800-53|RA-1

Title

RISK ASSESSMENT POLICY AND PROCEDURES

Description

The organization:

Supplemental

This control addresses the establishment of policy and procedures for the effective implementation of selected security controls and control enhancements in the RA family. Policy and procedures reflect applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance. Security program policies and procedures at the organization level may make the need for system-specific policies and procedures unnecessary. The policy can be included as part of the general information security policy for organizations or conversely, can be represented by multiple policies reflecting the complex nature of certain organizations. The procedures can be established for the security program in general and for particular information systems, if needed. The organizational risk management strategy is a key factor in establishing policy and procedures.

Reference Item Details

Related: PM-9

Category: RISK ASSESSMENT

Family: RISK ASSESSMENT

Priority: P1

Baseline Impact: LOW,MODERATE,HIGH

Audit Items

View all Reference Audit Items

NamePluginAudit Name
2.1.6 Ensure the latest firmware is installedFortiGateCIS Fortigate 7.0.x v1.3.0 L2
2.4.8 Virtual patching on the local-in management interfaceFortiGateCIS Fortigate 7.0.x v1.3.0 L1
4.4.1 Ensure custom authselect profile is usedUnixCIS Amazon Linux 2023 Server L1 v1.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Oracle Linux 8 Workstation L1 v3.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Rocky Linux 8 Server L1 v2.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS AlmaLinux OS 8 Server L1 v3.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Rocky Linux 8 Workstation L1 v2.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Red Hat EL8 Server L1 v3.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Red Hat EL8 Workstation L1 v3.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS Oracle Linux 8 Server L1 v3.0.0
4.4.2.1 Ensure active authselect profile includes pam modulesUnixCIS AlmaLinux OS 8 Workstation L1 v3.0.0
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS AlmaLinux OS 9 v2.0.0 L1 Server
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Red Hat Enterprise Linux 9 v2.0.0 L1 Workstation
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Rocky Linux 9 v2.0.0 L1 Workstation
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS AlmaLinux OS 9 v2.0.0 L1 Workstation
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Oracle Linux 9 v2.0.0 L1 Server
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Oracle Linux 9 v2.0.0 L1 Workstation
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Red Hat Enterprise Linux 9 v2.0.0 L1 Server
5.3.2.1 Ensure active authselect profile includes pam modulesUnixCIS Rocky Linux 9 v2.0.0 L1 Server
5.4.1 Ensure custom authselect profile is usedUnixCIS Fedora 28 Family Linux Workstation L1 v2.0.0
5.4.1 Ensure custom authselect profile is usedUnixCIS CentOS Linux 8 Server L1 v2.0.0
5.4.1 Ensure custom authselect profile is usedUnixCIS Fedora 28 Family Linux Server L1 v2.0.0
5.4.1 Ensure custom authselect profile is usedUnixCIS CentOS Linux 8 Workstation L1 v2.0.0
Design Your ISMS to Protect Your Assets on AWSamazon_awsTenable AWS Best Practice Audit
Managing Metrics and Improvementamazon_awsTenable AWS Best Practice Audit
Mitigating and Protecting Against DoS & DDoS Attacksamazon_awsTenable AWS Best Practice Audit
Mitigating Compromise and Abuseamazon_awsTenable AWS Best Practice Audit