Reference: CMMC v2.13
Family: CA
Level Introduced: 2
Title: Security Control Assessment
Practice:
Periodically assess the security controls in organizational systems to determine if the controls are effective in their application.
Further Discussion:
Avoid a “set it and forget it” mentality when implementing security controls. The security landscape is constantly changing. Reassess existing controls at periodic intervals in order to validate their effectiveness in your environment. Set the assessment schedule according to organizational needs. Consider regulatory obligations and internal policies when assessing the controls.
Outputs from security control assessments typically include:
• documented assessment results;
• proposed new controls, or updates to existing controls;
• remediation plans; and
• newly identified risks.
This requirement, CA.L2-3.12.1, which ensures determining security controls are implemented properly, promotes effective security assessments for organizational systems mandated by CA.L2-3.12.3.
Example
You are in charge of IT operations. You need to ensure that the security controls implemented within the system are achieving their objectives [b]. Taking the requirements outlined in your SSP as a guide, you conduct annual written reviews of the security controls to ensure they meet your organization’s needs. When you find controls that do not meet requirements, you propose updated or new controls, develop a written implementation plan, document new risks, and execute the changes.
Potential Assessment Considerations
• Are security controls assessed at least annually [a]?
• Is the output of the security controls assessment documented [b]?
Implementation Strategies
This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.
800-171 Requirements v2 (1)
This is for registered users only. Please sign up for a free account, or Login, to see complete cross references to other standards and frameworks.