RA - Risk Assessment
- Controls Count: 1
- Controls IDs: RA-5 (4)
Controls
RA-5 (4): Discoverable Information
Determine information about the system that is discoverable and take corrective actions to be taken if information about the system is discoverable are defined;.
Discoverable information includes information that adversaries could obtain without compromising or breaching the system, such as by collecting information that the system is exposing or by conducting extensive web searches. Corrective actions include notifying appropriate organizational personnel, removing designated information, or changing the system to make the designated information less relevant or attractive to adversaries. This enhancement excludes intentionally discoverable information that may be part of a decoy capability (e.g., honeypots, honeynets, or deception nets) deployed by the organization.
information about the system is discoverable;
corrective actions to be taken if information about the system is discoverable are defined; are taken when information about the system is confirmed as discoverable.
Procedures addressing vulnerability scanning
assessment report
penetration test results
vulnerability scanning results
risk assessment report
records of corrective actions taken
incident response records
audit records
system security plan
other relevant documents or records
Organizational personnel with vulnerability scanning and/or penetration testing responsibilities
organizational personnel with vulnerability scan analysis responsibilities
organizational personnel responsible for risk response
organizational personnel responsible for incident management and response
organizational personnel with security responsibilities
Organizational processes for vulnerability scanning
organizational processes for risk response
organizational processes for incident management and response
mechanisms/tools supporting and/or implementing vulnerability scanning
mechanisms supporting and/or implementing risk response
mechanisms supporting and/or implementing incident management and response