throbber

`
`NIST SPECIAL PUBLICATION 1800-5
`
`
`
`IT Asset Management
`
`
`
`
`Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B);
`and How-To Guides (C)
`
`
`
`
`
`
`Michael Stone
`Chinedum Irrechukwu
`Harry Perper
`Devin Wynne
`Leah Kauffman, Editor-in-Chief
`
`
`
`
`
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`
`The first draft of this publication is available free of charge from:
`https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-itam-nist-sp1800-5-draft.pdf
`
`
`
`
`
`
`
`
`
`
`
`
`
`WIZ, Inc. EXHIBIT - 1031
`WIZ, Inc. v. Orca Security LTD.
`
`

`

`NIST SPECIAL PUBLICATION 1800-5
`
`IT Asset Management
`
`Includes Executive Summary (A); Approach, Architecture, and Security Characteristics (B);
`and How-To Guides (C)
`
`
`
`
`Michael Stone
`National Cybersecurity Center of Excellence
`Information Technology Laboratory
`
`Chinedum Irrechukwu
`Harry Perper
`Devin Wynne
`The MITRE Corporation
`McLean, VA
`
`Leah Kauffman, Editor-in-Chief
`National Cybersecurity Center of Excellence
`Information Technology Laboratory
`
`
`
`
`
`September 2018
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`U.S. Department of Commerce
`Wilbur Ross, Secretary
`
`National Institute of Standards and Technology
`Walter G. Copan, Undersecretary of Commerce for Standards and Technology and Director
`
`
`
`
`
`
`
`

`

`
`
`NIST SPECIAL PUBLICATION 1800-5A
`
`IT Asset Management
`
`
`
`Volume A:
`Executive Summary
`
`
`Michael Stone
`Leah Kauffman, Editor-in-Chief
`National Cybersecurity Center of Excellence
`Information Technology Laboratory
`
`Chinedum Irrechukwu
`Harry Perper
`Devin Wynne
`The MITRE Corporation
`McLean, VA
`
`
`September 2018
`
`
`
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`The first draft of this publication is available free of charge from:
`https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-itam-nist-sp1800-5-draft.pdf
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`Executive Summary
`
`▪ The National Cybersecurity Center of Excellence (NCCoE), part of the National Institute of
`Standards and Technology (NIST), developed an example solution that financial services
`companies can use for a more secure and efficient way of monitoring and managing their many
`information technology (IT) hardware and software assets.
`
`▪ The security characteristics in our IT asset management platform are derived from the best
`practices of standards organizations, including the Payment Card Industry Data Security
`Standard (PCI DSS).
`
`▪ The NCCoE’s approach uses open source and commercially available products that can be
`included alongside current products in your existing infrastructure. It provides a centralized,
`comprehensive view of networked hardware and software across an enterprise, reducing
`vulnerabilities and response time to security alerts, and increasing resilience.
`
`▪ The example solution is packaged as a “How To” guide that demonstrates implementation of
`standards-based cybersecurity technologies in the real world. The guide helps organizations gain
`efficiencies in asset management, while saving them research and proof of concept costs.
`
`CHALLENGE
`
`Large financial services organizations employ tens or hundreds of thousands of individuals. At this scale,
`the technology base required to ensure smooth business operations (including computers, mobile
`devices, operating systems, applications, data, and network resources) is massive. To effectively
`manage, use, and secure each of those assets, you need to know their locations and functions. While
`physical assets can be labeled with bar codes and tracked in a database, this approach does not answer
`questions such as “What operating systems are our laptops running?” and “Which devices are
`vulnerable to the latest threat?”
`
`Computer security professionals in the financial services sector told us they are challenged by the vast
`diversity of hardware and software they attempt to track, and by a lack of centralized control: A large
`financial services organization can include subsidiaries, branches, third-party partners, contractors, as
`well as temporary workers and guests. This complexity makes it difficult to assess vulnerabilities or to
`respond quickly to threats, and to accurately assess risk in the first place (by pinpointing the most
`business essential assets).
`
`SOLUTION
`
`The NIST Cybersecurity IT Asset Management Practice Guide is a proof-of-concept solution
`demonstrating commercially available technologies that can be implemented to track the location and
`configuration of networked devices and software across an enterprise. Our example solution spans
`traditional physical asset tracking, IT asset information, physical security, and vulnerability and
`compliance information. Users can now query one system and gain insight into their entire IT asset
`portfolio.
`
`
`NIST SP 1800-5A: IT Asset Management
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`
`1
`
`

`

`This guide:
`
`▪ maps security characteristics to guidance and best practices from NIST and other standards
`organizations, including the PCI DSS
`
`▪ provides:
`
`• a detailed example solution with capabilities that address security controls
`
`•
`
`instructions for implementers and security engineers, including examples of all the
`necessary components for installation, configuration, and integration
`
`▪
`
`is modular and uses products that are readily available and interoperable with your existing IT
`infrastructure and investments
`
`While the NCCoE used a suite of commercial products to address this challenge, this guide does not
`endorse these particular products, nor does it guarantee compliance with any regulatory initiatives. Your
`organization’s information security experts should identify the products that will best integrate with
`your existing tools and IT system infrastructure. Your organization can adopt this solution or one that
`adheres to these guidelines in whole, or you can use this guide as a starting point for tailoring and
`implementing parts of a solution.
`
`BENEFITS
`
`Our example solution has the following benefits:
`
`▪ enables faster responses to security alerts by revealing the location, configuration, and owner of
`a device
`
`▪
`
`increases cybersecurity resilience: you can focus attention on the most valuable assets
`
`▪ provides detailed system information to auditors
`
`▪ determines how many software licenses are actually used in relation to how many have been
`paid for
`
`▪
`
`▪
`
`reduces help desk response times: staff will know what is installed and the latest pertinent
`errors and alerts
`
`reduces the attack surface of each device by ensuring that software is correctly patched
`
`SHARE YOUR FEEDBACK
`
`You can view or download the guide at https://www.nccoe.nist.gov/projects/use-cases/financial-
`services-sector/it-asset-management. If you adopt this solution for your own organization, please share
`your experience and advice with us. We recognize that technical solutions alone will not fully enable the
`benefits of our solution, so we encourage organizations to share lessons learned and best practices for
`transforming the processes associated with implementing this guide.
`
`To learn more by arranging a demonstration of this example implementation, contact the NCCoE at
`financial_nccoe@nist.gov.
`
`
`
`
`NIST SP 1800-5A: IT Asset Management
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`
`2
`
`

`

`TECHNOLOGY PARTNERS/COLLABORATORS
`
`Organizations participating in this project submitted their capabilities in response to an open call in the
`Federal Register for all sources of relevant security capabilities from academia and industry (vendors
`and integrators). The following respondents with relevant capabilities or product components (identified
`as “Technology Partners/Collaborators” herein) signed a Cooperative Research and Development
`Agreement (CRADA) to collaborate with NIST in a consortium to build this example solution.
`
`Certain commercial entities, equipment, products, or materials may be identified by name or company
`logo or other insignia in order to acknowledge their participation in this collaboration or to describe an
`experimental procedure or concept adequately. Such identification is not intended to imply special
`status or relationship with NIST or recommendation or endorsement by NIST or NCCoE, neither is it
`intended to imply that the entities, equipment, products, or materials are necessarily the best available
`for the purpose.
`
`
`
`The National Cybersecurity Center of Excellence (NCCoE), a part of the
`National Institute of Standards and Technology (NIST), is a collaborative
`hub where industry organizations, government agencies, and academic
`institutions work together to address businesses’ most pressing
`cybersecurity challenges. Through this collaboration, the NCCoE develops
`modular,
`easily
`adaptable
`example
`cybersecurity
`solutions
`demonstrating how to apply standards and best practices using
`commercially available technology.
`
`
`
`
`LEARN MORE
`Visit https://www.nccoe.nist.gov
`nccoe@nist.gov
`301-975-0200
`
`
`
`
`
`3
`
`
`NIST SP 1800-5A: IT Asset Management
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`

`

`
`
`NIST SPECIAL PUBLICATION 1800-5B
`
`IT Asset Management
`
`
`
`Volume B:
`Approach, Architecture, and Security Characteristics
`
`
`Michael Stone
`Leah Kauffman, Editor-in-Chief
`National Cybersecurity Center of Excellence
`Information Technology Laboratory
`
`Chinedum Irrechukwu
`Harry Perper
`Devin Wynne
`The MITRE Corporation
`McLean, VA
`
`
`September 2018
`
`
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5
`
`The first draft of this publication is available free of charge from:
`https://www.nccoe.nist.gov/sites/default/files/library/sp1800/fs-itam-nist-sp1800-5-draft.pdf
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`

`

`
`
`DISCLAIMER
`
`Certain commercial entities, equipment, products, or materials may be identified in this document in
`order to describe an experimental procedure or concept adequately. Such identification is not intended
`to imply recommendation or endorsement by NIST or NCCoE, nor is it intended to imply that the
`entities, equipment, products, or materials are necessarily the best available for the purpose.
`
`
`
`
`
`
`
`National Institute of Standards and Technology Special Publication 1800-5B, Natl. Inst. Stand. Technol.
`Spec. Publ. 1800-5B, 47 pages, (September 2018), CODEN: NSPUE2
`
`
`
`
`
`
`
`FEEDBACK
`
`As a private-public partnership, we are always seeking feedback on our Practice Guides. We are
`particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you
`have implemented the reference design, or have questions about applying it in your environment,
`please email us at financial_nccoe@nist.gov.
`
`All comments are subject to release under the Freedom of Information Act (FOIA).
`
`
`
`
`
`
`
`National Cybersecurity Center of Excellence
`National Institute of Standards and Technology
`100 Bureau Drive
`Mailstop 2002
`Gaithersburg, MD 20899
`Email: nccoe@nist.gov
`
`
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`i
`
`

`

`
`
`NATIONAL CYBERSECURITY CENTER OF EXCELLENCE
`
`The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards
`and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and
`academic institutions work together to address businesses' most pressing cybersecurity issues. This
`public-private partnership enables the creation of practical cybersecurity solutions for specific
`industries, as well as for broad, cross-sector technology challenges. Through consortia under
`Cooperative Research and Development Agreements (CRADAs), including technology partners—from
`Fortune 50 market leaders to smaller companies specializing in IT security—the NCCoE applies standards
`and best practices to develop modular, easily adaptable example cybersecurity solutions using
`commercially available technology. The NCCoE documents these example solutions in the NIST Special
`Publication 1800 series, which maps capabilities to the NIST Cyber Security Framework and details the
`steps needed for another entity to recreate the example solution. The NCCoE was established in 2012 by
`NIST in partnership with the State of Maryland and Montgomery County, Md.
`
`To learn more about the NCCoE, visit https://www.nccoe.nist.gov. To learn more about NIST, visit
`https://www.nist.gov.
`
`NIST CYBERSECURITY PRACTICE GUIDES
`
`NIST Cybersecurity Practice Guides (Special Publication Series 1800) target specific cybersecurity
`challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the
`adoption of standards-based approaches to cybersecurity. They show members of the information
`security community how to implement example solutions that help them align more easily with relevant
`standards and best practices, and provide users with the materials lists, configuration files, and other
`information they need to implement a similar approach.
`
`The documents in this series describe example implementations of cybersecurity practices that
`businesses and other organizations may voluntarily adopt. These documents do not describe regulations
`or mandatory practices, nor do they carry statutory authority.
`
`ABSTRACT
`
`While a physical asset management system can tell you the location of a computer, it cannot answer
`questions like, “What operating systems are our laptops running?” and “Which devices are vulnerable to
`the latest threat?” An effective IT asset management (ITAM) solution can tie together physical and virtual
`assets and provide management with a complete picture of what, where, and how assets are being used.
`ITAM enhances visibility for security analysts, which leads to better asset utilization and security.
`
`KEYWORDS
`
`asset management; financial sector; information technology asset management; ITAM; personnel
`security; physical security; operational security
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`ii
`
`

`

`
`
`ACKNOWLEDGMENTS
`
`We are grateful to the following individuals for their generous contributions of expertise and time.
`
`Name
`
`FS-ISAC
`
`Organization
`
`Financial Services Information Sharing and Analysis Center
`
`Gorrell Cheek
`
`Western Union
`
`Joe Buselmeier
`
`American Express
`
`Sean Franklin
`
`American Express
`
`Ron Ritchey
`
`Sounil Yu
`
`Joel Van Dyk
`
`Dan Schutzer
`
`Bank of America
`
`Bank of America
`
`Depository Trust & Clearing Corporation
`
`Financial Services Roundtable
`
`George Mattingly
`
`Navy Federal Credit Union
`
`Jimmie Owens
`
`Navy Federal Credit Union
`
`Mike Curry
`
`State Street
`
`Timothy Shea
`
`RSA
`
`Mark McGovern
`
`MobileSystem7
`
`Atul Shah
`
`Leah Kauffman
`
`Microsoft
`
`NIST
`
`Benham (Ben) Shariati
`
`University of Maryland Baltimore County
`
`Valerie Herrington
`
`Herrington Technologies
`
`Susan Symington
`
`MITRE Corporation
`
`Sallie Edwards
`
`MITRE Corporation
`
`NIST SP 1800-5B: IT Asset Management
`
`iii
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`

`

`
`
`Name
`
`Sarah Weeks
`
`Lina Scorza
`
`Organization
`
`MITRE Corporation
`
`MITRE Corporation
`
`Karen Scarfone
`
`Scarfone Cybersecurity
`
`
`The Technology Partners/Collaborators who participated in this build submitted their capabilities in
`response to a notice in the Federal Register. Respondents with relevant capabilities or product
`components were invited to sign a Cooperative Research and Development Agreement (CRADA) with
`NIST, allowing them to participate in a consortium to build this example solution. We worked with:
`
`Technology Partner/Collaborator
`
`Build Involvement
`
`AlphaPoint Technology
`
`AssetCentral
`
`Belarc
`
`BelManage, BelManage Analytics
`
`Computer Associates
`
`ITAM
`
`Microsoft
`
`WSUS, Server 2012R2 Certificate Authority
`
`Peniel Solutions
`
`Technology/Industry Expertise
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`PI Achievers
`
`PuppetLabs
`
`RedJack
`
`Splunk
`
`Tyco
`
`Penetration Testing Services
`
`Puppet
`
`Fathom
`
`Splunk Enterprise
`
`iStar Edge
`
`Vanguard Integrity Professionals
`
`Security Manager
`
`
`
`NIST SP 1800-5B: IT Asset Management
`
`iv
`
`

`

`
`
`Contents
`
`1 Summary ............................................................................................ 1
`
`1.1 Challenge ....................................................................................................................... 1
`
`1.2 Solution .......................................................................................................................... 2
`
`1.3 Risks ............................................................................................................................... 2
`
`1.4 Benefits .......................................................................................................................... 3
`
`2 How to Use This Guide ........................................................................ 4
`
`2.1 Typographic Conventions .............................................................................................. 6
`
`3
`
`Introduction ........................................................................................ 6
`
`4 Approach ............................................................................................ 7
`
`4.1 Audience ........................................................................................................................ 7
`
`4.2 Scope ............................................................................................................................. 7
`
`4.3 Assumptions .................................................................................................................. 8
`
`4.3.1
`
`Security ......................................................................................................................... 8
`
`4.3.2 Modularity .................................................................................................................... 8
`
`4.3.3
`
`Technical Implementation ............................................................................................ 8
`
`4.3.4
`
`Tracking and Location ................................................................................................... 8
`
`4.3.5 Operating Systems ........................................................................................................ 8
`
`4.4 Constraints .................................................................................................................... 9
`
`4.4.1
`
`Limited Scalability Testing ............................................................................................. 9
`
`4.4.2
`
`Limited Assets ............................................................................................................... 9
`
`4.4.3 Mobile Devices .............................................................................................................. 9
`
`4.4.4 Network Devices ........................................................................................................... 9
`
`4.4.5
`
`Limited Replication of Enterprise Network................................................................. 10
`
`4.5 Risk Assessment and Mitigation .................................................................................. 10
`
`4.5.1 Assessing Risk Posture ................................................................................................ 11
`
`4.5.2
`
`Security Characteristics and Controls Mapping .......................................................... 12
`
`4.6 Technologies ................................................................................................................ 23
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`v
`
`

`

`
`
`5 Architecture ...................................................................................... 27
`
`5.1 Reference Architecture Description ............................................................................ 27
`
`5.2 Reference Architecture Relationship .......................................................................... 32
`
`5.3 Building an Instance of the Reference Architecture ................................................... 33
`
`5.3.1
`
`ITAM Build ................................................................................................................... 33
`
`5.3.2 Access Authorization Information Flow and Control Points ....................................... 37
`
`5.3.3
`
`Tier 1 Systems ............................................................................................................. 39
`
`5.3.4
`
`Tier 2 Systems ............................................................................................................. 39
`
`5.3.5
`
`Tier 3 Systems ............................................................................................................. 42
`
`Appendix A List of Acronyms ................................................................. 45
`
`Appendix B References ......................................................................... 46
`
`
`
`List of Figures
`
`Figure 5-1 Reference Architecture ...................................................................................................... 28
`
`Figure 5-2 ITAM Reference Functionality ............................................................................................ 29
`
`Figure 5-3 Typical Asset Lifecycle [13] ................................................................................................ 30
`
`Figure 5-4 ITAM Build ......................................................................................................................... 34
`
`Figure 5-5 DMZ Network .................................................................................................................... 35
`
`Figure 5-6 Network Security Network ................................................................................................ 35
`
`Figure 5-7 IT Systems Network ........................................................................................................... 36
`
`Figure 5-8 Physical Security Network ................................................................................................. 36
`
`Figure 5-9 Physical Asset Management .............................................................................................. 37
`
`Figure 5-10 ITAM Data Flow ............................................................................................................... 38
`
`
`
`List of Tables
`
`Table 4-1 Security Characteristics and Controls Mapping ................................................................... 13
`
`Table 4-2 Products and Technologies ................................................................................................. 23
`
`
`
`NIST SP 1800-5B: IT Asset Management
`
`vi
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`

`

`
`
`1 Summary
`Companies in the financial services sector can use this NIST Cybersecurity Practice Guide to more
`securely and efficiently monitor and manage their organization's many information technology (IT)
`assets. IT asset management (ITAM) is foundational to an effective cybersecurity strategy and is
`prominently featured in the SANS Critical Security Controls [1] and NIST Framework for Improving
`Critical Infrastructure Cybersecurity [2].
`
`During the project development, we focused on a modular architecture that would allow organizations
`to adopt some or all of the example capabilities in this practice guide. Depending on factors like size,
`sophistication, risk tolerance, and threat landscape, organizations should make their own
`determinations about the breadth of IT asset management capabilities they need to implement.
`
`This example solution is packaged as a “How-To” guide that demonstrates how to implement standards-
`based cybersecurity technologies in the real world with a risk-based approach. We used open-source
`and commercial off-the-shelf (COTS) products that are currently available today. The guide helps
`organizations gain efficiencies in IT asset management, while saving them research and proof of concept
`costs.
`
`This guide aids those responsible for tracking assets, configuration management, and cybersecurity in a
`financial services sector enterprise. Typically, this group will comprise those who possess procurement,
`implementation, and policy authority.
`
`1.1 Challenge
`
`The security engineers we consulted in the financial services sector told us they are challenged by
`identifying assets across the enterprise and keeping track of their status and configurations, including
`hardware and software. This comprises two large technical issues:
`
`1. tracking a diverse set of hardware and software. Examples of hardware include servers,
`workstations, and network devices. Examples of software include operating systems,
`applications, and files.
`
`2.
`
`lack of total control by the host organization. Financial services sector organizations can include
`subsidiaries, branches, third-party partners, contractors, temporary workers, and guests. It is
`impossible to regulate and mandate a single hardware and software baseline against such a
`diverse group.
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`1
`
`

`

`
`
`1.2 Solution
`
`An effective ITAM solution needs several characteristics, including:
`
`▪
`
`complement existing asset management, security, and network systems
`
`▪ provide application programming interfaces to communicate with other security devices and
`systems such as firewalls and intrusion detection and identity and access management systems
`
`▪ know and control which assets, both virtual and physical, are connected to the enterprise
`network
`
`▪ automatically detect and alert when unauthorized devices attempt to access the network, also
`known as asset discovery
`
`▪ enable administrators to define and control the hardware and software that can be connected
`to the corporate environment
`
`▪ enforce software restriction policies relating to what software is allowed to run in the corporate
`environment
`
`▪
`
`record and track attributes of assets
`
`▪ audit and monitor changes in an asset's state and connection
`
`▪
`
`integrate with log analysis tools to collect and store audited information
`
`The ITAM solution developed and built at the NCCoE, and described in this document, meets all of these
`characteristics.
`
`1.3 Risks
`
`In addition to being effective, the ITAM solution must also be secure and not introduce new
`vulnerabilities into an organization. To reduce this risk, the NCCoE used security controls and best
`practices from NIST [3], the Defense Information Systems Agency (DISA) [4] and International
`Organization for Standardization (ISO) [5], and the Federal Financial Institutions Examination Council
`(FFIEC). How these individual controls are met by individual components of this solution can be seen in
`Table 4-2.
`
`Some of the security controls we implemented include:
`
`▪ access control policy
`
`▪
`
`continuous monitoring and tracking of assets connected to a network
`
`▪ event auditing
`
`▪ anomalous activity detection and reporting
`
`▪
`
`vulnerability scanning
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`2
`
`

`

`
`
`By implementing an ITAM solution based on controls and best practices, implementers can tailor their
`deployment to their organization's security risk assessment, risk tolerance, and budget.
`
`1.4 Benefits
`
`The build described here employs passive and active data collectors/sensors across an enterprise to
`gather asset information and send it to a centralized location. The data collectors/sensors specialize in
`gathering information from different devices, no matter their operating system. Machines used by direct
`employees receive software agents that report on configuration, while temporary employees and
`contractors receive “dissolvable” agents and more passive sensing. Dissolvable agents are automatically
`downloaded to the client, run, and are removed. All of this information is gathered at a central location
`for analysis and reporting. You can choose to view all the activity in an enterprise, or configure the
`system to choose which machines are monitored, how much data is collected, and how long the data is
`retained.
`
`The example solution described in this guide has the following benefits:
`
`▪ enables faster responses to security alerts by revealing the location, configuration, and owner of
`a device
`
`▪
`
`▪
`
`increases cybersecurity resilience: help security analysts focus on the most valuable or critical
`assets
`
`improves and reduces reporting time for management and auditing
`
`▪ provides software license utilization statistics (to identify cost reduction opportunities)
`
`▪
`
`▪
`
`reduces help desk response times: staff already know what is installed and the latest pertinent
`errors and alerts
`
`reduces the attack surface of machines by ensuring that software is correctly patched/updated
`
`Other potential benefits include, but are not limited to rapid, transparent deployment and removal
`using consistent, efficient, and automated processes; improved situational awareness; and an improved
`security posture gained from tracking and auditing access requests and other ITAM activity across all
`networks.
`
`This NIST Cybersecurity Practice Guide:
`
`▪ maps security characteristics to guidance and best practices from NIST and other standards
`organizations as well as the Federal Financial Institutions Examination Council IT Examination
`Handbook and Cyber Assessment Tool (CAT) guidance
`
`▪ provides
`
`• a detailed example solution with capabilities that address security controls
`
`This publication is available free of charge from: http://doi.org/10.6028/NIST.SP.1800-5.
`
`NIST SP 1800-5B: IT Asset Management
`
`3
`
`

`

`
`
`•
`
`instructions for implementers and security engineers, including examples of all the
`necessary components and installation, configuration, and integration
`
`▪
`
`is modular and uses products that are readily available and interoperable with your existing IT
`infrastructure and investments
`
`Your organization can be confident that these results can be replicated: We performed functional
`testing and submitted the entire build to verification testing. An independent second team verified the
`build documentation based on the information in this practice guide.
`
`While we have used a suite of open source and commercial products to address this challenge, this
`guide does not endorse these particular products, nor does it guarantee regulatory compliance. Your
`organization's information security experts should identify the standards-based products that will best
`integrate with your existing tools and IT system infrastructure. Your company can adopt this solution or
`one that adheres to these guidelines in whole, or you can use this guide as a starting point for tailoring
`and implementing parts of a solution.
`
`2 How to Use This Guide
`This National Institute of Standards and Technology (NIST) Cybersecurity Practice Guide demonstrates a
`standards-based reference design and provides users with the information they need to replicate all or
`parts of the build created in the NCCoE ITAM Lab. This reference design is modular and can be deployed
`in whole or in part.
`
`This guide contains three volumes:
`
`▪ NIST SP 1800-5A: Executive Summary
`
`▪ NIST SP 1800-5B: Approach, Architecture, and Security Characteristics – what we built and why
`(you are here)
`
`▪ NIST SP 1800-5C: How-To Guides – instructions for building the example solution
`
`Depending on your role in your organization, you might use this guide in different ways:
`
`Financial services sector leaders, including chief security and technology officers, will be interested in
`the Executive Summary, NIST SP 1800-5A, which describes the following topics:
`
`▪
`
`challenges that financial services sector organizations face in implementing and using ITAM
`systems
`
`▪ example solution built at the NCCoE
`
`▪ benefits of adopti

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket