<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Help with the NIST 800-53 controls list in Tech Talk</title>
    <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5905#M173</link>
    <description>&lt;P&gt;Have you also looked at 800-53A? It tells how to test each of the controls selected from 800-53. Here is an example of one control. At the bottom you can see it gives examples of what may meet compliance for this control. The way&amp;nbsp; 800-53 works is this: 1) Determine the level of data protection needed (Low, Medium, High) then determine the controls needed to protect that data. Add additional controls if desired. Then you use 800-53A to test to see if you are in compliance. Hope this helps.&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="7"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size="1"&gt;ASSESSMENT OBJECTIVE&lt;/FONT&gt;&lt;FONT size="2"&gt;: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;Determine if the organization: &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1][a] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;defines critical information system software and other security-related information requiring backup copies to be stored in a separate facility; or &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1][b] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;defines critical information system software and other security-related information requiring backup copies to be stored in a fire-rated container that is not collocated with the operational system; and &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[2] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;stores backup copies of organization-defined critical information system software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the operational system. &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size="1"&gt;POTENTIAL ASSESSMENT METHODS AND OBJECTS&lt;/FONT&gt;&lt;FONT size="2"&gt;: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Examine&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Contingency planning policy; procedures addressing information system backup; contingency plan; backup storage location(s); information system backup configurations and associated documentation; information system backup logs or records; other relevant documents or records]. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Interview&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Organizational personnel with contingency planning and plan implementation responsibilities; organizational personnel with information system backup responsibilities; organizational personnel with information security responsibilities]. &lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
    <pubDate>Thu, 01 Feb 2018 14:03:07 GMT</pubDate>
    <dc:creator>CISOScott</dc:creator>
    <dc:date>2018-02-01T14:03:07Z</dc:date>
    <item>
      <title>Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5893#M170</link>
      <description>&lt;P&gt;Hello ISC2 community,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Wondered if some of you have dealt with the controls in the 800-53 publication of NIST. I am unaware if lack of technical knowledge or twisted language is the reason but I am having troubles in understanding some of them especially when trying to imagine what would that control look like in reality. Do someone know or can provide a source where I can see examples of actual security controls for each of the NIST 800-53 controls?&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 10:37:50 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5893#M170</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-01T10:37:50Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5899#M171</link>
      <description>&lt;P&gt;I have a crosswalk document of technical controls on my onedrive to share, or you can search for&lt;/P&gt;&lt;DIV&gt;&lt;FONT size="3"&gt;Cyber Resilience Review (CRR):NIST Cybersecurity Framework Crosswalks&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&amp;nbsp;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="3"&gt;good luck&lt;/FONT&gt;&lt;/DIV&gt;&lt;DIV&gt;&lt;FONT size="3"&gt;Christine&lt;/FONT&gt;&lt;/DIV&gt;</description>
      <pubDate>Thu, 01 Feb 2018 11:58:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5899#M171</guid>
      <dc:creator>cgrooby</dc:creator>
      <dc:date>2018-02-01T11:58:16Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5900#M172</link>
      <description>&lt;P&gt;Thank you so very much Christine. I am still reviewing the Crossroads document you referenced but if it has references to all of the NIST controls - it would help me a lot indeed. If you do not mind sharing the document you mentioned you have - I can also benefit from it. Please let me know if you'd prefer me to contact you separately (over email or else)&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 12:12:00 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5900#M172</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-01T12:12:00Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5905#M173</link>
      <description>&lt;P&gt;Have you also looked at 800-53A? It tells how to test each of the controls selected from 800-53. Here is an example of one control. At the bottom you can see it gives examples of what may meet compliance for this control. The way&amp;nbsp; 800-53 works is this: 1) Determine the level of data protection needed (Low, Medium, High) then determine the controls needed to protect that data. Add additional controls if desired. Then you use 800-53A to test to see if you are in compliance. Hope this helps.&lt;/P&gt;&lt;P&gt;Scott&lt;/P&gt;&lt;TABLE border="1" cellspacing="0" cellpadding="7"&gt;&lt;TBODY&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size="1"&gt;ASSESSMENT OBJECTIVE&lt;/FONT&gt;&lt;FONT size="2"&gt;: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;Determine if the organization: &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1][a] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;defines critical information system software and other security-related information requiring backup copies to be stored in a separate facility; or &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[1][b] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;defines critical information system software and other security-related information requiring backup copies to be stored in a fire-rated container that is not collocated with the operational system; and &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;STRONG&gt;&lt;FONT size="1"&gt;CP&lt;/FONT&gt;&lt;FONT size="2"&gt;-&lt;/FONT&gt;&lt;FONT size="1"&gt;9(3)[2] &lt;/FONT&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;/TD&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT face="Times New Roman,Times New Roman" size="2"&gt;&lt;I&gt;stores backup copies of organization-defined critical information system software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the operational system. &lt;/I&gt;&lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;TR&gt;&lt;TD&gt;&lt;P&gt;&lt;FONT size="1"&gt;POTENTIAL ASSESSMENT METHODS AND OBJECTS&lt;/FONT&gt;&lt;FONT size="2"&gt;: &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Examine&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Contingency planning policy; procedures addressing information system backup; contingency plan; backup storage location(s); information system backup configurations and associated documentation; information system backup logs or records; other relevant documents or records]. &lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT size="1"&gt;&lt;STRONG&gt;Interview&lt;/STRONG&gt;&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: [&lt;/FONT&gt;&lt;I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;SELECT FROM&lt;/FONT&gt;&lt;FONT face="Arial,Arial" size="1"&gt;: &lt;/FONT&gt;&lt;/I&gt;&lt;FONT face="Arial,Arial" size="1"&gt;Organizational personnel with contingency planning and plan implementation responsibilities; organizational personnel with information system backup responsibilities; organizational personnel with information security responsibilities]. &lt;/FONT&gt;&lt;/P&gt;&lt;/TD&gt;&lt;/TR&gt;&lt;/TBODY&gt;&lt;/TABLE&gt;</description>
      <pubDate>Thu, 01 Feb 2018 14:03:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5905#M173</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-02-01T14:03:07Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5911#M174</link>
      <description>&lt;P&gt;-&lt;/P&gt;&lt;P&gt;&amp;nbsp; You -might- find the Cloud Security Alliance (CSA) mappings to be of use.&amp;nbsp; The CSA in the Cloud Controls Matrix (CCM) spreadsheet and the Consensus Assessments Initiative Questionnaire (CAIQ) do a reasonably decent job of mapping controls from all sorts of frameworks and standards (your mileage may vary).&amp;nbsp; Also, the 13 CCM controls are described fairly well and you can see which sp800-53 controls they have mapped them to.&lt;/P&gt;&lt;P&gt;The CAIQ breaks each of the 133 controls down into a few questions and also maps them to sp800-53 (among ~30 other standards).&amp;nbsp; Sadly, they do not provide mapping -from- those other standards, but it can still be useful.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://cloudsecurityalliance.org/star/#star_i&amp;nbsp;" target="_blank"&gt;https://cloudsecurityalliance.org/star/#star_i&amp;nbsp;&lt;/A&gt;&lt;BR /&gt;and look for CCM or CAIQ.&lt;/P&gt;</description>
      <pubDate>Thu, 01 Feb 2018 15:14:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5911#M174</guid>
      <dc:creator>Edd</dc:creator>
      <dc:date>2018-02-01T15:14:10Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5976#M175</link>
      <description>&lt;P&gt;Thank you all for the great resources - definitely of huge help.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Feb 2018 08:40:44 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/5976#M175</guid>
      <dc:creator>Deyan</dc:creator>
      <dc:date>2018-02-02T08:40:44Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/13095#M362</link>
      <description>&lt;P&gt;Did you ever get an answer to your question?&amp;nbsp; Try doing a search on "SRTM".&amp;nbsp; This is a matrix of all controls and an explanation of how a system is in compliance.&amp;nbsp; You can also do a search on "SSP".....&amp;nbsp; again, this is where a company identifies how it is meeting the requirements.&amp;nbsp; I can't give samples because those to which&amp;nbsp;I have access are classified, but you might find a sample or two listed&amp;nbsp;on google.&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 13:22:07 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/13095#M362</guid>
      <dc:creator>DMerchant</dc:creator>
      <dc:date>2018-08-01T13:22:07Z</dc:date>
    </item>
    <item>
      <title>Re: Help with the NIST 800-53 controls list</title>
      <link>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/13096#M363</link>
      <description>&lt;P&gt;You can also look at my response to this post:&lt;/P&gt;&lt;P&gt;&lt;A title="Link to crosswalk" href="https://community.isc2.org/t5/Tech-Talk/Cyber-Risk-Library/td-p/9583" target="_self"&gt;https://community.isc2.org/t5/Tech-Talk/Cyber-Risk-Library/td-p/9583&lt;/A&gt;&lt;/P&gt;&lt;P&gt;My response shows a link to auditscripts.com which has several framework crosswalks.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 01 Aug 2018 14:12:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Tech-Talk/Help-with-the-NIST-800-53-controls-list/m-p/13096#M363</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2018-08-01T14:12:16Z</dc:date>
    </item>
  </channel>
</rss>

