CA-2: Control Assessments

From NIST's SP800-53:

a. Select the appropriate assessor or assessment team for the type of assessment to be conducted; b. Develop a control assessment plan that describes the scope of the assessment including: 1. Controls and control enhancements under assessment; 2. Assessment procedures to be used to determine control effectiveness; and 3. Assessment environment, assessment team, and assessment roles and responsibilities; c. Ensure the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment; d. Assess the controls in the system and its environment of operation [Assignment: organization-defined frequency] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security and privacy requirements; e. Produce a control assessment report that document the results of the assessment; and f. Provide the results of the control assessment to [Assignment: organization-defined individuals or roles].

Cyber Threat Graph Context

Explore how this control relates to the wider threat graph

SP800-53 Control Mapped to NIST Cyber Security Framework

Generated from NISTs SP800-53/CSF Crosswalk mappings.

Control ID Description
RS.CO-3 Information is shared consistent with response plans
DE.DP-2 Detection activities comply with all applicable requirements
DE.DP-4 Event detection information is communicated
ID.RA-1 Asset vulnerabilities are identified and documented
DE.DP-1 Roles and responsibilities for detection are well defined to ensure accountability
PR.IP-7 Protection processes are improved
DE.DP-3 Detection processes are tested
DE.DP-5 Detection processes are continuously improved

MITRE ATT&CK Techniques

See which MITRE ATT&CK techniques this control helps to protect against.

ATT&CK ID Title Associated Tactics
T1195 Supply Chain Compromise Initial Access
T1210 Exploitation of Remote Services Lateral Movement
T1195.001 Compromise Software Dependencies and Development Tools Initial Access
T1190 Exploit Public-Facing Application Initial Access
T1195.002 Compromise Software Supply Chain Initial Access