NIST SSDF Readiness Questionnaire

NIST SSDF Readiness Questionnaire

Netspective Unified Process
 

The following is the NIST SSDF Readiness Questionnaire. Evidence is mapped according to the checklist and policies.

SCF Control SCF # Secure Controls Framework (SCF) Control Description SCF Control Question NIST SSDF Evidence
Asset Management
Provenance FII-SCF-002-AST-03.2 Mechanisms exist to track the origin, development, ownership, location and changes to systems, system components and associated data. Does the organization govern the chronology of the origin, development, ownership, location and changes to a system, system components and associated data? PW.4
PW.4.1
Change Management
Library Privileges FII-SCF-004-CHG-04.5 Mechanisms exist to restrict software library privileges to those individuals with a pertinent business need for access. Does the organization restrict software library privileges to those individuals with a pertinent business need for access? PS.1.1
Human Resources Security
Roles & Responsibilities FII-SCF-011-HRS-03 Mechanisms exist to define cybersecurity responsibilities for all personnel. Does the organization define cybersecurity responsibilities for all personnel? PO.2.1 Security Awareness Training
Information Assurance
Plan of Action & Milestones (POA&M) FII-SCF-014-IAO-05 Mechanisms exist to generate a Plan of Action and Milestones (POA&M), or similar risk register, to document planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities. Does the organization use a Plan of Action and Milestones (POA&M), or similar mechanisms, to document planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities? RV.2.2
Project & Resource Management
Security Portfolio Management FII-SCF-019-PRM-01 Mechanisms exist to facilitate the implementation of cybersecurity and privacy-related resource planning controls that define a viable plan for achieving cybersecurity & privacy objectives. Does the organization facilitate the implementation of cybersecurity and privacy-related resource planning controls? PO.2.3
Strategic Plan & Objectives FII-SCF-019-PRM-01.1 Mechanisms exist to establish a strategic cybersecurity and privacy-specific business plan and set of objectives to achieve that plan. Does the organization establish a strategic cybersecurity and privacy-specific business plan and set of objectives to achieve that plan? PO.2.3
Targeted Capability Maturity Levels FII-SCF-019-PRM-01.2 Mechanisms exist to define and identify targeted capability maturity levels. Does the organization define and identify targeted capability maturity levels? PO.2.3
Security & Privacy Resource Management FII-SCF-019-PRM-02 Mechanisms exist to address all capital planning and investment requests, including the resources needed to implement the security & privacy programs and document all exceptions to this requirement. Does the organization address all capital planning and investment requests, including the resources needed to implement the security & privacy programs and document all exceptions to this requirement? PO.2.3
Allocation of Resources FII-SCF-019-PRM-03 Mechanisms exist to identify and allocate resources for management, operational, technical and privacy requirements within business process planning for projects / initiatives. Does the organization identify and allocate resources for management, operational, technical and privacy requirements within business process planning for projects / initiatives? PO.2.3
Security & Privacy In Project Management FII-SCF-019-PRM-04 Mechanisms exist to assess cybersecurity and privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements. Does the organization assess cybersecurity and privacy controls in system project development to determine the extent to which the controls are implemented correctly, operating as intended and producing the desired outcome with respect to meeting the requirements? PO.1
PO.2
RV.3
RV.3.1
RV.3.2
Security & Privacy Requirements Definition FII-SCF-019-PRM-05 Mechanisms exist to identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC). Does the organization identify critical system components and functions by performing a criticality analysis for critical systems, system components or services at pre-defined decision points in the Secure Development Life Cycle (SDLC)? PO.1
PO.1.1
Business Process Definition FII-SCF-019-PRM-06 Mechanisms exist to define business processes with consideration for cybersecurity and privacy that determines:
▪ The resulting risk to organizational operations, assets, individuals and other organizations; and
▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained.
Does the organization define business processes with consideration for cybersecurity and privacy that determines:
▪ The resulting risk to organizational operations, assets, individuals and other organizations; and ▪ Information protection needs arising from the defined business processes and revises the processes as necessary, until an achievable set of protection needs is obtained?
PO.1
Secure Development Life Cycle (SDLC) Management FII-SCF-019-PRM-07 Mechanisms exist to ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures. Does the organization ensure changes to systems within the Secure Development Life Cycle (SDLC) are controlled through formal change control procedures? PO.1
RV.3.4
Software Development Lifecycle Policy
Code Quality Policy
Manage Organizational Knowledge FII-SCF-019-PRM-08 Mechanisms exist to manage the organizational knowledge of the cybersecurity and privacy staff. Does the organization manage the organizational knowledge. of the cybersecurity and privacy staff? RV.3
RV.3.1
RV.3.2
Risk Management
Risk Ranking FII-SCF-020-RSK-05 Mechanisms exist to identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices. Does the organization identify and assign a risk ranking to newly discovered security vulnerabilities that is based on industry-recognized practices? RV.3
RV.3.1
RV.3.2
Risk Register
Supply Chain Risk Management (SCRM) Plan FII-SCF-020-RSK-09 Mechanisms exist to develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans. Does the organization develop a plan for Supply Chain Risk Management (SCRM) associated with the development, acquisition, maintenance and disposal of systems, system components and services, including documenting selected mitigating actions and monitoring performance against those plans? PW.4.1 Risk Register
Security Awareness & Training
Security & Privacy-Minded Workforce FII-SCF-023-SAT-01 Mechanisms exist to facilitate the implementation of security workforce development and awareness controls. Does the organization facilitate the implementation of security workforce development and awareness controls? PO.2.2 Professional Education Training
Role-Based Security & Privacy Training FII-SCF-023-SAT-03 Mechanisms exist to provide role-based security-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter.
Does the organization provide role-based security-related training:
▪ Before authorizing access to the system or performing assigned duties;
▪ When required by system changes; and
▪ Annually thereafter?
PO.2.2 Professional Education Training
Technology Development & Acquisition
Technology Development & Acquisition FII-SCF-024-TDA-01 Mechanisms exist to facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs. Does the organization facilitate the implementation of tailored development and acquisition strategies, contract tools and procurement methods to meet unique business needs? PO.2.3
Product Management FII-SCF-024-TDA-01.1 Mechanisms exist to design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies. Does the organization design and implement product management processes to update products, including systems, software and services, to improve functionality and correct security deficiencies? PW.4
PW.4.1
RV.3
RV.3.1
RV.3.2
RV.3.3
RV.3.4
Secure Coding FII-SCF-024-TDA-06 Mechanisms exist to develop applications based on secure coding principles. Does the organization develop applications based on secure coding principles? PW.1
PW.1.1
PW.4
PW.4.1
PW.4.2
PW.4.3
PW.5
PW.5.1
Criticality Analysis FII-SCF-024-TDA-06.1 Mechanisms exist to require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC). Does the organization require the developer of the system, system component or service to perform a criticality analysis at organization-defined decision points in the Secure Development Life Cycle (SDLC)? PW.1.1
Threat Modeling FII-SCF-024-TDA-06.2 Mechanisms exist to perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for. Does the organization perform threat modelling and other secure design techniques, to ensure that threats to software and solutions are identified and accounted for? PW.1.1 Threat Modeling
Software Assurance Maturity Model (SAMM) FII-SCF-024-TDA-06.3 Mechanisms exist to utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services. Does the organization utilize a Software Assurance Maturity Model (SAMM) to govern a secure development lifecycle for the development of systems, applications and services? PW.1
PW.1.1
PW.4.2
PW.4.3
PW.5
PW.5.1
PW.5.2
Supporting Toolchain FII-SCF-024-TDA-06.4 Automated mechanisms exist to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle. Does the organization utilize automation to improve the accuracy, consistency and comprehensiveness of secure practices throughout the asset's lifecycle? PO.3
PO.3.1
PO.3.2
PO.3.3
PW.6
PW.6.1
PW.6.2
Software Design Review FII-SCF-024-TDA-06.5 Mechanisms exist to have an independent review of the software design to confirm that all cybersecurity and privacy requirements are met and that any identified risks are satisfactorily addressed. Does the organization have an independent review of the software design to confirm that all cybersecurity and privacy requirements are met and that any identified risks are satisfactorily addressed? PW.2
PW.2.1
Security & Privacy Testing Throughout Development FII-SCF-024-TDA-09 Mechanisms exist to require system developers/integrators consult with cybersecurity and privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes.
Does the organization require system developers/integrators consult with cybersecurity and privacy personnel to:
▪ Create and implement a Security Test and Evaluation (ST&E) plan;
▪ Implement a verifiable flaw remediation process to correct weaknesses and deficiencies identified during the security testing and evaluation process; and
▪ Document the results of the security testing/evaluation and flaw remediation processes?
PO.4
PO.4.1
PO.4.2
PW.3
PW.3.1
PW.3.2
PW.5.2
RV.1
RV.1.1
RV.1.2
RV.1.3
Penetration Tests Reports
Static Code Analysis FII-SCF-024-TDA-09.2 Mechanisms exist to require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis. Does the organization require the developers of systems, system components or services to employ static code analysis tools to identify and remediate common flaws and document the results of the analysis? PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
Code Liniting Policy
Dynamic Code Analysis FII-SCF-024-TDA-09.3 Mechanisms exist to require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis. Does the organization require the developers of systems, system components or services to employ dynamic code analysis tools to identify and remediate common flaws and document the results of the analysis? PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
Automation Test Report (Playwright/Puppeteer)
Malformed Input Testing FII-SCF-024-TDA-09.4 Mechanisms exist to utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces. Does the organization utilize testing methods to ensure systems, services and products continue to operate as intended when subject to invalid or unexpected inputs on its interfaces? PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
Penetration Tests Reports
Application Penetration Testing FII-SCF-024-TDA-09.5 Mechanisms exist to perform application-level penetration testing of custom-made applications and services. Does the organization perform application-level penetration testing of custom-made applications and services? PW.5.2
PW.7
PW.7.1
PW.7.2
PW.8
PW.8.1
PW.8.2
Penetration Tests Reports
Secure Settings By Default FII-SCF-024-TDA-09.6 Mechanisms exist to implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise. Does the organization implement secure configuration settings by default to reduce the likelihood of software being deployed with weak security settings that would put the asset at a greater risk of compromise? PW.9
PW.9.1
PW.9.2
Developer Configuration Management FII-SCF-024-TDA-14 Mechanisms exist to require system developers and integrators to perform configuration management during system design, development, implementation and operation. Does the organization require system developers and integrators to perform configuration management during system design, development, implementation and operation? PW.3
PW.3.1
Access to Program Source Code FII-SCF-024-TDA-20 Mechanisms exist to limit privileges to change software resident within software libraries. Does the organization limit privileges to change software resident within software libraries? PS.1
PS.1.1
Software Release Integrity Verification FII-SCF-024-TDA-20.1 Mechanisms exist to publish integrity verification information for software releases. Does the organization publish integrity verification information for software releases? PS.2
PS.2.1
File Integrity Monitoring
Archiving Software Releases FII-SCF-024-TDA-20.2 Mechanisms exist to archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information. Does the organization archive software releases and all of their components (e.g., code, package files, third-party libraries, documentation) to maintain integrity verification information? PS.3
PS.3.1
Third-Party Management
Third-Party Management FII-SCF-025-TPM-01 Mechanisms exist to facilitate the implementation of third-party management controls. Does the organization facilitate the implementation of third-party management controls? PW.3
PW.3.1
Vendor Management Policy
Supply Chain Protection FII-SCF-025-TPM-03 Mechanisms exist to evaluate security risks associated with the services and product supply chain. Does the organization evaluate security risks associated with the services and product supply chain? PW.3
PW.3.1
Third-Party Contract Requirements FII-SCF-025-TPM-05 Mechanisms exist to identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization's needs to protect systems and data. Does the organization identify, regularly review and document third-party confidentiality, Non-Disclosure Agreements (NDAs) and other contracts that reflect the organization's needs to protect systems and data? PW.3
PW.3.1
Review of Third-Party Services FII-SCF-025-TPM-08 Mechanisms exist to monitor, regularly review and audit Third-Party Service Providers (TSP) for compliance with established contractual requirements for cybersecurity and privacy controls. Does the organization monitor, regularly review and audit Third-Party Service Providers (TSP) for compliance with established contractual requirements for cybersecurity and privacy controls? PW.3
PW.3.1
PW.3.2
Vendor Risk Assessment
Vulnerability & Patch Management
Vulnerability & Patch Management Program (VPMP) FII-SCF-027-VPM-01 Mechanisms exist to facilitate the implementation and monitoring of vulnerability management controls. Does the organization facilitate the implementation and monitoring of vulnerability management controls? RV.1
RV.1.1
RV.1.2
RV.1.3
RV.3
RV.3.1
RV.3.2
Vulnerability Management Policy
Vulnerability Remediation Process FII-SCF-027-VPM-02 Mechanisms exist to ensure that vulnerabilities are properly identified, tracked and remediated. Does the organization ensure that vulnerabilities are properly identified, tracked and remediated? RV.2
RV.2.1
RV.2.2
Vulnerability Scan/Penetration Tests Reports
Continuous Vulnerability Remediation Activities FII-SCF-027-VPM-04 Mechanisms exist to address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks. Does the organization address new threats and vulnerabilities on an ongoing basis and ensure assets are protected against known attacks? RV.1
RV.1.1
RV.1.2
RV.1.3
Vulnerability Scan/Penetration Tests Reports

Last Updated by
Sreejith K on August 10, 2023