RIST RMF Controls Flashcards

1
Q

AC-1

A

Access Control - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

AC-2

A

Access Control - Account Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

AC-3

A

Access Control - Access Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

AC-4

A

Access Control - Information Flow Enforcement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

AC-5

A

Access Control - Separation of Duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

AC-6

A

Access Control - Least Privilege

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AC-7

A

Access Control - Unsuccessful Logon Attempts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

AC-8

A

Access Control - System Use Notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

AC-9

A

Access Control - Previous Logon Notification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

AC-10

A

Access Control - Concurrent Session Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

AC-11

A

Access Control - Device Lock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

AC-12

A

Access Control - Session Termination

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

AC-13

A

Access Control - Supervision and Review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

AC-14

A

Access Control - Permitted Actions Without Identification or Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

AC-15

A

Access Control - Automated Marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

AC-16

A

Access Control - Security and Privacy Attributes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

AC-17

A

Access Control - Remote Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

AC-18

A

Access Control - Wireless Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

AC-19

A

Access Control - Access Control for Mobile Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

AC-20

A

Access Control - Use of External Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

AC-21

A

Access Control - Information Sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

AC-22

A

Access Control - Publicly Accessible Content

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

AC-23

A

Access Control - Data Mining Protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

AC-24

A

Access Control - Access Control Decisions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

AC-25

A

Access Control - Reference Monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

AT-1

A

Awareness and Training - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

AT-2

A

Awareness and Training - Literacy Training and Awareness

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

AT-3

A

Awareness and Training - Role-based Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

AT-4

A

Awareness and Training - Training Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

AT-5

A

Awareness and Training - Contacts with Security Groups and Associations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

AT-6

A

Awareness and Training - Training Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

AU-1

A

Audit and Accountability - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

AU-2

A

Audit and Accountability - Event Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

AU-3

A

Audit and Accountability - Content of Audit Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

AU-4

A

Audit and Accountability - Audit Log Storage Capacity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

AU-5

A

Audit and Accountability - Response to Audit Logging Process Failures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

AU-6

A

Audit and Accountability - Audit Record Review, Analysis, and Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

AU-7

A

Audit and Accountability - Audit Record Reduction and Report Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

AU-8

A

Audit and Accountability - Time Stamps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

AU-9

A

Audit and Accountability - Protection of Audit Information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

AU-10

A

Audit and Accountability - Non-repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

AU-11

A

Audit and Accountability - Audit Record Retention

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

AU-12

A

Audit and Accountability - Audit Record Generation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

AU-13

A

Audit and Accountability - Monitoring for Information Disclosure

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

AU-14

A

Audit and Accountability - Session Audit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

AU-15

A

Audit and Accountability - Alternate Audit Logging Capability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

AU-16

A

Audit and Accountability - Cross-organizational Audit Logging

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

CA-1

A

Assessment, Authorization, and Monitoring - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

CA-2

A

Assessment, Authorization, and Monitoring - Control Assessments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

CA-3

A

Assessment, Authorization, and Monitoring - Information Exchange

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

CA-4

A

Assessment, Authorization, and Monitoring - Security Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

CA-5

A

Assessment, Authorization, and Monitoring - Plan of Action and Milestones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

CA-6

A

Assessment, Authorization, and Monitoring - Authorization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

CA-7

A

Assessment, Authorization, and Monitoring - Continuous Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

CA-8

A

Assessment, Authorization, and Monitoring - Penetration Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

CA-9

A

Assessment, Authorization, and Monitoring - Internal System Connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

CM-1

A

Configuration Management - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

CM-2

A

Configuration Management - Baseline Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

CM-3

A

Configuration Management - Configuration Change Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

CM-4

A

Configuration Management - Impact Analyses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

CM-5

A

Configuration Management - Access Restrictions for Change

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

CM-6

A

Configuration Management - Configuration Settings

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

CM-7

A

Configuration Management - Least Functionality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

CM-8

A

Configuration Management - System Component Inventory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

CM-9

A

Configuration Management - Configuration Management Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

CM-10

A

Configuration Management - Software Usage Restrictions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

CM-11

A

Configuration Management - User-installed Software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

CM-12

A

Configuration Management - Information Location

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

CM-13

A

Configuration Management - Data Action Mapping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

CM-14

A

Configuration Management - Signed Components

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

CP-1

A

Contingency Planning - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

CP-2

A

Contingency Planning - Contingency Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

CP-3

A

Contingency Planning - Contingency Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

CP-4

A

Contingency Planning - Contingency Plan Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

CP-5

A

Contingency Planning - Contingency Plan Update

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

CP-6

A

Contingency Planning - Alternate Storage Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

CP-7

A

Contingency Planning - Alternate Processing Site

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

CP-8

A

Contingency Planning - Telecommunications Services

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

CP-9

A

Contingency Planning - System Backup

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

CP-10

A

Contingency Planning - System Recovery and Reconstitution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

CP-11

A

Contingency Planning - Alternate Communications Protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

CP-12

A

Contingency Planning - Safe Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

CP-13

A

Contingency Planning - Alternative Security Mechanisms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

IA-1

A

Identification and Authentication - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

IA-2

A

Identification and Authentication - Identification and Authentication (Organizational Users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

IA-3

A

Identification and Authentication - Device Identification and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

IA-4

A

Identification and Authentication - Identifier Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

IA-5

A

Identification and Authentication - Authenticator Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

IA-6

A

Identification and Authentication - Authentication Feedback

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

IA-7

A

Identification and Authentication - Cryptographic Module Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

IA-8

A

Identification and Authentication - Identification and Authentication (Non-organizational Users)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

IA-9

A

Identification and Authentication - Service Identification and Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

IA-10

A

Identification and Authentication - Adaptive Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

IA-11

A

Identification and Authentication - Re-authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

IA-12

A

Identification and Authentication - Identity Proofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

IR-1

A

Incident Response - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

IR-2

A

Incident Response - Incident Response Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

IR-3

A

Incident Response - Incident Response Testing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

IR-4

A

Incident Response - Incident Handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

IR-5

A

Incident Response - Incident Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

IR-6

A

Incident Response - Incident Reporting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q

IR-7

A

Incident Response - Incident Response Assistance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

IR-8

A

Incident Response - Incident Response Plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

IR-9

A

Incident Response - Information Spillage Response

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

IR-10

A

Incident Response - Integrated Information Security Analysis Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

MA-1

A

Maintenance - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

MA-2

A

Maintenance - Controlled Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

MA-3

A

Maintenance - Maintenance Tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

MA-4

A

Maintenance - Nonlocal Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

MA-5

A

Maintenance - Maintenance Personnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

MA-6

A

Maintenance - Timely Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

MA-7

A

Maintenance - Field Maintenance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

MP-1

A

Media Protection - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

MP-2

A

Media Protection - Media Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

MP-3

A

Media Protection - Media Marking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

MP-4

A

Media Protection - Media Storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

MP-5

A

Media Protection - Media Transport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

MP-6

A

Media Protection - Media Sanitization

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

MP-7

A

Media Protection - Media Use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

MP-8

A

Media Protection - Media Downgrading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

PE-1

A

Physical and Environmental Protection - Policy and Procedures

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

PE-2

A

Physical and Environmental Protection - Physical Access Authorizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

PE-3

A

Physical and Environmental Protection - Physical Access Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

PE-4

A

Physical and Environmental Protection - Access Control for Transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

PE-5

A

Physical and Environmental Protection - Access Control for Output Devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

PE-6

A

Physical and Environmental Protection - Monitoring Physical Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

PE-7

A

Physical and Environmental Protection - Visitor Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

PE-8

A

Physical and Environmental Protection - Visitor Access Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

PE-9

A

Physical and Environmental Protection - Power Equipment and Cabling

130
Q

PE-10

A

Physical and Environmental Protection - Emergency Shutoff

131
Q

PE-11

A

Physical and Environmental Protection - Emergency Power

132
Q

PE-12

A

Physical and Environmental Protection - Emergency Lighting

133
Q

PE-13

A

Physical and Environmental Protection - Fire Protection

134
Q

PE-14

A

Physical and Environmental Protection - Environmental Controls

135
Q

PE-15

A

Physical and Environmental Protection - Water Damage Protection

136
Q

PE-16

A

Physical and Environmental Protection - Delivery and Removal

137
Q

PE-17

A

Physical and Environmental Protection - Alternate Work Site

138
Q

PE-18

A

Physical and Environmental Protection - Location of System Components

139
Q

PE-19

A

Physical and Environmental Protection - Information Leakage

140
Q

PE-20

A

Physical and Environmental Protection - Asset Monitoring and Tracking

141
Q

PE-21

A

Physical and Environmental Protection - Electromagnetic Pulse Protection

142
Q

PE-22

A

Physical and Environmental Protection - Component Marking

143
Q

PE-23

A

Physical and Environmental Protection - Facility Location

144
Q

PL-1

A

Planning - Policy and Procedures

145
Q

PL-2

A

Planning - System Security and Privacy Plans

146
Q

PL-3

A

Planning - System Security Plan Update

147
Q

PL-4

A

Planning - Rules of Behavior

148
Q

PL-5

A

Planning - Privacy Impact Assessment

149
Q

PL-6

A

Planning - Security Related Activity Planning

150
Q

PL-7

A

Planning - Concept of Operation

151
Q

PL-8

A

Planning - Security and Privacy Architectures

152
Q

PL-9

A

Planning - Central Management

153
Q

PL-10

A

Planning - Baseline Selection

154
Q

PL-11

A

Planning - Baseline Tailoring

155
Q

PM-1

A

Program Management - Information Security Program Plan

156
Q

PM-2

A

Program Management - Information Security Program Leadership Role

157
Q

PM-3

A

Program Management - Information Security and Privacy Resources

158
Q

PM-4

A

Program Management - Plan of Action and Milestones Process

159
Q

PM-5

A

Program Management - System Inventory

160
Q

PM-6

A

Program Management - Measures of Performance

161
Q

PM-7

A

Program Management - Enterprise Architecture

162
Q

PM-8

A

Program Management - Critical Infrastructure Plan

163
Q

PM-9

A

Program Management - Critical Infrastructure Plan

164
Q

PM-10

A

Program Management - Authorization Process

165
Q

PM-11

A

Program Management - Mission and Business Process Definition

166
Q

PM-12

A

Program Management - Insider Threat Program

167
Q

PM-13

A

Program Management - Security and Privacy Workforce

168
Q

PM-14

A

Program Management - Testing, Training, and Monitoring

169
Q

PM-15

A

Program Management - Security and Privacy Groups and Associations

170
Q

PM-16

A

Program Management - Threat Awareness Program

171
Q

PM-17

A

Program Management - Protecting Controlled Unclassified Information on External Systems

172
Q

PM-18

A

Program Management - Privacy Program Plan

173
Q

PM-19

A

Program Management - Privacy Program Leadership Role

174
Q

PM-20

A

Program Management - Dissemination of Privacy Program Information

175
Q

PM-21

A

Program Management - Accounting of Disclosures

176
Q

PM-22

A

Program Management - Personally Identifiable Information Quality Management

177
Q

PM-23

A

Program Management - Data Governance Body

178
Q

PM-24

A

Program Management - Data Integrity Board

179
Q

PM-25

A

Program Management - Minimization of Personally Identifiable Information Used in Testing, Training, and Research

180
Q

PM-26

A

Program Management - Compliant Management

181
Q

PM-27

A

Program Management - Privacy Reporting

182
Q

PM-28

A

Program Management - Risk Framing

183
Q

PM-29

A

Program Management - Risk Management Program Leadership Roles

184
Q

PM-30

A

Program Management - Supply Chain Risk Management Strategy

185
Q

PM-31

A

Program Management - Continuous Monitoring Strategy

186
Q

PM-32

A

Program Management - Purposing

187
Q

PS-1

A

Personnel Security - Policy and Procedures

188
Q

PS-2

A

Personnel Security - Position Risk Designation

189
Q

PS-3

A

Personnel Security - Personnel Screening

190
Q

PS-4

A

Personnel Security - Personnel Termination

191
Q

PS-5

A

Personnel Security - Personnel Transfer

192
Q

PS-6

A

Personnel Security - Access Agreements

193
Q

PS-7

A

Personnel Security - External Personnel Security

194
Q

PS-8

A

Personnel Security - Personnel Sanctions

195
Q

PS-9

A

Personnel Security - Position Descriptions

196
Q

PT-1

A

Personally Identifiable Information Processing and Transparency - Policy and Procedures

197
Q

PT-2

A

Personally Identifiable Information Processing and Transparency - Authority to Process Personally Identifiable Information

198
Q

PT-3

A

Personally Identifiable Information Processing and Transparency - Personally Identifiable Information Processing Purposes

199
Q

PT-4

A

Personally Identifiable Information Processing and Transparency - Consent

200
Q

PT-5

A

Personally Identifiable Information Processing and Transparency - Privacy Notice

201
Q

PT-6

A

Personally Identifiable Information Processing and Transparency - System of Records Notice

202
Q

PT-7

A

Personally Identifiable Information Processing and Transparency - Specific Categories of Personally Identifiable Information

203
Q

PT-8

A

Personally Identifiable Information Processing and Transparency - Computer Matching Requirements

204
Q

RA-1

A

Risk Assessment - Policy and Procedures

205
Q

RA-2

A

Risk Assessment - Security Categorization

206
Q

RA-3

A

Risk Assessment - Risk Assessment

207
Q

RA-4

A

Risk Assessment - Risk Assessment Update

208
Q

RA-5

A

Risk Assessment - Vulnerability Monitoring and Scanning

209
Q

RA-6

A

Risk Assessment - Technical Surveillance Countermeasures Survey

210
Q

RA-7

A

Risk Assessment - Risk Response

211
Q

RA-8

A

Risk Assessment - Privacy Impact Assessments

212
Q

RA-9

A

Risk Assessment - Criticality Analysis

213
Q

RA-10

A

Risk Assessment - Threat Hunting

214
Q

SA-1

A

System and Services Acquisition - Policy and Procedures

215
Q

SA-2

A

System and Services Acquisition - Allocation of Resources

216
Q

SA-3

A

System and Services Acquisition - System Development Life Cycle

217
Q

SA-4

A

System and Services Acquisition - Acquisition Process

218
Q

SA-5

A

System and Services Acquisition - System Documentation

219
Q

SA-6

A

System and Services Acquisition - Software Usage Restrictions

220
Q

SA-7

A

System and Services Acquisition - User-installed Software

221
Q

SA-8

A

System and Services Acquisition - Security and Privacy Engineering Principles

222
Q

SA-9

A

System and Services Acquisition - External System Services

223
Q

SA-10

A

System and Services Acquisition - Developer Configuration Management

224
Q

SA-11

A

System and Services Acquisition - Developer Testing and Evaluation

225
Q

SA-12

A

System and Services Acquisition - Supply Chain Protection

226
Q

SA-13

A

System and Services Acquisition - Trustworthiness

227
Q

SA-14

A

System and Services Acquisition - Criticality Analysis

228
Q

SA-15

A

System and Services Acquisition - Development Process, Standards, and Tools

229
Q

SA-16

A

System and Services Acquisition - Developer-provided Training

230
Q

SA-17

A

System and Services Acquisition - Developer Security and Privacy Architecture and Design

231
Q

SA-18

A

System and Services Acquisition - Tamper Resistance and Detection

232
Q

SA-19

A

System and Services Acquisition - Component Authenticity

233
Q

SA-20

A

System and Services Acquisition - Customized Development of Critical Components

234
Q

SA-21

A

System and Services Acquisition - Developer Screening

235
Q

SA-22

A

System and Services Acquisition - Unsupported System Components

236
Q

SA-23

A

System and Services Acquisition - Specialization

237
Q

SC-1

A

System and Communications Protection - Policy and Procedures

238
Q

SC-2

A

System and Communications Protection - Separation of System and User Functionality

239
Q

SC-3

A

System and Communications Protection - Security Function Isolation

240
Q

SC-4

A

System and Communications Protection - Information in Shared System Resources

241
Q

SC-5

A

System and Communications Protection - Denial-of-service Protection

242
Q

SC-6

A

System and Communications Protection - Resource Availability

243
Q

SC-7

A

System and Communications Protection - Boundry Protection

244
Q

SC-8

A

System and Communications Protection - Transmission Confidentiality and Integrity

245
Q

SC-9

A

System and Communications Protection - Transmission Confidentiality

246
Q

SC-10

A

System and Communications Protection - Network Disconnect

247
Q

SC-11

A

System and Communications Protection - Trusted Path

248
Q

SC-12

A

System and Communications Protection - Cryptographic Key Establishment and Management

249
Q

SC-13

A

System and Communications Protection - Cryptographic Protection

250
Q

SC-14

A

System and Communications Protection - Public Access Protections

251
Q

SC-15

A

System and Communications Protection - Collaborative Computing Devices and Applications

252
Q

SC-16

A

System and Communications Protection - Transmission of Security and Privacy Attributes

253
Q

SC-17

A

System and Communications Protection - Public Key Infrastructure Certificates

254
Q

SC-18

A

System and Communications Protection - Mobile Code

255
Q

SC-19

A

System and Communications Protection - Voice over Internet Protocol

256
Q

SC-20

A

System and Communications Protection - Secure Name/Address Resolution Service (Authoritative Source)

257
Q

SC-21

A

System and Communications Protection - Secure Name/Address Resolution Service (Recursive or Caching Resolver)

258
Q

SC-22

A

System and Communications Protection - Architecture and Provisioning for Name/Address Resolution Service

259
Q

SC-23

A

System and Communications Protection - Session Authenticity

260
Q

SC-24

A

System and Communications Protection - Fail in Known State

261
Q

SC-25

A

System and Communications Protection - Thin Nodes

262
Q

SC-26

A

System and Communications Protection - Decoys

263
Q

SC-27

A

System and Communications Protection - Platform-independent Applications

264
Q

SC-28

A

System and Communications Protection - Protection of Information at Rest

265
Q

SC-29

A

System and Communications Protection - Heterogeneity

266
Q

SC-30

A

System and Communications Protection - Concealment and Misdirection

267
Q

SC-31

A

System and Communications Protection - Covert Channel Analysis

268
Q

SC-32

A

System and Communications Protection - System Partitioning

269
Q

SC-33

A

System and Communications Protection - Transmission Preparation Integrity

270
Q

SC-34

A

System and Communications Protection - Non-modifiable Executable Programs

271
Q

SC-35

A

System and Communications Protection - External Malicious Mode Identification

272
Q

SC-36

A

System and Communications Protection - Distributed Processing and Storage

273
Q

SC-37

A

System and Communications Protection - Out-of-band Channels

274
Q

SC-38

A

System and Communications Protection - Operations Security

275
Q

SC-39

A

System and Communications Protection - Process Isolation

276
Q

SC-40

A

System and Communications Protection - Wireless Link Protection

277
Q

SC-41

A

System and Communications Protection - Port and I/O Device Access

278
Q

SC-42

A

System and Communications Protection - Sensor Capability and Data

279
Q

SC-43

A

System and Communications Protection - Usage Restrictions

280
Q

SC-44

A

System and Communications Protection - Detonation Chambers

281
Q

SC-45

A

System and Communications Protection - System Time Synchronization

282
Q

SC-46

A

System and Communications Protection - Cross Domain Policy Enforcements

283
Q

SC-47

A

System and Communications Protection - Alternate Communications Paths

284
Q

SC-48

A

System and Communications Protection - Sensor Relocation

285
Q

SC-49

A

System and Communications Protection - Hardware-enforced Separation and Policy Enforcement

286
Q

SC-50

A

System and Communications Protection - Software-enforced Separation and Policy Enforcement

287
Q

SC-51

A

System and Communications Protection - Hardware-based Protection

288
Q

SI-1

A

System and Information Integrity - Policy and Procedures

289
Q

SI-2

A

System and Information Integrity - Flaw Remediation

290
Q

SI-3

A

System and Information Integrity - Malicious Code Protection

291
Q

SI-4

A

System and Information Integrity - System Monitoring

292
Q

SI-5

A

System and Information Integrity - Security Alerts, Advisories, and Directives

293
Q

SI-6

A

System and Information Integrity - Security and Privacy Function Verification

294
Q

SI-7

A

System and Information Integrity - Software, Firmware, and Information Integrity

295
Q

SI-8

A

System and Information Integrity - Spam Protection

296
Q

SI-9

A

System and Information Integrity - Information Input Restrictions

297
Q

SI-10

A

System and Information Integrity - Information Input Validation

298
Q

SI-11

A

System and Information Integrity - Error Handling

299
Q

SI-12

A

System and Information Integrity - Information Management and Retention

300
Q

SI-13

A

System and Information Integrity - Predictable Failure Prevention

301
Q

SI-14

A

System and Information Integrity - Non-persistence

302
Q

SI-15

A

System and Information Integrity - Information Output Filtering

303
Q

SI-16

A

System and Information Integrity - Memory Protection

304
Q

SI-17

A

System and Information Integrity - Fail-safe Procedures

304
Q

SI-20

A

System and Information Integrity - Tainting

304
Q

SI-18

A

System and Information Integrity - Personally Indentifiable Information Quality Operations

305
Q

SI-19

A

System and Information Integrity - De-identification

306
Q

SI-21

A

System and Information Integrity - Information Refresh

307
Q

SI-22

A

System and Information Integrity - Information Diversity

308
Q

SI-23

A

System and Information Integrity - Information Fragmentation

309
Q

SR-1

A

Supply Chain Risk Management - Policy and Procedures

310
Q

SR-2

A

Supply Chain Risk Management - Supply Chain Risk Management Plan

311
Q

SR-3

A

Supply Chain Risk Management - Supply Chain Controls and Processes

312
Q

SR-4

A

Supply Chain Risk Management - Provenance

313
Q

SR-5

A

Supply Chain Risk Management - Acquisition Strategies, Tools and Methods

314
Q

SR-6

A

Supply Chain Risk Management - Supplier Assessments and Reviews

315
Q

SR-7

A

Supply Chain Risk Management - Supply Chain Operations Security

316
Q

SR-8

A

Supply Chain Risk Management - Notification Agreements

317
Q

SR-9

A

Supply Chain Risk Management - Tamper Resistance and Detection

318
Q

SR-10

A

Supply Chain Risk Management - Inspection of Systems or Components

319
Q

SR-11

A

Supply Chain Risk Management - Component Authenticity

320
Q

SR-12

A

Supply Chain Risk Management - Component Disposal