|
Controls Family | High Restricted Data | Medium Sensitive Data | Low Non-Confidential Data | IS-3 Requirement | Required for Insurance | Risk assessment, asset Placeholder |
---|
Asset inventory and classification; Identification of systems storing and accessing data ( | Required | Required | Required | III.B) | |
Risk assessments | Required | Recommended | Recommended | III.B.1 | |
Written Information Security Plan | Required | Recommended | Optional | III.C | |
Formal proprietor authorization for sharing data (III.C, 4th paragraph) | Required | Recommended | Optional | III.C, 4th paragraph | |
Procedures to inform staff of information security responsibilities. ( | Required | Required | Required | III.C.1.a) | Required | Required | Required | | |
Procedures for providing privileged accounts, review of personnel assignments for appropriate classification, security responsibilities, and separation of duties ( | Required | Recommended | Optional | III.C.1) | |
Background checks | Required | Recommended | Optional | | Background checks (III.C.1.b ; III.F) | Required | Recommended | Optional | | |
Third party agreements with data security language (III.F) | Required | Recommended | Optional | III.F | |
Take appropriate personnel/disciplinary action for violations of law or policy ( | Required | Required | Required | III.C.1.c) | Required | Required | Required | | |
Education and security awareness training (III.E) | Required | Recommended | Recommended | III.E | |
| | | | | |
Controls Family | High Restricted Data | Medium Sensitive Data | Low Non-Confidential Data | IS-3 Requirement | Required for Insurance Placeholder |
---|
Secure and accountable means of authorization and authentication ( | Required | Required | Optional | III.C.2.a) | Required | Required | Optional | | |
Prompt modification or termination of access or access levels in response to authorization changes (III.C.1) | Required | Required | Optional | III.C.1 | |
Password guidelines and password vulnerability assessment ( | Required | Required | Required | III.C.2.b.i) Required | Required | Required | | |
Delete, redact or de-identify data whenever possible (III.C, third paragraph) | Required | Recommended | Optional | III.C | |
Do not store data on portable devices ( | Required | Recommended | Optional | III.C.3.e) | Required | Recommended | Optional | | | Incident response |
/wiki/spaces/SEC/pages/20381772 planning and notification procedures (III.D) | Required | Required | Required | III.D | |
Access and activity audit and logging procedures, including access attempts and privileged access ( | Required | Recommended | Optional | III.C.2.b.iii ; III.C.2.f ; Appendix D) Required | Required for financial instruments; otherwise recommended | Optional | | |
Application security: System and application development standards, application vulnerability assessment (test, development, and production)( | Required | Required | Recommended | II I.C.2.c.v) Required | |
Documented change management procedures | Required | Recommended | | | Authorized, documented change management procedures (Optional | III.C.2.e) | Required | Recommended | Optional | | |
Backup systems supporting essential activities ( | Required | Required | Required | III.C.2.c.ii) | Required |
| Required Required | | | |