| | | | | |
Controls Family | High Restricted Data | Medium Sensitive Data | Low Non-Confidential Data | IS-3 Requirement Reference | Required for Insurance Placeholder |
---|
1. Access control measures for controlled electronic information resources | Required | Required | Required | III.C.2.b IV.A | |
2. Encrypted transmission of restricted data including passwords | Required | Required | Required | III.C.2.b.i III.C.2.g IV.B | |
3. Software updates / patch management | Required | Required | Required | | | 4. Malicious software protection (III.C.2.c.iii; iv IV.D) C | |
4. Malicious software protection | Required | Required | Required | (III.C.2.c.iv iii IV.C) D | |
5. Removal of unnecessary services | Required | Required | Required | IV.E | |
6. Host-based firewalls | Required | Required | Required | III.C.2.d IV.F | |
7. No unauthorized email relays | Required | Required | Required | IV.G | |
8. No unauthorized, unauthenticated proxy servers | Required | Required | Required | IV.H | |
9. Physical security and session timeout | Required | Required | Required | III.C.2.b.ii III.C.3.b IV.I | |
| | | | | |
Controls Family | High Restricted Data | Medium Sensitive Data | Low Non-Confidential Data | IS-3 Requirement | Required for Insurance | Risk assessment, asset Placeholder |
---|
Asset inventory and classification; Identification of systems storing and accessing data ( | Required | Required | Required | III.B) | |
Risk assessments | Required | Recommended | Recommended | III.B.1 | |
Written Information Security Plan | Required | Recommended | Optional | III.C | |
Formal proprietor authorization for sharing data (III.C, 4th paragraph) | Required | Recommended | Optional | III.C, 4th paragraph | |
Procedures to inform staff of information security responsibilities. ( | Required | Required | Required | III.C.1.a) | Required | Required | Required | | |
Procedures for providing privileged accounts, review of personnel assignments for appropriate classification, security responsibilities, and separation of duties ( | Required | Recommended | Optional | III.C.1) | |
Background checks | Required | Recommended | Optional | | | Background checks (III.C.1.b ; III.F) | Required | Recommended | Optional | | |
Third party agreements with data security language (III.F) | Required | Recommended | Optional | III.F | |
Take appropriate personnel/disciplinary action for violations of law or policy ( | Required | Required | Required | III.C.1.c) | Required | Required | Required | | |
Education and security awareness training (III.E) | Required | Recommended | Recommended | III.E | |
| | | | | |
Controls Family | High Restricted Data | Medium Sensitive Data | Low Non-Confidential Data | IS-3 Requirement | Required for Insurance Placeholder |
---|
Secure and accountable means of authorization and authentication ( | Required | Required | Optional | III.C.2.a) | Required | Required | Optional | | |
Prompt modification or termination of access or access levels in response to authorization changes (III.C.1) | Required | Required | Optional | III.C.1 | |
Password guidelines and password vulnerability assessment ( | Required | Required | Required | III.C.2.b.i) | Required | Required | Required | | |
Delete, redact or de-identify data whenever possible (III.C, third paragraph) | Required | Recommended | Optional | III.C | |
Do not store data on portable devices ( | Required | Recommended | Optional | III.C.3.e) | Required | Recommended | Optional | | |
Incident response /wiki/spaces/SEC/pages/20381772 planning and notification procedures (III.D) | Required | Required | Required | III.D | |
Access and activity audit and logging procedures, including access attempts and privileged access ( | Required | Recommended | Optional | III.C.2.b.iii ; III.C.2.f ; Appendix D) | Required | Required for financial instruments; otherwise recommended | Optional | | |
Application security: System and application development standards, application vulnerability assessment (test, development, and production)( | Required | Required | Recommended | II I.C.2.c.v) Required | |
Documented change management procedures | Required | Recommended | | | Authorized, documented change management procedures (Optional | III.C.2.e) | Required | Recommended | Optional | | |
Backup systems supporting essential activities ( | Required | Required | Required | III.C.2.c.ii) | Required |
| Required Required | | | |