Score

UNCLASSIFIED 22

Page 23: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 23/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

24 Does the vendor scan theserver for viruses on a regular

basis?

Question to Ask 1. How often does the vendor 

scan for viruses?

ECVP-1 Does not scan for viruses on a regular  basis or cannot

describe scanning

 process = 0 

Can describescanning process &

how frequentlyscanning is done = 1

Does not scan for viruses on a regular  basis or cannot

 provide

documentation of scanning process

= 0 

Can providedocumentation that

Vendor scans for viruses lessfrequently than

weekly = 1

Can provide

documentation thatVendor scans for 

viruses weekly or more frequently = 2

Does not scan for viruses on a regular  basis or cannot

demonstrate

scanning = 0 

Can demonstratethat Vendor scans

for viruses lessfrequently than

weekly = 2

Can demonstrate

that Vendor scansfor viruses weekly

or more frequently

= 3

Score

UNCLASSIFIED 23

Page 24: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 24/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

25 Does the vendor scan theserver for spyware on a

regular basis?

Question to Ask 2. How often does the vendor 

scan for spyware?

ECVP-1 Does not scan for spyware on a regular  basis or cannot

describe scanning

 process = 0 

Can describe processused for scanning for 

spyware & howfrequently scanning

is completed = 1

Does not scan for spyware on aregular basis or 

cannot provide

documentation of  process= 0 

Can provide

documentation thatVendor scans for 

spyware lessfrequently thanweekly = 1

Can provide

documentation that

Vendor scans for spyware weekly or 

more frequently = 2

Does not scan for spyware on aregular basis or 

cannot demonstrate

scanning process= 0 

Can demonstrate

that Vendor scansfor spyware less

frequently thanweekly = 2

Can demonstratethat Vendor scans

for spyware weekly

or more frequently= 3

Score

UNCLASSIFIED 24

Page 25: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 25/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

26 Does the vendor scan theserver for adware on a regular

basis?

Question to Ask 1. How often does the vendor 

scan for adware?

ECVP-1 Vendor does not scanfor adware on aregular basis or 

cannot describe

scanning process = 0

Vendor can describe process used to scan

for adware & howfrequently scanning

is completed = 1

Vendor does notscan for adware on aregular basis or 

cannot provide

documentation of scanning = 0 

Can provide

documentation thatVendor scans for 

adware lessfrequently thanweekly = 1

Can provide

documentation that

Vendor scans for adware weekly or 

more frequently = 2

Vendor does notscan for adware ona regular basis or 

cannot demonstrate

scanning process= 0 

Can demonstrate

that Vendor scansfor adware less

frequently thanweekly = 2

Can demonstratethat Vendor scans

for adware weekly

or more frequently= 3

Score

UNCLASSIFIED 25

Page 26: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 26/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

AvailabilityVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria27 Does the vendor have a policy

for backups?

List of Items to be Included1. Schedule for regular backups

2. Backups to be stored off-site

3. Recovery Plan

4. Clearly defined activities &

responsibilities of individuals

5. Policy should be tested

annually6. Personnel trained annually

7. Backups should maintain

separation of DoD data

COED-1

CODB-1

CODB-2COTR-1

Does not have a

 policy for backups or 

cannot describe backup policy = 0 

Vendor can describe

 policy for backups= 1

Does not have a

 policy for backups

or cannot providedocumentation of 

 policy or policydoes not include any

of the items listed= 0 

Can providedocumentation that

Vendor has policy& it includes 1 – 3

of listed items = 1

Can provide

documentation thatVendor has policy

& it includes 4 - 7 of 

listed items = 2

Does not have a

 policy for backups

or cannotdemonstrate

 backups = 0 

Can demonstratethat Vendor has

 policy and it

includes 1 – 2 of listed items = 1

Can demonstrate

that Vendor has

 policy and itincludes 3 - 4 of 

listed items = 2

Can demonstrate

that Vendor has policy and it

includes 5 - 7 of listed items = 3

Score

UNCLASSIFIED 26

Page 27: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 27/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

28 Does the vendor have adocumented, executable

process for backups?

Question to Ask 1. Is the process manual or 

automated?

COSW-1COTR-1 Does not have a backup process or cannot describe the

 process = 0 

Can describe backup

 process = 1

Does not have a backup process or cannot provide

documentation of 

their backup process= 0 

Can provide

documentation of the manual backup

 process = 1

Can provide

documentation of the automated

 backup process = 2

Does not have a backup process or cannot demonstrate

 backup process = 0

Can demonstrate

the manual backup process = 2

Can demonstrate

the automated backup process = 3

Score

UNCLASSIFIED 27

Page 28: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 28/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

29 Does the backup processinclude operating system files?

Question to Ask 1. Is the process manual or 

automated?

COBR-1 Backup process doesnot include operatingsystem files or 

cannot describe

 process = 0 

Can describe backup process & it includes

operating systemfiles = 1

Backup processdoes not includeoperating system

files or cannot

 providedocumentation of 

 process = 0 

Can providedocumentation of 

the manual backup process whichincludes operating

system files = 1

Can provide

documentation of the automated

 backup processwhich includes

operating systemfiles = 2

Backup processdoes not includeoperating system

files or cannot

demonstrate process= 0 

Can demonstrate

the manual backup process which

includes operatingsystem files = 2

Can demonstratethe automated

 backup process

which includesoperating system

files = 3

Score

UNCLASSIFIED 28

Page 29: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 29/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

30 Does the backup processinclude user data?

Question to Ask 1. Is the process manual or 

automated?

CODB-1 Backup process doesnot include user dataor cannot describe

 process = 0 

Can describe backup

 process & it includesuser data = 1

Backup processdoes not includeuser data or cannot

 provide

documentation of  process = 0 

Can provide

documentation of the manual backup

 process = 1

Can provide

documentation of the automated

 backup process = 2

Backup processdoes not includeuser data or cannot

demonstrate process

= 0 

Can demonstratethe manual backup

 process = 2

Can demonstratethe automated

 backup process = 3

Score

UNCLASSIFIED 29

Page 30: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 30/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

31 Is the backup process testedon a regular basis?

COED-1 Backup process isnot tested on aregular basis or 

cannot describe test

of backup process= 0 

Can describe backup

 process being testedon a regular basis

=1

Backup process isnot tested on aregular basis or 

cannot provide

documentation of testing backup

 process = 0 

Can providedocumentation that

 backup process istested on a regular  basis = 2

Backup process isnot tested on aregular basis or 

cannot demonstrate

that backup processhas been tested on a

regular basis = 0 

Can demonstratethat backup process

is tested on aregular basis = 3

Score

UNCLASSIFIED 30

Page 31: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 31/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

32 Are the results of the backupprocess verified?

COED-1 Backup processresults are notverified or cannot

describe verification

 process = 0 

Can describeverification of 

 backup process = 1

Backup processresults are notverified or cannot

 provide

documentation of verification of 

 backups = 0 

Can providedocumentation that

 backup processresults are verified= 2

Backup processresults are notverified or cannot

demonstrate

verification of  backup process = 0

Can demonstrate

that backup processresults are verified

= 3

Score

UNCLASSIFIED 31

Page 32: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 32/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

33 Are the backups stored off-site?

COSW-1Backup are notstored off-site or 

cannot describe

where backups arestored= 0 

Can describe off-site

storage of backups= 1

Backup are notstored off-site or 

cannot provide

documentationwhich requires

 backups to be storedoff-site = 0 

Can provide

documentation that

 backup are storedoff-site = 2

Backup are notstored off-site or 

cannot demonstrate

that backups arestored off-site = 0 

Can demonstrate

that backup arestored off-site = 3

Score

UNCLASSIFIED 32

Page 33: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 33/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

34 Does the vendor have a restoreand recovery process?

Things to Consider 1. Restore & Recovery node

2. High availability failover 

Question to Ask 1. Is the process manual or 

automated?

COSP-1COED-1

COEF-1

CODP-1

Does not have arestore & recovery

 process or cannot

describe their process= 0 

Can describe their 

restore & recovery process = 1

Does not haverestore & recovery

 process or cannot

 providedocumentation of 

this process = 0 

Can providedocumentation of 

manual restore &

recovery process = 1

Can providedocumentation of 

automated restore &

recovery process = 2

Does not have arestore & recovery

 process or cannot

demonstrate their  process = 0 

Can demonstrate

manual restore &recovery process =

2

Can demonstrate

automated restore& recovery process

= 3

Score

UNCLASSIFIED 33

Page 34: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 34/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

35 Is the restore and recoveryprocess tested on a regular

basis?

COED-1CODP-1COEF-1

COMS-1

Does not test their restore & recovery process or cannot

describe testing their 

 process = 0 

Can describe testingof restore & recovery

 process = 1

Does not test their restore & recovery process or cannot

 provide

documentation of this process = 0 

Can provide

documentation of the testing of 

restore & recovery process = 2

Does not test their restore & recovery process or cannot

demonstrate this

 process = 0 

Can demonstratethe testing of 

restore & recovery  process =3

Score

UNCLASSIFIED 34

Page 35: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 35/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

36 Have the results of therecovery and restore process

been verified?

CODP-1COEF-1 Results are notverified or cannotdescribe verification

  process =0 

Can describe

verification of results= 1

Results are notverified or cannot provide

documentation of 

verification process= 0 

Can provide

documentation thatresults have been

verified = 2

Results are notverified or cannotdemonstrate

verification of 

results = 0 

Can demonstrate

that results have been verified = 3

Score

UNCLASSIFIED 35

Page 36: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 36/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

37 Does the application support amaximum number of 

concurrent users based on

contract requirements without

impact to availability of 

application?

Things to Consider 1. Scalabili ty

Application does nothave maximumnumber of concurrent

users or cannot

describe maximumnumber of concurrent

users = 0 

Can describe thatapplication does have

a maximum number of concurrent users =1 

Application does nothave maximumnumber of 

concurrent users or 

cannot providedocumentation of 

this number = 0 

Can providedocumentation that

application hasmaximum number of concurrent users

 but maximumnumber is not

scalable = 1

Can provide

documentation thatapplication has

maximum number of concurrent users

& maximum

number is scalable= 2

Application doesnot have maximumnumber of 

concurrent users or 

cannot demonstratethe maximum

number of concurrent users = 0

Can demonstrate

that application hasmaximum number of concurrent users

 but this maximumnumber is not

scalable = 2

Can demonstrate

that application hasmaximum number 

of concurrent users& this maximum

number is scalable

= 3

Score

UNCLASSIFIED 36

Page 37: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 37/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

38 Does the application limit themaximum number of 

concurrent sessions per user?

ECLO-1 Application does nothave a maximumnumber of concurrent

sessions per user or 

cannot describemaximum number 

= 0 

Can describe thatapplication has

maximum number of concurrent sessions per user = 1 

Application does nothave a maximumnumber of 

concurrent sessions

 per user or cannot provide

documentation = 0 

Can providedocumentation that

application hasmaximum number of concurrent

sessions per user = 2

Application doesnot have amaximum number 

of concurrent

sessions per user or cannot demonstrate

the maximumnumber sessions =

Can demonstratethat application hasmaximum number 

of concurrentsessions per user 

= 3

Score

UNCLASSIFIED

37

Page 38: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 38/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

39 Does the vendor have analternative power supply or

uninterruptible power supply

in support of the application

and data transmissions?

COPS-1 Vendor does nothave alternative or uninterruptible

 power supply or 

cannot describealternative power 

supply = 0 

Can describe their alternative or 

uninterruptible power supply = 1 

Vendor does nothave alternative or uninterruptible

 power supply or 

cannot providedocumentation of 

 power supply = 0 

Can providedocumentation of 

alternative or uninterruptible power supply = 2

Vendor does nothave alternative or uninterruptible

 power supply or 

cannot demonstratethis power supply =

Can demonstratealternative or 

uninterruptible power supply = 3

Score

UNCLASSIFIED

38

Page 39: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 39/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

40 Does the vendor provide theappropriate level of 

redundancy of all application

components based on contract

requirements?

Does not provideappropriateredundancy or cannot

describe redundancy

= 0 

Can describe howthey provide

appropriateredundancy = 1 

Does not provideappropriateredundancy or 

cannot provide

documentation of redundancy = 0 

Can provide

documentation of appropriate

redundancy = 2

Does not provideappropriateredundancy or 

cannot demonstrate

redundancy = 0 

Can demonstrateappropriate

redundancy = 3

Score

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

41 Does the vendor utilize a

system performance

monitoring tool to analyze

performance in real time?

Does not utilizesystem performance

tool or cannot

describe how theyuse this tool = 0 

Can describe how

they utilize a system

 performance tool = 1

Does not utilizesystem performance

tool or cannot

 providedocumentation of 

utilizing tool = 0

Can provide

documentation of asystem performance

tool = 2

Does not utilizesystem

 performance tool

or cannotdemonstrate this

tool = 0 

Can demonstrate a

system performance tool

= 3

Score

UNCLASSIFIED

39

Page 40: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 40/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Non-repudiationVulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria42 Does the vendor use NIST

FIPS 140-2 validated

cryptography to implement

encryption, key exchange,

digital signature, and hash?

Things to Consider 1. Cryptography – DoD PKI

class 3 or 4 token

2. Encryption – AES, 3DES,

DES, Skipjack 

3. Key Exchange – FIPS 171

4. Digital Signature – DSA,

RSA, ECDSA

5. Hash – SHA-1, SHA-256,

SHA-384, SHA-512

DCNR-1 Does not use FIPS

140-2 or cannot

describe how it usedin their application

= 0 

Can describe howthey use FIPS 140-2

= 1 

Does not use FIPS

140-2 or cannot

 providedocumentation of 

using FIPS 140-2 intheir application = 0

Can provide

documentation of 

FIPS 140-2 = 2

Does not use FIPS

140-2 or cannot

demonstrate use of FIPS 140-2 = 0 

Can demonstrate

use of FIPS 140-2= 3

Score

UNCLASSIFIED

40

Page 41: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 41/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

43 Does the vendor performauditing?

List of Items to be Included1. Operating System

2. Application

3. Web Server  

4. Web Services

5. Network Devices

6. Database

7. Wireless

ECAT-1ECCD-1ECRG-1

ECAR-2

Does not performauditing or cannotdescribe how they

 perform auditing = 0

Can describe their 

auditing process = 1 

Does not performauditing or cannot provide

documentation

requiring auditing= 0 

Can provide

documentation of auditing & auditing

includes 1 – 3 of 

listed items = 1

Can providedocumentation

auditing & auditing

includes 4 – 7 of listed items = 2

Does not performauditing or cannotdemonstrate

auditing = 0 

Can demonstrate

auditing & auditingincludes 1 – 2 of 

listed items = 1

Can demonstrate

auditing & auditingincludes 3 – 4 of 

listed items = 2

Can demonstrate

auditing & auditingincludes 5 – 7 of 

listed items = 3

Score

UNCLASSIFIED

41

Page 42: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 42/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

44 Does the vendor audit bothsuccess and failure of logon

attempts to the application?

ECAT-1ECRG-1

ECAR-2

ECLO-1

Does not audit bothsuccess & failure of 

logon attempts to the

application or cannotdescribe how they

audit these events= 0 

Can describe how

they audit both

success & failure of logon attempts to

application = 1

Does not audit bothsuccess & failure of 

logon attempts to

the application or cannot provide

documentation of auditing both events

= 0 

Can provide

documentation of auditing both

success & failure of logon attempts to

application = 2

Does not audit bothsuccess & failure of 

logon attempts to

application or cannot demonstrate

auditing of theseevents = 0 

Can demonstrate of 

auditing both

success & failure of logon attempts to

application = 3

Score

UNCLASSIFIED

42

Page 43: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 43/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

45 Does the vendor have a policyfor reviewing audit logs?

Things to Consider 1. Frequency of review (daily,

weekly)

ECAT-1ECRG-1

ECAR-2

Does not have policyfor reviewing audit

logs or cannot

describe their policy= 0 

Can describe their 

 policy for reviewingaudit logs = 1 

Does not have policy for reviewing

audit logs or cannot

 providedocumentation of 

 policy = 0 

Can provide copyof policy for 

reviewing audit logs

& reviews arecompleted less

frequently thandaily = 1

Can provide copyof policy for 

reviewing audit logs& reviews are

completed daily or more frequently = 2

Does not have policy for 

reviewing audit

logs or cannotdemonstrate policy

= 0 

Can demonstratereviewing logs &

reviews are done

less frequently thanweekly = 1

Can demonstrate

reviewing logs &

reviews arecompleted weekly

or more frequently but less frequently

than daily = 2

Can demonstrate

reviewing logs &reviews are

completed daily or more frequently = 3

Score

UNCLASSIFIED

43

Page 44: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 44/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

46 What events does the vendor

log?

List of Items to be Included1. Audit all failures

2. Successful logon attempt

3. Failure of logon attempt

4. Permission Changes

5. Unsuccessful File Access

6. Creating users & objects

7. Deletion & modification of 

system files

8. Registry Key/Kernal changes

DCSL-1

ECAT-1ECAR-2

Does not audit or 

vendor’s auditingdoes not include any

of the listed items or 

cannot describe whatevents are audited

= 0 

Can describe eventsaudited = 1 

Does not audit or 

vendor’s auditingdoes not include

any of the listed

items or cannot provide

documentation of events in log = 0 

Can provide docu-

mentation for 

auditing & itincludes auditing 1

 – 4 of items = 1

Can provide copy

of policy for auditing & it

includes auditing 5 – 8 of items = 2

Does not audit or 

vendor’s auditingdoes not include

any listed items or 

cannot demonstrateevents in log = 0 

Can show audit log

& log contains 1 – 2 of listed items = 1

Can show audit log& log contains 3 – 

4 of listed items = 2

Can show audit log

& log contains 5 – 8 of listed items = 3

Score

UNCLASSIFIED

44

Page 45: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 45/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

47 What events does the

application log?

List of Items to be Included1. Startup & shutdown

2. Authentication

3. Authorization/permission

granting

4. Actions by trusted users

5. Process invocation

6. Controlled access to data by

individually authenticated

user 7. Unsuccessful data access

attempt

8. Data deletion

9. Data transfer 

10. Application configuration

change

11. Application of confidentiality

or integrity labels to data

12. Override or modification of 

data labels or markings

13. Output to removable media

14. Output to a printer 

ECAT-1ECCD-1

Application does notaudit or cannot

describe what

application islogging = 0 

Can describe what

application audit= 1 

Application doesnot audit or cannot

 provide

documentation for application auditing

= 0 

Can provide docu-mentation for 

application auditing

& it includesauditing 1 – 7 of 

listed items = 1

Can provide docu-

mentation for application auditing

& it includesauditing 8 – 14 of 

listed items = 2

Application doesnot audit or cannot

demonstrate what

application islogging = 0 

Can show

application auditlog & log contains

1 - 5 of listed items

= 1

Can showapplication audit

log & log contains

6 - 10 of listeditems = 2

Can show

application auditlog & log contains

11 - 14 of listed

items = 3

Score

UNCLASSIFIED

45

Page 46: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 46/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

ProtectionVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria48 Does the vendor follow some

type of guidance to secure the

vendor computing and

network infrastructure?

Things to Consider 1. Defense in Depth

DCCS-1

ECND-1

Follows no guidance

for securing their computing &

network infrastructure or 

cannot describe whatguidance they follow

= 0 

Follows guidance for securing their computing &

network 

infrastructure & candescribe what that

guidance is = 1 

Follows no

guidance for securing their 

computing &network 

infrastructure or cannot provide

documentation of 

guidance = 0 

Can provide copyof guidance but it

does not include

defense in depth = 1

Can provide copyof guidance & it

includes defense indepth = 2

Follows no

guidance for securing their 

computing &network 

infrastructure or cannot demonstrate

guidance = 0 

Can demonstratetheir securityguidance but it

does not include

defense in depth= 2

Can demonstrate

their securityguidance & it

includes defense indepth = 3

Score

UNCLASSIFIED

46

Page 47: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 47/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

49 Does the vendor employ a

firewall?

EBBD-2ECND-1

Does not employfirewall or cannot

describe their 

firewall = 0 

Does employfirewall & can

describe their firewall = 1 

Does not employfirewall or cannot

 provide

documentation of employing firewall

= 0 

Can providedocumentation of 

employment of 

firewall = 2

Does not employfirewall or cannot

demonstrate

employment of firewall = 0 

Can demonstrate

employment of firewall = 3

Score

UNCLASSIFIED

47

Page 48: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 48/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

50 Are the firewall ACLs set to

deny by default, allow by

exception?

ECND-1EBBD-2

Does not havefirewall ACLs set to

deny by default,

allow by exceptionor cannot describe

their firewall ACLs= 0 

Has firewall ACLs

set to deny by

default, allow byexception & can

describe their ACLs= 1 

Does not havefirewall ACLs set to

deny by default,

allow by exceptionor cannot provide

documentation of firewall ACLs = 0 

Can provide

documentation of 

firewall ACLs butthey are not set to

deny by default,allow by exception

= 1

Can provide

documentation of firewall ACLs &

they are set to deny by default, allow by

exception = 2

Does not havefirewall ACLs set

to deny by default,

allow by exceptionor cannot

demonstrate their firewall ACLs = 0

Can demonstrate

firewall ACLs but

they are not set todeny by default,

allow by exception= 2

Can demonstratefirewall ACLs &

they are set to deny by default, allow by

exception = 3

Score

UNCLASSIFIED

48

Page 49: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 49/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

51 Does the vendor deploy and

monitor network intrusion

detection tools?

EBBD-2ECND-1

Does not deploy &monitor network 

intrusion detection

tools = 0 

Vendor does deploy& monitor network 

intrusion detectiontools = 1 

Does not deploy &monitor network 

intrusion detection

tools = 0 

Can providedocumentation for 

deploying &monitoring network 

intrusion detection

tools = 2

Does not deploy &monitor network 

intrusion detection

tools = 0 

Can demonstratethat network 

intrusion detectiontools have been

deployed & are

monitored = 3

Score

UNCLASSIFIED

49

Page 50: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 50/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

52 Does the vendor deploy and

monitor host-based intrusion

detection tools?

EBBD-2ECND-1

Does not deploy &monitor host-based

intrusion detection

tools or cannotdescribe their use of 

HIDs= 0 

Can describe their use of host-based

intrusion detection

tools = 1 

Does not deploy &monitor host-based

intrusion detection

tools or cannot provide

documentation of deployment &

monitoring = 0 

Can provide

documentation for deploying &

monitoring host- based intrusion

detection tools = 2

Does not deploy &monitor host-based

intrusion detection

tools or cannotdemonstrate their 

HIDs = 0 

Can demonstratethat host-based

intrusion detection

tools have beendeployed & are

monitored = 3

Score

UNCLASSIFIED

50

Page 51: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 51/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

53 Does the vendor have strong

two-factor authentication for

management/admin traffic?

Things to Consider 1. Something you have

2. Something you are

3. Something you know

DCBP-1 Does not have strongtwo-factor 

authentication for 

management/admintraffic or cannot

describe their two-factor authentication

= 0 

Can describe their 

strong two-factor authentication for 

management/admintraffic = 1 

Does not havestrong two-factor 

authentication for 

management/admintraffic or cannot

 providedocumentation of 

their strong two-factor 

authentication = 0 

Can provide

documentation for strong two-factor 

authentication for 

management/admintraffic = 2

Does not havestrong two-factor 

authentication for 

management/admintraffic or cannot

demonstrate two-factor 

authentication = 0 

Can demonstrate

strong two-factor authentication for 

management/admintraffic = 3

Score

UNCLASSIFIED

51

i i h kli i ld i i

Page 52: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 52/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

54 Does the vendor have a patch

management process?

ECND-1 Does not have patchmanagement process

or cannot describe

their process = 0 

Can describe their  patch management

 process = 1

Does not have patchmanagement

 process or cannot

 providedocumentation for 

 patch management process = 0 

Can provide

documentation for 

 patch management process = 2

Does not have patch management

 process or cannot

demonstrate patchmanagement

 process = 0 

Can demonstrate patch management

 process = 3

Score

UNCLASSIFIED

52

B t P ti S it Ch kli t V2R1 J 29 2007 Fi ld S it O ti

Page 53: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 53/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description Criteria Documentation

Criteria

Demonstration

Criteria

55 What is the vendor’s patch

management process?

Question to Ask 1. Does the vendor subscribe to

the application vendor 

hardware/software

notification sites for the latest

 patch notifications?

2. Is there a schedule for 

applying patches?

3. Are patches tested before

applying to productions?4. Is the severity of the

vulnerability considered

during determination of the

timeliness of applying the

 patch?

DCCT-1ECND-1

Does not have patchmanagement process

or cannot describe

their patchmanagement process

= 0 

Vendor can describetheir patch

management process

= 1 

Does not have patchmanagement

 process or cannot

 providedocumentation of 

their patchmanagement

 process = 0 

Can provide

documentation of their patch

management process & it

addresses 1 – 2 of 

questions = 1

Can providedocumentation of 

their patchmanagement

 process & itaddresses 3 - 4 of questions = 2

Does not have a patch management

 process or cannot

demonstrate their  patch management

 process = 0 

Can demonstratetheir patch

management

 process & itaddresses 1 – 2 of 

questions = 2

Can demonstrate

their patchmanagement

 process & itaddresses 3 - 4 of 

questions = 3

Score

UNCLASSIFIED

53

B t P ti S it Ch kli t V2R1 J 29 2007 Fi ld S it O ti

Page 54: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 54/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

56 Does the vendor have a

verification process for

ensuring patches have been

applied?

DCCT-1ECMT-1

Does not have\verification process

or cannot describe

their verification process = 0 

Can describe their 

verification process= 1 

Does not haveverification process

or cannot provide

documentation of verification process

= 0 

Can providedocumentation

which requires

verification that

 patches have beenapplied = 2

Does not haveverification process

or cannot

demonstrate patches have been

applied = 0 

Can demonstrate patches have been

applied = 3

Score

UNCLASSIFIED

54

Best Practices Security Checklist V2R1 January 29 2007 Field Security Operations

Page 55: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 55/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

57 Does the vendor perform

security self-assessments on a

regular basis?

Question to Ask 1. How often does the vendor 

 perform self-assessments?

ECMT-1 Does not performself-assessments or 

cannot describe self-

assessment process= 0 

Does perform self-

assessments = 1 

Does not performself-assessments or 

cannot provide

documentation of self-assessment

requirement = 0 

Can providedocumentation

requiring self-

assessments to be

 performed lessfrequently thanmonthly = 1

Can providedocumentation

requiring self-assessments to be

 performed monthlyor more frequently

= 2

Does not performself-assessments or 

cannot demonstrate

their self-assessment process

= 0 

Can demonstrateself-assessments

are performed &

they are completed

less frequently thanmonthly = 2

Can demonstrate

self-assessmentsare performed &

they are completedmonthly or more

frequently = 3

Score

UNCLASSIFIED

55

Best Practices Security Checklist V2R1 January 29 2007 Field Security Operations

Page 56: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 56/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

58 Are self-assessment results

reviewed on a regular basis?

ECMT-1 Does not reviewself-assessment

results or cannot

describe review or self-assessment

results = 0 

Can describe reviewself-assessment

results = 1 

Does not reviewself-assessment

results or cannot

 providedocumentation of 

review of results= 0 

Can provide

documentation

which requires

review of self-assessment results= 2

Does not reviewself-assessment

results or cannot

demonstrate reviewof self-assessment

results = 0 

Can demonstratereview of self-

assessment results

= 3

Score

UNCLASSIFIED

56

Best Practices Security Checklist V2R1 January 29 2007 Field Security Operations

Page 57: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 57/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

59 Does the vendor require

sanitation of equipment and

media prior to disposal?

PECS-1 Does not requiresanitation of 

equipment & media

 prior to disposal or cannot describe

sanitation process= 0

 Can describe the

sanitation of 

equipment & media

 prior to disposal = 1

Does not requiresanitation of 

equipment & media

 prior to disposal or cannot provide

documentation of sanitation = 0 

Can provide

documentation of 

sanitation of 

equipment & media prior to disposal = 2

Does not requiresanitation of 

equipment & media

 prior to disposal or cannot demonstrate

sanitation = 0 

Can demonstratesanitation of 

equipment & media

 prior to disposal =

3

Score

UNCLASSIFIED

57

Best Practices Security Checklist V2R1 January 29 2007 Field Security Operations

Page 58: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 58/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

60 Does the vendor’s security

policy and process contain

guidance for maintaining and

monitoring a baseline

configuration?

DCHW-1

DCID-1DCSL-1

ECMT-1

Does not haveguidance for 

 baseline

configuration or cannot describe their 

 baselineconfiguration = 0 

Can describe their 

guidance for 

 baseline

configuration = 1 

Does not haveguidance for 

 baseline

configuration or cannot provide

documentation of guidance = 0 

Can provide

documentation of 

 baseline

configuration = 2

Does not haveguidance for 

 baseline

configuration or cannot demonstrate

 baselineconfigurations = 0 

Can demonstrate

 baseline

configuration = 3

Score

UNCLASSIFIED

58

Best Practices Security Checklist V2R1 January 29, 2007 Field Security Operations

Page 59: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 59/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

61 Does the vendor have a

process in place to routinely

verify baseline configuration?

DCHW-1

ECMT-1Does not have process for routinely

verifying baseline

configuration or cannot describe

 process = 0 

Can describe process for routinely

verifying baseline

configuration = 1

Does not have process for 

routinely verifying

 baselineconfiguration or 

cannot provide process

documentation = 0 

Can provide process

documentation

which requiresroutine verificationof baseline

configuration = 2

Does not have process for 

routinely verifying

 baselineconfiguration or 

cannot demonstratethe process= 0 

Can demonstrate

 process for 

verifying baseline

configuration = 3

Score

UNCLASSIFIED

59

Best Practices Security Checklist V2R1 January 29, 2007 Field Security Operations

Page 60: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 60/121

y y , y pChecklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

62 Does the vendor employ a

baseline configuration tool?

DCHW-1

DCID-1

Does not employ

 baselineconfiguration tool or 

cannot describe their  baseline

configuration tool= 0 

Can describe

employment of 

 baseline

configuration tool= 1

Does not employ

 baselineconfiguration tool

or cannot providedocumentation of 

employment of a baseline

configuration tool= 0 

Can provide

documentationwhich requiresusing a baseline

configuration tool

= 2

Does not employ

 baselineconfiguration tool

or cannotdemonstrate

employment of  baseline

configuration tool= 0 

Can demonstrate

using a baselineconfiguration tool= 3

Score

UNCLASSIFIED

60

Best Practices Security Checklist V2R1 January 29, 2007 Field Security Operations

Page 61: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 61/121

y y y pChecklist Defense Information Systems Agency

DetectionVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria63 Does the vendor’s security

policy contain guidance for

regularly scheduled routine

security audits performed by

an external party?

List of Items to be Included1. Operating Systems

2. Web Servers

3. Browsers

4. Web Services5. Database

6. Network sensors

7. Firewalls

8. Applications

9. Wireless

ECMT-1

VIVM-1

Does not contain

guidance for regularly scheduled

routine securityaudits performed by

an external party or cannot describe

 policy = 0 

Can describesecurity policy & itcontain guidance for 

regularly scheduled

routine securityaudits performed by

an external party = 1

Does not contain

guidance for regularly scheduled

routine securityaudits performed by

external party or cannot provide

documentation of 

 policy = 0 

Can provide a copyof security policy

which requires

routine securityaudits performed by

external party but policy does not

include all of listeditems = 1

Can provide a copyof security policy

which requiresroutine security

audits performed by

external party &

Does not contain

guidance for regularly scheduled

routine securityaudits performed

 by external party or cannot demonstrate

 policy = 0 

Can demonstratesecurity policywhich requires

routine security

audits performed by external party

  but policy includesonly operating

systems = 1

Can demonstratesecurity policywhich requires

routine securityaudits performed

 by external party

  but policy includes

UNCLASSIFIED

61

Best Practices Security Checklist V2R1 January 29, 2007 Field Security Operations

Page 62: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 62/121

Checklist Defense Information Systems Agency

 policy does include

all of listed items =2

operating systems

 but not all of listeditems = 2

Can demonstratesecurity policy

which requiresroutine security

audits performed by external party &

  policy includes all

of listed items = 3

Score

UNCLASSIFIED

62

Best Practices Security Checklist V2R1 January 29, 2007 Field Security Operations

Page 63: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 63/121

Checklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

64 Does the vendor perform

verification of their perimeterrouter policies?

Question to Ask 1. How often does the vendor 

 perform verification of their 

 perimeter router policies?

ECMT-1 Does not perform

verification of their  perimeter router 

 policies or cannotdescribe verification

 process = 0 

Can describeverification of their 

 perimeter router 

 policies = 1 

Does not perform

verification of their  perimeter router 

 policies or cannot provide

documentation of verification = 0 

Can provide

documentation

which requires

 performingverification of  perimeter router 

 policies less

frequently thanmonthly = 1

Can provide

documentationwhich requires

 performingverification of  perimeter router 

 policies monthly or more frequently

than monthly = 2

Does not perform

verification of their  perimeter router 

 policies or cannotdemonstrate

verification = 0 

Can demonstrateverification of their 

 perimeter router 

 policies &

verification is doneless frequently thanquarterly = 1

Can demonstrateverification of their 

 perimeter router  policies &

verification is donequarterly or less

frequently thanmonthly = 2

Can demonstrateverification of their 

 perimeter router 

 policies &

UNCLASSIFIED

63

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsCh kli f f i S A

Page 64: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 64/121

Checklist Defense Information Systems Agency

verification is done

monthly or morefrequently than

monthly = 3

Score

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

65 Is the vendor firewall or

network sensor configured to

alert for unauthorized access

attempts and privilege

escalation?

ECAT-2 Firewall/Network 

sensor is notconfigured to alert or 

cannot describe how

firewall/network sensor is configured

to alert = 0 

Can describe howfirewall/network 

sensor is configured

to alert for unauthorized access

attempts & privilegeescalation = 1

Firewall/Network 

sensor is notconfigured to alert

or cannot provide

documentation onhow

firewall/network sensor is configured

to alert = 0 

Can provide

documentation onhow

firewall/network sensor is configured

to alert = 2

Firewall/Network 

sensor is notconfigured to alert

or cannot

demonstrate howfirewall/network 

sensor isconfigured to alert

= 0 

Can demonstrate

howfirewall/network 

sensor isconfigured to alert

= 3

Score

UNCLASSIFIED

64

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsCh kli t D f I f ti S t A

Page 65: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 65/121

Checklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

66 Does the vendor routinely

check that no new ports,protocols, or services are

activated without approval by

the configuration

management board?

DCID-1,

DCPP-1

Does not routinely

check that no PPSare activated without

approval or cannotdescribe checking

 process = 0 

Can describe processfor routinely

checking that no new

PPS are activated

without approval= 1 

Does not routinely

check that no PPSare activated

without approval or cannot provide

documentation of checking process

= 0 

Can provide

documentation for 

routinely checkingthat no new PPS areactivated without

approval = 2

Does not routinely

check that no PPSare activated

without approval or cannot

demonstration of checking process

= 0 

Can demonstrate

checking that no

new PPS areactivated withoutapproval = 3

Score

UNCLASSIFIED

65

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsCh kli t D f I f ti S t A

Page 66: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 66/121

Checklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

67 Does the vendor comply with

DoD ports, protocols, andservices guidance?

DCID-1

DCPP-1

Does not comply

with the PPSguidance or cannot

describe how they docomply = 0 

Can describe how

they comply with thePPS guidance = 1 

Does not comply

with the PPSguidance or cannot

 providedocumentation on

how they docomply = 0 

Can provide

documentation on

how they do

comply = 2

Does not comply

with the PPSguidance or cannot

demonstrate howthey do comply = 0

Can demonstrate on

how they docomply = 3

Score

UNCLASSIFIED

66

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 67: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 67/121

Checklist Defense Information Systems Agency

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

68 Does the vendor’s security

policy require routine reviewof HIDs, NIDs, and firewall

rules for accuracy, efficiency

and their ability to withstand

new attacks?

Question to Ask 1. How often are reviews

completed?

ECMT-1 Does not require

routine review of HIDs, NIDs, &

firewall rules or cannot describe

 policy with thisrequirement = 0 

Can describe how

they routine review

HIDs, NIDs, &

firewall rules = 1 

Does not require

routine review of HIDs, NIDs, &

firewall rules or cannot provide

 policy with thisrequirement = 0

Can provide

documentation on

how they routine

review HIDs, NIDs,& firewall rules butreview is performed

less frequently than

monthly = 1

Can providedocumentation on

how they routinereview HIDs, NIDs,

& firewall rules butreview is performedmonthly or more

frequently thanmonthly = 2

Does not require

routine review of HIDs, NIDs, &

firewall rules or cannot

demonstrate the policy with this

requirement = 0

Can demonstrate

how they routinely

review HIDs, NIDs, & firewallrules but review

occurs less

frequently thanquarterly = 1

Can demonstrate

how they routinelyreview HIDs,

 NIDs, & firewallrules but reviewoccurs quarterly or 

more frequentlythan quarterly but

less frequently than

monthly = 2

UNCLASSIFIED

67

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 68: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 68/121

Checklist Defense Information Systems Agency

Can demonstratehow they routinely

review HIDs,

 NIDs, & firewallrules but review

occurs monthly or more frequently

than monthly = 3

Score

UNCLASSIFIED

68

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 69: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 69/121

Checklist Defense Information Systems Agency

ReactionVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria69 Does the vendor have a

documented Incident

Response Program?

VIIR-1 Does not have

documented IncidentResponse Program

or cannot describeIncident Response

Program = 0 

Can describe

Incident Response

Program = 1 

Does not have

documentedIncident Response

Program or cannot provide

documentation of Incident Response

Program = 0 

Can providedocumentation of the Incident

Response Program

= 2

Does not have

documentedIncident Response

Program or cannotdemonstrate the

Incident ResponseProgram = 0 

Can demonstrate

Incident ResponseProgram = 3

Score

UNCLASSIFIED

69

Page 70: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 70/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 71: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 71/121

Checklist Defense Information Systems Agency

items = 3

Score

UNCLASSIFIED

71

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 72: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 72/121

y g y

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

71 Does the vendor have

documented IncidentResponse procedures?

List of Items to be Included1. Standard Operating

Procedures (SOP)

2. Identification of incident

3. Reporting of incident

4. Actions to be taken

5. Containment of incident

6. Eradication of incident

7. Recovery of incident8. Contact Information

a. Internal parties b. External parties

9. List of threats to guard against &

respond to

10. Incident reporting forms

(internal)

11. Incident reporting forms

(External)

12. Equipment List

13. Checklists

VIIR-1 Does not have

documented IncidentResponse procedures

or cannot describeIncident Response

  procedures =0 

Can describeIncident Response

 procedures = 1 

Does not have

documentedIncident Response

 procedures or cannot provide

documentation of Incident Response

  procedures =0 

Can provide

Incident Response

 procedures & itincludes 1 – 7 of listed items = 1

Can provideIncident Response

 procedures & itincludes 8 – 15 of 

listed items = 2

Does not have

documentedIncident Response

 procedures or cannot demonstrate

Incident Response  procedures =0 

Can demonstrate

Incident Response

 procedure & it

includes 1 – 5 of listed items = 1

Can demonstrate

Incident Response procedure & it

includes 6 – 10 of listed items = 2

Can demonstrate

Incident Response procedure & itincludes 11 – 15 of 

listed items = 3

Score

UNCLASSIFIED

72

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 73: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 73/121

y g y

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

72 Are the Incident Response

procedures published in hardcopy?

VIIR-1 Are not published in

hard copy or cannotdescribe requirement

for publishing inhard copy = 0 

Can describe

requirement for Incident Response

 procedures to be

 published in hard

copy = 1 

Are not published

in hard copy or cannot provide

documentation of requirement for 

 publishing in hardcopy = 0 

Can provide hard

copy of the Incident

Response

  procedures =2

Are not published

in hard copy or cannot demonstrate

 publishing in hardcopy = 0 

Can demonstrate

 publishing hardcopy of Incident

Response

 procedures = 3

Score

UNCLASSIFIED

73

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 74: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 74/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

73 Are the Incident Response

procedures published on theIntranet or some shared

media?

VIIR-1 Are not published on

Intranet or someshared media or 

cannot describerequirement for 

 publishing onIntranet or some

shared media = 0 

Are published on

Intranet or some

shared media = 1 

Are not published

on Intranet or someshared media or 

cannot providedocumentation of 

requirement for  publishing on

Intranet or someshared media = 0 

Can provide

documentation of requirement for  publishing on

Intranet or some

shared media = 2

Are not published

on Intranet or someshared media or 

cannot demonstratethat procedures are

 published onIntranet or some

shared media = 0 

Can demonstrate

that procedures are

 published onIntranet or someshared media = 3

Score

UNCLASSIFIED

74

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 75: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 75/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

74 Is the Incident Response

policy reviewed and updatedon a regular basis?

Question to Ask 1. How often is the review an

update?

VIIR-1 Is not reviewed &

updated or cannotdescribe process for 

reviewing &updating policy = 0 

Can describe how

 policy is reviewed &updated = 1 

Is not reviewed &

updated or cannotdescribe process for 

reviewing &updating policy = 0

Can describe

 process for reviewing &

updating policy &

 process performed

less frequently thanyearly = 1

Can describe

 process for reviewing &

updating policy & process performed

yearly or morefrequently than

yearly = 2

Is not reviewed &

updated or cannotdemonstrate

 process for reviewing &

updating policy = 0

Can demonstrate process for 

reviewing &

updating policy &

 process has been performed lessfrequently than

yearly = 2

Can demonstrate

 process for reviewing &

updating policy & process has been

 performed yearly or more frequentlythan yearly = 3

Score

UNCLASSIFIED

75

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 76: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 76/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

75 Is initial Incident Response

training provided to usercommunity?

PECF-1

PRRB-1VIIR-1

Is not provided to

users or cannotdescribe the

requirement for  providing initial

training to user = 0 

Can describe their requirement for 

 providing initial

Incident Response

training to user = 1 

Is not provided to

users or cannot provide

documentation of  providing initial

training to user = 0 

Can providedocumentation of 

 providing initial

Incident Response

training to user = 2

Is not provided to

users or cannotdemonstrate

 providing initialtraining to user = 0

Can demonstrate

 providing initialIncident Response

training to user = 3

Score

UNCLASSIFIED

76

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 77: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 77/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

76 Is refresher Incident

Response training providedperiodically to user

community?

Question to Ask 1. How often is training

 provided?

PECF-1

PRRB-1VIIR-1

Is not provided to

users or cannotdescribe requirement

for providingrefresher training to

user = 0 

Can describerequirement for 

 providing refresher 

Incident Response

training to user = 1 

Is not provided to

users or cannot provide

documentation of  providing refresher 

training to user = 0 

Can providedocumentation of 

 providing refresher 

Incident Response

training to user &training is providedless frequently than

yearly = 1

Can provide

documentation of  providing refresher 

Incident Responsetraining to user &

training is providedyearly or morefrequently than

yearly = 2

Is not provided to

users or cannotdemonstrate

 providing refresher training to user = 0

Can demonstrate

 providing refresher Incident Response

training to user &

training is provided

less frequently thanyearly = 2

Can demonstrate

 providing refresher Incident Response

training to user &training is provided

yearly or morefrequently than

yearly = 3

Score

UNCLASSIFIED

77

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 78: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 78/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

77 Is there an Incident Response

reporting mechanism inplace?

List of Items to be Included1. Who discovered the incident

2. How incident was recognized

3. Nature of incident

4. When did the incident occur 

5. When was the incident

detected

6. What is the impact to clients

7. Who was involved8. What evidence was recovered

9. Where did the incident occur 

10. Affected computer 

information

11. Why it happened

12. How it occurred

13. Team activities

14. Who was notified

a. Internal

 b. External

15. Resolution

VIIR-1 Does not have

Incident Responsereporting mechanism

or cannot describeIncident Response

reporting mechanism= 0 

Can describe

Incident Response

reporting mechanism

= 1 

Does not have

Incident Responsereporting

mechanism or cannot provide

documentation of Incident Response

reportingmechanism = 0 

Can provide

documentation of Incident Responsereporting

mechanism & it

includes 1 – 8 of listed items = 1

Can provide

documentation of Incident Response

reportingmechanism & itincludes 8 - 16 of 

listed items = 2

Does not have

Incident Responsereporting

mechanism or cannot demonstrate

Incident Responsereporting

mechanism = 0 

Can demonstrate

reporting

mechanism & itincludes 1 – 6 of listed items = 1

Can demonstratereporting

mechanism & itincludes 7 – 11 of 

listed items = 2

Can demonstratereportingmechanism & it

includes 12 – 16 of listed items = 3

Score

UNCLASSIFIED

78

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 79: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 79/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

78 Is the Incident Response

reporting mechanism on acomputer database, paper, or

both?

VIIR-1 Is not database,

 paper, or both or cannot describe their 

requirement for reporting mechanism

to be on database, paper, or both = 0 

Can describe their 

requirement for 

reporting mechanism

to be on database, paper, or both = 1 

Is not database,

 paper, or both or cannot provide

documentation of their requirement

for reportingmechanism to be on

database, paper, or  both = 0 

Can provide

documentation of reportingmechanism to be on

 paper only = 1

Can provide

documentation of requirement for 

reportingmechanism to be on

 paper & database= 2

Is not provided to

users or cannotdemonstrate

 providing initialtraining to user = 0

Can demonstrate

reportingmechanism to be

on paper only = 1

Can demonstratereportingmechanism to be

on database only

= 2

Can demonstratereporting

mechanism to beon paper &

database = 3

UNCLASSIFIED

79

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 80: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 80/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

79 Are the Incident Response

reports sent to managementon a regular basis?

Question to Ask 1. How often are reports sent to

management?

VIIR-1 Are not sent to

management onregular basis or 

cannot describe howreports are sent to

management onregular basis = 0 

Can describe how

reports are sent to

management on

regular basis = 1 

Are not sent to

management onregular basis or 

cannot providedocumentation of 

requirement for reports to be sent to

management onregular basis = 0 

Can provide

documentation of requirement for reports to be sent to

management on

regular basis &reports are sent less

frequently thanmonthly = 1

Can provide

documentation of requirement for reports to be sent to

management onregular basis &

reports are sent

monthly or more

Are not sent to

management onregular basis or 

cannot demonstraterequirement for 

reports to be sent tomanagement on

regular basis = 0 

Can demonstrate

requirement for 

reports to be sent tomanagement onregular basis &

reports are sent

yearly or lessfrequently than

yearly = 1

Can demonstraterequirement for 

reports to be sent tomanagement onregular basis &

reports are sentquarterly or less

frequently than

quarterly but more

UNCLASSIFIED

80

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 81: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 81/121

frequently than

monthly = 2

frequently than

yearly = 2

Can demonstrate

requirement for reports to be sent to

management onregular basis &

reports are sentmonthly or less

frequently than

monthly but morefrequently than

quarterly = 3

Score

UNCLASSIFIED

81

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 82: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 82/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

80 Are the Incident Response

procedures tested periodicallythrough exercises or

simulations?

Question to Ask 1. How often are the procedures

tested?

VIIR-1 Are not tested

 periodically or cannot describe how

 procedures are nottested periodically

= 0 

Can describe how procedures are tested

  periodically =1 

Are not tested

 periodically or cannot provide

documentation onhow procedures are

tested periodically= 0 

Can provide

documentation on

how procedures are

tested periodically& procedures aretested less

frequently than

monthly = 1

Can providedocumentation on

how procedures aretested periodically

& procedures aretested monthly or more frequently

than monthly = 2

Are not tested

 periodically or cannot demonstrate

how procedures aretested periodically

= 0 

Can demonstratehow procedures are

tested periodically

& procedures are

tested & proceduresare tested yearly or less frequently than

yearly = 1

Can demonstrate

how procedures aretested & procedures

are tested quarterlyor less frequently

than quarterly butmore frequentlythan yearly = 2

Can demonstrate

how procedures are

tested & procedures

UNCLASSIFIED

82

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 83: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 83/121

are tested monthly

or less frequentlythan monthly but

more frequently

than quarterly = 3Score

UNCLASSIFIED

83

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 84: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 84/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

81 Does the Incident Response

Team include members fromall key functional areas?

List of Items to be Included1. Senior Management

2. Human Resources/Personnel

3. Information

Technology/Information

Security

4. Technical Staff Members

5. Budget or Finance

VIIR-1 Does not have

members from allkey functional areas

or cannot describewho is on the

Incident ResponseTeam = 0 

Can describe who is

on the Incident

Response Team = 1 

Does not have

members from allkey functional areas

or cannot providedocumentation for 

who is on Team = 0

Can providedocumentation of 

who is on the

Incident Response

Team & it includes1 – 3 of the listeditems = 1

Can providedocumentation of 

who is on theIncident Response

Team & it includes4 - 5 of the listed

items = 2

Does not have

members from allkey functional

areas or cannotdemonstrate who is

on Team = 0 

Can demonstratewho is on the

Incident Response

Team & it includes

1 – 2 of the listeditems = 1

Can demonstrate

who is on theIncident Response

Team & it includes3 -4 of the listed

items = 2

Can demonstratewho is on theIncident Response

Team & it includes5 of the listed items

= 3

Score

UNCLASSIFIED

84

Page 85: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 85/121

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 86: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 86/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

83 Does the configuration

management plan contain thenecessary items?

List of Items to be Included1. Identify the configuration

change

2. Contain an approval process

3. Review the configuration

change

4. Schedule the configuration

change

5. Track the implementation of the configuration change

6. Track system impact of the

configuration change

7. Record & report

configuration change to the

appropriate party

8. Back out plan if the

configuration change does

not work as planned

9. Provide for minutes of the

meeting

10. Emergency change procedures

11. List of team members from

key functional areas

DCCB-1

DCII-1DCPR-1

Does not have

configurationmanagement plan or 

cannot describeconfiguration

management plan= 0 

Can describe

configuration

management plan

= 1 

Does not have

configurationmanagement plan or 

cannot providedocumentation of 

configurationmanagement plan

= 0 

Can provide

documentation of 

configurationmanagement plan& it includes 1 – 5

of listed items = 1

Can provide

documentation of configuration

management plan& it includes 6 - 11

of listed items = 2

Does not have

configurationmanagement plan

or cannotdemonstrate plan

= 0 

Can demonstrateconfiguration

management plan

& it includes 1 – 4

of listed items = 1

Can demonstrate

configuration

management plan& it includes 5 -8

of listed items = 2

Can demonstrateconfiguration

management plan& it includes 9 - 11of listed items = 3

Score

UNCLASSIFIED

86

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 87: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 87/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

84 Is the configuration

management processautomated or manual?

DCCB-1

DCII-1DCPR-1

Does not have

configurationmanagement process

or cannot describeconfiguration

management process= 0 

Can describe

configuration

management process

= 1 

Does not have

configurationmanagement

 process or cannot provide

documentation of configuration

management process = 0 

Can provide

documentation of configurationmanagement

 process & process

is manual = 1

Can providedocumentation of 

configurationmanagement

 process & processis automated = 2

Does not have

configurationmanagement

 process or cannotdemonstrate

configurationmanagement

  process =0

Can demonstrate

configuration

management process & processis manual = 2

Can demonstrateconfiguration

management process & process

is automated = 3

Score

UNCLASSIFIED

87

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 88: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 88/121

Vulnerability ManagementVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

85 Does the vendor’s security

policy contain guidance for

regularly scheduled internal

vulnerability audits?

Question to Ask 1. How often are vulnerability

audits performed?

VIVM-1 Does not require

regularly scheduledinternal vulnerability

audits or cannotdescribe the

requirement = 0 

Can describe the

requirement for regularly scheduled

vulnerability audits= 1 

Does not require

regularly scheduledinternal

vulnerability auditsor cannot describe

the requirement = 0

Can provide

documentationwhich requires

regularly scheduledinternal

vulnerability audits

& audits are performed less

frequently thanmonthly = 1

Can provide

documentation

which requiresregularly scheduled

internalvulnerability audits

& audits are

 performed monthly

Does not require

regularly scheduledinternal

vulnerability auditsor cannot describe

the requirement = 0

Can demonstrate

requirement for regularly scheduled

vulnerability audits& audits are

 performed yearly or 

less frequently thanyearly = 1

Can demonstrate

requirement for regularly scheduled

vulnerability audits

& audits are performed

quarterly or lessfrequently than

quarterly but more

frequently than

UNCLASSIFIED

88

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 89: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 89/121

or more frequently

than monthly = 2

yearly = 2

Can demonstrate

requirement for 

regularly scheduledvulnerability audits

& audits are performed monthly

or less frequentlythan monthly but

more frequently

than quarterly = 3

Score

UNCLASSIFIED

89

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 90: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 90/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

86 Does the vendor utilize a

network vulnerabilityscanner?

Question to Ask 1. How often is the network 

scanned?

VIVM-1 Does not utilize

network vulnerability scanner 

or cannot describehow their scanner is

used = 0 

Can describe howtheir scanner is used

= 1 

Does not utilize

network vulnerability

scanner or cannot provide

documentation of how their scanner is

used = 0 

Can provide

documentation of 

how their scanner isused & scans are performed less

frequently than

monthly = 1

Can providedocumentation of 

how their scanner isused & scans are

 performed monthlyor more frequentlythan monthly = 2

Does not utilize

network vulnerability

scanner or cannotdemonstrate how

their scanner isused = 0 

Can demonstrate

how their scanner 

is used & scans are

 performed yearly or less frequently thanyearly = 1

Can demonstratehow their scanner 

is used & scans are performed

quarterly or lessfrequently than

quarterly but morefrequently thanyearly = 2

Can demonstrate

how their scanner 

is used & scans are

UNCLASSIFIED

90

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 91: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 91/121

 performed monthly

or less frequentlythan monthly but

more frequently

than quarterly = 3Score

UNCLASSIFIED

91

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 92: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 92/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

87 Are the results of the network 

vulnerability scans sent tomanagement on a regular

basis?

VIVM-1 Are not sent to

management or cannot describe the

requirement for network 

vulnerability scanresults to be sent to

management = 0 

Can describe the

requirement for 

network vulnerability scanresults to be sent to

management = 1 

Are not sent to

management or cannot provide

documentation of the requirement for 

network vulnerability scan

results to be sent tomanagement = 0 

Can provide

documentation of the requirement for network 

vulnerability scan

results to be sent tomanagement = 2

Are not sent to

management or cannot demonstrate

the requirement for network 

vulnerability scanresults to be sent to

management = 0 

Can demonstrate

network 

vulnerability scanresults to be sent tomanagement = 3

Score

UNCLASSIFIED

92

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 93: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 93/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

88 Is there a process in place to

regularly correct discoveredvulnerabilities and

configuration discrepancies?

VIVM-1 Does not have

 process to correctdiscovered

vulnerabilities &configuration

discrepancies or cannot describe the

 process to correctdiscovered

vulnerabilities &

configuration

discrepancies = 0 

Can describe process

to correct discovered

vulnerabilities &configuration

discrepancies = 1 

Does not have

 process to correctdiscovered

vulnerabilities &configuration

discrepancies or cannot provide

documentation of  process to correct

discovered

vulnerabilities &

configurationdiscrepancies = 0 

Can provide

documentation of  process to correct

discoveredvulnerabilities &

configurationdiscrepancies = 2

Does not have

 process to correctdiscovered

vulnerabilities &configuration

discrepancies or cannot demonstrate

 process to correctdiscovered

vulnerabilities &

configuration

discrepancies = 0 

Can demonstrate

 process to correct

discoveredvulnerabilities &

configurationdiscrepancies = 3

Score

UNCLASSIFIED

93

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 94: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 94/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

89 Does the vendor have a

verification process forensuring vulnerabilities and

configuration discrepancies

have been corrected?

VIVM-1 Does not have

 process for ensuringvulnerabilities &

configurationdiscrepancies have

 been corrected or cannot describe

correction process= 0 

Can describe the

vulnerability &configurationdiscrepancy

correction process

= 1 

Does not have

 process for ensuringvulnerabilities &

configurationdiscrepancies have

 been corrected or cannot provide

documentation of correction process

= 0 

Can providedocumentation of 

the correction

 process = 2

Does not have

 process for ensuring

vulnerabilities &configuration

discrepancies have been corrected or 

cannot demonstratecorrection process

= 0 

Can demonstratecorrections have been made = 3

Score

UNCLASSIFIED

94

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 95: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 95/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

90 Does the vendor routinely run

a port scanning tool to ensureno new or unexpected ports,

protocols, or services are

discovered?

Question to Ask 1. How often are ports

scanned?

VIVM-1 Does not utilize port

scanner to ensure nonew or unexpected

PPS are discoveredor cannot describe

how their scanner isused = 0 

Can describe how

their scanner is used

= 1 

Does not utilize

 port scanner toensure no new or 

unexpected PPS arediscovered or 

cannot providedocumentation of 

requirement to use a port scanner = 0 

Can provide

documentation of requirement to use port scanner &

scans are performed

less frequently thanmonthly = 1

Can provide

documentation of requirement to use

 port scanner &scans are performedmonthly or more

frequently thanmonthly = 2

Does not utilize

  port scanner toensure no new or 

unexpected PPS arediscovered or 

cannot demonstratehow their scanner 

is used = 0 

Can demonstrate

how their scanner 

is used & scans are performed yearly or less frequently than

yearly = 1

Can demonstrate

how their scanner is used & scans are

 performedquarterly or less

frequently thanquarterly but morefrequently than

yearly = 2

Can demonstrate

how their scanner 

UNCLASSIFIED

95

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 96: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 96/121

is used & scans are

 performed monthlyor less frequently

than monthly but

more frequentlythan quarterly = 3

Score

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

91 Is the vendor’s application

compliant with the DoD Ports,

Protocols, and Services CAL?

DCPP-1 Is not compliant with

the PPS CAL or 

cannot describe howthey are compliant

= 0 

Can describe howthey are compliant

with the PPS CAL

= 1 

Is not compliant

with PPS CAL or 

cannot describehow they are

compliant = 0 

Can providedocumentation of 

compliancy with the

PPS CAL = 2

Is not compliant

with PPS CAL or 

cannot describehow they are

compliant = 0 

Can demonstratethey are compliant

with the PPS CAL

= 3

Score

UNCLASSIFIED

96

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 97: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 97/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

92 Are the results of the port

scans sent to management ona regular basis?

VIVM-1 Are not sent to

management or cannot describe

requirement for portsscan results to be

sent to management= 0 

Can describe

requirement for port

scan results to be

sent to management= 1 

Are not sent to

management or cannot provide

documentation of the requirement for 

 port scan results to be sent to

management = 0 

Can provide

documentation of 

the requirement for  port scan results to be sent to

management = 2

Are not sent to

management or cannot demonstrate

requirement for  port scan results to

 be sent tomanagement = 0 

Can demonstrate

 port scan results to

 be sent to

management = 3

Score

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

93 What ports, protocols, and

services are necessary for

access to the application fromoutside the local enclave?

DCPP-1

VIVM-1

Note PPS and

Compliance

statement here:

Score

UNCLASSIFIED

97

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 98: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 98/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

94 Does the vendor routinely run

a web-scanning tool to check for new web vulnerabilities?

VIVM-1 Does not utilize web

scanner to check for new web

vulnerabilities or cannot describe how

their web scanner isused = 0 

Can describe how

their web scanner is

used = 1 

Does not utilize

web scanner tocheck for new web

vulnerabilities or cannot provide

documentation of requirement to scan

web = 0 

Can provide

documentation of 

requirement to scanweb & scans are performed less

frequently than

monthly = 1

Can providedocumentation of 

requirement to scanweb & scans are

 performed monthlyor more frequentlythan monthly = 2

Does not utilize

web scanner tocheck for new web

vulnerabilities or cannot demonstrate

how their webscanner is used = 0

Can demonstrate

how their web

scanner is used &

scans are performed yearly or less frequently than

yearly = 1

Can demonstrate

how their webscanner is used &

scans are performed

quarterly or lessfrequently thanquarterly but more

frequently thanyearly = 2

Can demonstrate

UNCLASSIFIED

98

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 99: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 99/121

how their web

scanner is used &scans are

 performed monthly

or less frequentlythan monthly but

more frequentlythan quarterly = 3

Score

UNCLASSIFIED

99

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 100: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 100/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

95 Are the results of the web

scans sent to management ona regular basis?

VIVM-1 Are not sent to

management or cannot describe

requirement for webscan results to be

sent to management= 0 

Can describe the

requirement for web

scan results to be

sent to management= 1 

Are not sent to

management or cannot provide

documentation of requirement for web

scan results to besent to management

= 0 

Can provide

documentation of 

requirement for webscan results to besent to management

= 2

Are not sent to

management or cannot demonstrate

requirement for web scan results to

 be sent tomanagement = 0 

Can demonstrate

web scan results are

sent to management

= 3

Score

UNCLASSIFIED

100

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 101: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 101/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

96 Does the vendor routinely run

a password checking tool?

Questions to Ask 1. How frequently is the

 password checking tool run?

2. Are they using non-DoD PKI

or DoD PKI?

VIVM-1 Does not utilize

 password checkingtool or cannot

describe how their  password checking

tool works = 0 

Can describe howtheir password

checking tool works

= 1 

Does not utilize

 password checkingtool or cannot

 providedocumentation of 

requirement for tool= 0 

Can provide

documentation of 

requirement for 

 password checkingtool & it is run lessfrequently than

monthly or they are

using non-DoDPKI= 1

Can provide

documentation of requirement for 

 password checkingtool & it is runmonthly or more

frequently thanmonthly or they are

using DoD PKI = 2

Does not utilize

 password checkingtool or cannot

demonstrate howtheir password

checking toolworks = 0 

Can demonstrate

how their password

checking tool

works & it is runless frequently thanmonthly or they are

using non-DoD

PKI= 2

Can demonstratehow their password

checking toolworks & it is run

monthly or morefrequently thanmonthly or they are

using DoD PKI = 3

Score

UNCLASSIFIED

101

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 102: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 102/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

97 Are the results of the

password checking tool sentto management on a regular

basis?

VIVM-1 Are not sent to

management or cannot describe

requirement for  password checking

results to be sent tomanagement = 0 

Can describe

requirement for 

 password checking

results to be sent tomanagement = 1 

Are not sent to

management or cannot provide

documentation of requirement for 

 password checkingresults to be sent to

management = 0 

Can provide

documentation of 

requirement for  password checkingresults to be sent to

management = 2

Are not sent to

management or cannot demonstrate

requirement for  password checking

results to be sent tomanagement = 0 

Can demonstrate

 password checking

results are sent to

management = 3

Score

UNCLASSIFIED

102

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 103: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 103/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

98 Does the vendor subscribe to

the applicable vendor’ssecurity notification sites for

the latest security

vulnerabilities’ notifications?

VIVM-1 Does not subscribe

to securitynotification sites or 

cannot describerequirement for 

subscribing tosecurity notification

sites = 0 

Can describe

requirement for 

subscribing tosecurity notificationsites = 1 

Does not subscribe

to securitynotification sites or 

cannot providedocumentation of 

requirement for subscribing to

security notificationsites = 0 

Can provide

documentation of requirement for subscribing to

security notification

sites = 2

Does not subscribe

to securitynotification sites or 

cannot demonstratethey have

subscribed tosecurity

notification sites= 0 

Can demonstrate

they havesubscribed tosecurity

notification sites

= 3

Score

UNCLASSIFIED

103

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 104: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 104/121

Personnel SecurityVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

99 Does the vendor have adocumented requirement for

a background security

investigation?

Question to Ask 1. What type of background

security investigation is

required?

PRAS-1PRMP-2PRNK-1

Does not haverequirement for  background security

investigation or cannot describe their 

 background securityinvestigation = 0 

Can describe their  background security

investigation = 1 

Does not haverequirement for  background security

investigation or cannot provide

documentation of requirement for 

 background security

investigation = 0 

Can providedocumentation of 

the requirement for 

 background securityinvestigation &

investigation iscommercial or 

DoD/OPM= 1

Can provide

documentation of requirement for 

 background securityinvestigation &

investigation is

SSBI = 2

Does not have backgroundsecurity

investigation or cannot demonstrate

 backgroundsecurity

investigation has

 been done = 0 

Can demonstrate background

security

investigation has been done &

investigation iscommercial = 1

Can demonstrate

 background

securityinvestigation has

 been done &investigation is

DoD/OPM = 2

UNCLASSIFIED

104

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 105: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 105/121

Can demonstrate

 backgroundsecurity

investigation has

 been done &investigation is

SSBI = 2

Score

UNCLASSIFIED

105

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 106: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 106/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

100 Does the vendor perform

background securityinvestigations on a regular

basis?

Question to Ask 1. How frequently are

 background investigation

 performed?

PRAS-1

PRMP-2PRNK-1

Does not have

 background securityinvestigation or 

cannot describe their  background security

investigation = 0 

Can describe their  background security

investigation = 1 

Does not have

 background securityinvestigation or 

cannot provide copyof background

securityinvestigation = 0 

Can provide

documentation of 

 background security

investigation &investigation is performed less

frequently than

every 5 years = 1

Can providedocumentation of 

 background securityinvestigation &

investigation is performed every 5years or more

frequently thanevery 5 years = 2

Does not have

 backgroundsecurity

investigation or cannot demonstrate

 backgroundinvestigation has

 been done = 0 

Can demonstrate

security

investigation has been done &investigation is

 performed less

frequently thanevery 5 years = 2

Can demonstrate

securityinvestigation has

 been done &investigation is performed every 5

years or morefrequently than

every 5 years = 3

Score

UNCLASSIFIED

106

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 107: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 107/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

101 Can the vendor prove they

perform background securityinvestigations?

Thing to Consider 1. Is having a clearance a

requirement in the Statement

of Work?

PRAS-1

PRMP-2PRNK-1

Cannot prove they

do backgroundinvestigations = 0 

Can prove they do

 backgroundinvestigations = 2 

 NA NA

Score

UNCLASSIFIED

107

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 108: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 108/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

102 Does the vendor’s

background securityinvestigation include

pertinent areas?

List of Items to be Included1. Does the hiring process

restrict hiring a convicted

felon?

2. Does the investigation cover 

 participation or membership

of subversive activities or 

groups?

3. Does the investigation

research the credit

 background of the potential

employee?

4. Does the hiring process

require a drug screening test?

PRAS-1

PRMP-2PRNK-1

Does not require

 background securityinvestigation or they

cannot describe their  background

investigation = 0 

Can describe their  background

investigation = 1 

Does not require

 background securityinvestigation or 

they cannot providedocumentation of 

their backgroundinvestigation = 0 

Can provide

documentation of 

their background

investigation & itincludes 1 – 2 of listed items = 1

Can providedocumentation of 

their backgroundinvestigation & it

includes 3 - 4 of listed items = 2

Does not require

 backgroundsecurity

investigation or they cannot

demonstrate their  background

investigation = 0 

Can demonstrate

their background

investigation & itincludes 1 – 2 of listed items = 1

Can demonstratetheir background

investigation & itincludes 3 of listed

items = 2

Can demonstratetheir backgroundinvestigation & it

includes 4 of listeditems = 3

Score

UNCLASSIFIED

108

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 109: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 109/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

103 Are vendor personnel subject

to a background check?

List of Items to be Included1. System Administrators

2. Help Desk  

3. Administrative Personnel

4. Management

5. Janitorial Staff 

PRNK-1 Are not subject to

 background check or 

cannot describe their  background check 

= 0 

Can describe their  background check 

= 1 

Are not subject to

 background check 

or cannot providedocumentation of 

their backgroundcheck = 0 

Can provide

documentation of their background

check & system

administrators &

help desk aresubject to background check 

= 1

Can provide

documentation of their background

check & all 5 of listed items are

subject to background check = 2

Are not subject to

 background check 

or cannotdemonstrate their 

 background check = 0 

Can demonstrate

their backgroundcheck & system

administrators &

help desk are

subject to background check = 1

Can demonstratetheir background

check & systemadministrators, help

desk, &management are

subject to background check = 2

Can demonstrate

their background

check & all 5 of 

UNCLASSIFIED

109

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 110: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 110/121

listed items are

subject to background check 

= 3

Score

UNCLASSIFIED

110

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 111: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 111/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

104 Does the personnel assigned

to doing background checkshave a security clearance?

PRNK-1 Do not have security

clearance or vendor cannot describe

requirement for these personnel to

have clearance = 0 

Can describerequirement for 

these personnel to

have clearance = 1 

Do not have

security clearanceor vendor cannot

 providedocumentation of 

requirement for these personnel to

have clearance = 0 

Can provide

documentation of requirement for these personnel to

have clearance = 2

Do not have

security clearanceor vendor cannot

demonstraterequirement for 

these personnel tohave clearance = 0 

Can demonstrate

these personnel to

have clearance = 3

Score

UNCLASSIFIED

111

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 112: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 112/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

105 Does the have a policy to

ensure uncleared personnelare escorted?

PEPK-1 Does not have a

 policy for uncleared personnel to be

escorted or cannotdescribe this policy

= 0 

Can describe the policy which

requires uncleared

 personnel to be

escorted = 1 

Does not have

 policy for uncleared personnel to be

escorted or cannot provide

documentation of this policy = 0 

Can provide

documentation of 

this policy = 2

Does not have

 policy for uncleared personnel

to be escorted or cannot demonstrate

this policy = 0 

Can demonstrateuncleared personnel

are escorted = 3

Score

UNCLASSIFIED

112

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 113: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 113/121

Physical SecurityVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

106 Is there access control atevery physical access point to

the vendor facility?

PEPF-1 Does not have accesscontrol at everyaccess point or 

cannot describe howevery physical

access point hasaccess control = 0 

Can describe howevery physical

access point hasaccess control = 1 

Does not haveaccess control atevery access point

or cannot providedocumentation

requiring accesscontrol at every

 physical access

 point = 0 

Can providedocumentation

requiring access

control at every physical access

 point = 2

Does not haveaccess control atevery access point

or cannotdemonstrate how

every physicalaccess point has

access control = 0

Can demonstrate

access control atevery physical

access point to the

facility = 3

Score

UNCLASSIFIED

113

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 114: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 114/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

107 Does the facility housing the

equipment have a separateaccess control zone to restrict

unauthorized personnel?

PEPF-1 Does not have

separate accesscontrol zone to

restrict unauthorized personnel or cannot

describe how their separate access

control zone is usedto restrict

unauthorized

 personnel = 0 

Can describe howtheir separate access

control zone is used

to restrictunauthorized

 personnel = 1 

Does not have

separate accesscontrol zone to

restrictunauthorized

 personnel or cannot provide

documentation of requirement of 

separate access

control zone is used

to restrictunauthorized personnel = 0 

Can providedocumentation of 

requirement of separate access

control zone is usedto restrict

unauthorized

 personnel = 2

Does not have

separate accesscontrol zone to

restrictunauthorized

 personnel or cannotdemonstrate how

their separateaccess control zone

is used to restrict

unauthorized

 personnel = 0 

Can demonstrate

how their separate

access control zoneis used to restrict

unauthorized personnel = 3

Score

UNCLASSIFIED

114

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 115: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 115/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

108 Does the facility housing the

equipment have additionalsecurity measures (key

control)?

Items to Consider 1. Area is locked with a key

lock when not manned.

2. All doors, either interior or 

exterior, have Closed Circuit

Television (CCTV)/motion

detector.

3. Area is manned 24X7 or area

is alarmed when not manned

or area is locked with GSA

approved lock when not

manned.

DCBP-1 Does not have

additional securitymeasures or cannot

describe how their additional security

measures = 0 

Can describe howtheir additional

security measures

are present in facility

housing equipment= 1 

Does not have

additional securitymeasures or cannot

 providedocumentation

requiring additionalsecurity measures

= 0 

Can provide

documentation

requiring additionalsecurity measures= 2

Does not have

additional securitymeasures or cannot

demonstrate their additional security

measures = 0 

Can demonstratetheir additional

security measures

on facility housing

equipment & areais locked with keylock when not

manned = 1

Can demonstrate

their additionalsecurity measures

on facility housingequipment & all

doors have

CCTV/motiondetector = 2

Can demonstrate

their additional

security measures

UNCLASSIFIED

115

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 116: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 116/121

on facility housing

equipment & areais manned 24X7 or 

area is alarmed

when not mannedor area is locked

with GSAapprovedcombination lock 

when not manned= 3

Score

UNCLASSIFIED

116

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 117: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 117/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

109 Does the facility have a

disaster recovery plan?

Question to Ask 1. Is the plan developed,

documented, & tested

annually?

CODP-1

COAS-1

Does not have

disaster recovery plan or cannot

describe their disaster recovery

 plan = 0 

Can describe howtheir disaster 

recovery plan = 1 

Does not have

disaster recovery plan or cannot

 provide their disaster recovery

 plan = 0 

Can provide their disaster recovery

 plan but it is

documented only= 1

Can provide their 

disaster recovery

 plan & it is fullydeveloped,

documented &tested annually = 2

Does not have

disaster recovery plan or cannot

demonstrate their disaster recovery

 plan = 0 

Can demonstratetheir disaster 

recovery plan but it

is documented only= 2

Can demonstrate

their disaster 

recovery plan & itis fully developed,

documented &tested annually = 3

Score

UNCLASSIFIED

117

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 118: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 118/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

110 Does the facility have

environmental controls?

Items to Include1. Fire Suppression

2. Climate Controlled computer 

facility

PEFD-1

PEHC-1PETC-1

PEVR-1

Does not have

environmentalcontrols or cannot

describe their environmental

controls = 0 

Can describeenvironmental

controls = 1 

Does not have

environmentalcontrols or cannot

 providedocumentation of 

their environmentalcontrols = 0 

Can provide

documentation of 

their environmentalcontrols & it

includes 1 of itemslisted = 1

Can providedocumentation of 

their environmentalcontrols & it

includes 2 of theitems listed = 2

Does not have

environmentalcontrols or cannot

demonstrate their environmental

controls = 0 

Can demonstratetheir environmental

controls & it

includes 1 of itemslisted = 2

Can demonstrate

environmental

controls & itincludes 2 of items

listed = 3

Score

UNCLASSIFIED

118

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 119: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 119/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

111 Does the vendor have an

approved standoff disasterperimeter of defense?

Item to Consider 1. Based on MAC level, does

the plan commensurate with

the Statement of Work?

PEFD-1

PEHC-1PETC-1

PEVR-1

Does not have

approved standoff disaster perimeter of 

defense or cannotdescribe their 

approved standoff disaster perimeter of 

defense = 0 

Can describe

approved standoff disaster perimeter of 

defense = 1 

Does not have

approved standoff disaster perimeter 

of defense or cannot provide

documentation of their approved

standoff disaster  perimeter of 

defense = 0 

Can provide

documentation of their approved

standoff disaster 

 perimeter of defense = 2

Does not have

approved standoff disaster perimeter 

of defense or cannot demonstrate

their approvedstandoff disaster 

 perimeter of defense = 0 

Can demonstratetheir approved

standoff disaster  perimeter of 

defense = 3

Score

UNCLASSIFIED

119

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 120: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 120/121

Security Awareness and TrainingVulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

112 Do employees receive generalsecurity training?

Questions to Ask 1. Are training materials made

available?

2. Is initial & annual training

given & documented?

DCSD-1PECF-1PRRB-1

PRTN-1

Does not havegeneral securitytraining or cannot

describe their general security

training = 0 

Can describe their 

general securitytraining = 1 

Does not havegeneral securitytraining or cannot

 providedocumentation of 

their generalsecurity training = 0

Can providedocumentation of 

their generalsecurity training but

it is only training

materials madeavailable = 1

Can provide

documentation of their general

security training &

it is includes initial& annual training &

the training isdocumented = 2

Does not havegeneral securitytraining or cannot

demonstrate their general security

training = 0 

Can demonstrate

their generalsecurity training

 but it is onlytraining materials

made available = 2

Can demonstrate

their generalsecurity training &

it is includes initial& annual training

& the training is

documented = 3

Score

UNCLASSIFIED

120

Best Practices Security Checklist V2R1 January 29, 2007 Field Security OperationsChecklist Defense Information Systems Agency

Page 121: Best Security Practices Checklist

8/6/2019 Best Security Practices Checklist

http://slidepdf.com/reader/full/best-security-practices-checklist 121/121

Vulnerability IA

Control

Description

Criteria

Documentation

Criteria

Demonstration

Criteria

113 Do privileged users receive

additional security trainingspecific to their duties?

Questions to Ask 1. Are privileged users given

additional training?

2. Do system administrators,

security personnel & other 

 privileged users required to

 be certified?

PECF-1

PRRB-1PRTN-1

Do not receive

additional securitytraining or cannot

describe privilegedusers’ additional

training = 0 

Can describe privileged users’

additional training

= 1 

Do not receive

additional securitytraining or cannot

 providedocumentation of 

 privileged users’additional training

= 0 

Can provide

documentation of  privileged users’

additional training= 1

Can providedocumentation of 

systemadministrators,

security personnel,& privileged users’

additional training

= 2

Does not have

general securitytraining or cannot

demonstrate their general security

training = 0 

Can demonstrate privileged users’

additional training

= 2

Can demonstratesystem

administrators,

security personnel,& privileged users’

additional training= 3

Score