-
Notifications
You must be signed in to change notification settings - Fork 210
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Map rules to NIST 800-53 standard #394
Comments
Status updateSummaryCurrently, performing mapping between PCI DSS and NIST 800 53. Slowly due to manual process and further reading. The mapping table is quite difuse. Tasks
Difficulties
Pending
|
Just sharing the mapping: {
"pci_dss_1.1.1": "nist_800_53_CM.3",
"pci_dss_1.3.4": "nist_800_53_CA.3,nist_800_53_SC.7",
"pci_dss_1.4": "nist_800_53_SC.7",
"pci_dss_10.1": "nist_800_53_AU.1",
"pci_dss_10.2.1": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.2.2": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.2.4": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.2.5": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.2.6": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.2.7": "nist_800_53_AU.3,nist_800_53_IA.10",
"pci_dss_10.4": "nist_800_53_AU.8",
"pci_dss_10.5.2": "nist_800_53_AU.9",
"pci_dss_10.5.5": "nist_800_53_AU.9",
"pci_dss_10.6": "nist_800_53_AU.6",
"pci_dss_10.6.1": "nist_800_53_AU.6",
"pci_dss_11.4": "nist_800_53_SC.7",
"pci_dss_11.5": "nist_800_53_SI.7",
"pci_dss_2.2": "nist_800_53_CM.1",
"pci_dss_2.2.3": "nist_800_53_CM.1",
"pci_dss_4.1": "nist_800_53_SC.8",
"pci_dss_5.1": "nist_800_53_SI.5",
"pci_dss_5.2": "nist_800_53_SI.5",
"pci_dss_6.2": "nist_800_53_MA.2",
"pci_dss_6.5": "nist_800_53_SA.11",
"pci_dss_6.5.1": "nist_800_53_SA.11",
"pci_dss_6.5.10": "nist_800_53_SA.11",
"pci_dss_6.5.2": "nist_800_53_SA.11",
"pci_dss_6.5.5": "nist_800_53_SA.11",
"pci_dss_6.5.7": "nist_800_53_SA.11",
"pci_dss_6.5.8": "nist_800_53_SA.11",
"pci_dss_6.6": "nist_800_53_SI.10,nist_800_53_SI.11,nist_800_53_SI.15,nist_800_53_SI.16",
"pci_dss_8.1.2": "nist_800_53_AC.2,nist_800_53_IA.4",
"pci_dss_8.1.4": "nist_800_53_AC.2",
"pci_dss_8.1.5": "nist_800_53_AC.2",
"pci_dss_8.1.6": "nist_800_53_AC.7",
"pci_dss_8.1.8": "nist_800_53_AC.12",
"pci_dss_8.2.4": "nist_800_53_IA.5",
"pci_dss_8.7": "nist_800_53_SC.2"
} |
This was referenced May 15, 2019
Need to improve NIST mapping. |
This is the improved version of the mapping:
The next step will be resetting the nist rules and re-run the script to edit the ruleset. |
Need to update to the following improved mapping:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
This issue is similar to #392.
Taking advantage of current PCI DSS mapping and NIST 800-53 equivalences, we can map the current ruleset to NIST 800-53 Security Control Catalog, according to the following table:
CM-8: Information System Component Inventory
IA-3: Device Identification and Authentication
SA-4: Acquisition Process
SC-17: Public Key Infrastructure Certificates
SI-4: Information System Monitoring
PM-5: Information System Inventory
CM-2: Baseline Configuration
CM-8: Information System Component Inventory
CM-10: Software Usage Restrictions
CM-11: User-Installed Software
SA-4: Acquisition Process
SC-18: Mobile Code
SC-34: Non-Modifiable Executable Programs
SI-4: Information System Monitoring
PM-5: Information System Inventory
6.2
11.2
CA-7: Continuous Monitoring
RA-5: Vulnerability Scanning
SC-34: Non-Modifiable Executable Programs
SI-4: Information System Monitoring
SI-7: Software, Firmware, and Information Integrity
7.1 - 7.3
8.1 - 8.3
8.7
AC-6: Least Privilege
AC-17: Remote Access
AC-19: Access Control for Mobile Devices
CA-7: Continuous Monitoring
IA-2: Identification and Authentication (Organizational Users)
IA-4: Identifier Management
IA-5: Authenticator Management
SI-4: Information System Monitoring
2.3
6.2
11.5
CM-2: Baseline Configuration
CM-3: Configuration Change Control
CM-5: Access Restrictions for Change
CM-6: Configuration Settings
CM-7: Least Functionality
CM-8: Information System Component Inventory
CM-9: Configuration Management Plan
CM-11: User-Installed Software
MA-4: Nonlocal Maintenance
RA-5: Vulnerability Scanning
SA-4: Acquisition Process
SC-15: Collaborative Computing Devices
SC-34: Non-Modifiable Executable Programs
SI-2: Flaw Remediation
SI-4: Information System Monitoring
AU-2: Audit Events
AU-3: Content of Audit Records
AU-4: Audit Storage Capacity
AU-5: Response to Audit Processing Failures
AU-6: Audit Review, Analysis, and Reporting
AU-7: Audit Reduction and Report Generation
AU-8: Time Stamps
AU-9: Protection of Audit Information
AU-10: Non-repudiation
AU-11: Audit Record Retention
AU-12: Audit Generation
AU-13: Monitoring for Information Disclosure
AU-14: Session Audit
CA-7: Continuous Monitoring
IA-10: Adaptive Identification and Authentication
SI-4: Information System Monitoring
2.3
6.2
11.5
CM-2: Baseline Configuration
CM-3: Configuration Change Control
CM-5: Access Restrictions for Change
CM-6: Configuration Settings
CM-7: Least Functionality
CM-8: Information System Component Inventory
CM-9: Configuration Management Plan
CM-11: User-Installed Software
MA-4: Nonlocal Maintenance
RA-5: Vulnerability Scanning
SA-4: Acquisition Process
SC-15: Collaborative Computing Devices
SC-34: Non-Modifiable Executable Programs
SI-2: Flaw Remediation
SI-4: Information System Monitoring
SC-39: Process Isolation
SC-44: Detonation Chambers
SI-3: Malicious Code Protection
SI-4: Information System Monitoring
SI-8: Spam Protection
CA-7: Continuous Monitoring
CA-9: Internal System Connections
CM-2: Baseline Configuration
CM-6: Configuration Settings
CM-8: Information System Component Inventory
SC-20: Secure Name /Address Resolution Service (Authoritative Source)
SC-21: Secure Name /Address Resolution Service (Recursive or Caching Resolver)
SC-22: Architecture and Provisioning for Name/Address Resolution Service
SC-41: Port and I/O Device Access
SI-4: Information System Monitoring
9.5 - 9.7
CP-10: Information System Recovery and Reconstitution
MP-4: Media Storage
2.2
6.2
CA-3: System Interconnections
CA-7: Continuous Monitoring
CA-9: Internal System Connections
CM-2: Baseline Configuration
CM-3: Configuration Change Control
CM-5: Access Restrictions for Change
CM-6: Configuration Settings
CM-8: Information System Component Inventory
MA-4: Nonlocal Maintenance
SC-24: Fail in Known State
SI-4: Information System Monitoring
8.3
10.9
11.4
AC-17: Remote Access
AC-20: Use of External Information Systems
CA-3: System Interconnections
CA-7: Continuous Monitoring
CA-9: Internal System Connections
CM-2: Baseline Configuration
SA-9: External Information System Services
SC-7: Boundary Protection
SC-8: Transmission Confidentiality and Integrity
SI-4: Information System Monitoring
4.1 - 4.3
AC-4: Information Flow Enforcement
AC-23: Data Mining Protection
CA-7: Continuous Monitoring
CA-9: Internal System Connections
IR-9: Information Spillage Response
MP-5: Media Transport
SA-18: Tamper Resistance and Detection
SC-8: Transmission Confidentiality and Integrity
SC-28: Protection of Information at Rest
SC-31: Covert Channel Analysis
SC-41: Port and I/O Device Access
SI-4: Information System Monitoring
4.3
7.1 - 7.3
8.7
AC-2: Account Management
AC-3: Access Enforcement
AC-6: Least Privilege
AC-24: Access Control Decisions
CA-7: Continuous Monitoring
MP-3: Media Marking
RA-2: Security Categorization
SC-16: Transmission of Security Attributes
SI-4: Information System Monitoring
11.1
AC-19: Access Control for Mobile Devices
CA-3: System Interconnections
CA-7: Continuous Monitoring
CM-2: Baseline Configuration
IA-3: Device Identification and Authentication
SC-8: Transmission Confidentiality and Integrity
SC-17: Public Key Infrastructure Certificates
SC-40: Wireless Link Protection
SI-4: Information System Monitoring
8.7 - 8.8
AC-3: Access Enforcement
AC-7: Unsuccessful Logon Attempts
AC-11: Session Lock
AC-12: Session Termination
CA-7: Continuous Monitoring
IA-5: Authenticator Management
IA-10: Adaptive Identification and Authentication
SC-17: Public Key Infrastructure Certificates
SC-23: Session Authenticity
SI-4: Information System Monitoring
AT-2: Security Awareness Training
AT-3: Role-Based Security Training
AT-4: Security Training Records
SA-11: Developer Security Testing and Evaluation
SA-16: Developer-Provided Training
PM-13: Information Security Workforce
PM-14: Testing, Training, & Monitoring
PM-16: Threat Awareness Program
6.5 - 6.7
SA-15: Development Process, Standards, and Tools
SA-16: Developer-Provided Training
SA-17: Developer Security Architecture and Design
SA-20: Customized Development of Critical Components
SA-21: Developer Screening
SC-39: Process Isolation
SI-10: Information Input Validation
SI-11: Error Handling
SI-15: Information Output Filtering
SI-16: Memory Protection
IR-2: Incident Response Training
IR-3: Incident Response Testing
IR-4: Incident Handling
IR-5: Incident Monitoring
IR-6: Incident Reporting
IR-7: Incident Response Assistance
IR-8: Incident Response Plan
IR-10: Integrated Information Security Analysis Team
CA-5: Plan of Action and Milestones
CA-6: Security Authorization
CA-8: Penetration Testing
RA-6: Technical Surveillance Countermeasures Survey
SI-6: Security Function Verification
PM-6: Information Security Measures of Performance
PM-14: Testing, Training, & Monitoring
Tasks:
The text was updated successfully, but these errors were encountered: