3.13.2—System and Communications Protection - Basic
>Control Description
>Discussion
Organizations apply systems security engineering principles to new development systems or systems undergoing major upgrades. For legacy systems, organizations apply systems security engineering principles to system upgrades and modifications to the extent feasible, given the current state of hardware, software, and firmware components within those systems. The application of systems security engineering concepts and principles helps to develop trustworthy, secure, and resilient systems and system components and reduce the susceptibility of organizations to disruptions, hazards, and threats.
Examples of these concepts and principles include developing layered protections; establishing security policies, architecture, and controls as the foundation for design; incorporating security requirements into the system development life cycle; delineating physical and logical security boundaries; ensuring that developers are trained on how to build secure software; and performing threat modeling to identify use cases, threat agents, attack vectors and patterns, design patterns, and compensating controls needed to mitigate risk. Organizations that apply security engineering concepts and principles can facilitate the development of trustworthy, secure systems, system components, and system services; reduce risk to acceptable levels; and make informed risk-management decisions. [SP 800-160-1] provides guidance on systems security engineering.
>Cross-Framework Mappings
>Assessment Interview Topics
Questions assessors commonly ask
Process & Governance:
- •What policies govern use of encrypted sessions for remote access?
- •What procedures define encryption requirements for remote connections?
- •Who approves remote access encryption standards?
- •What governance ensures all remote access is encrypted?
- •What training addresses encrypted remote access requirements?
Technical Implementation:
- •What VPN or encryption technologies secure remote access?
- •How do you enforce encryption for all remote connections?
- •What FIPS 140-2 validated cryptography is used?
- •How do you prevent unencrypted remote access?
- •What monitoring detects unencrypted remote connections?
Evidence & Documentation:
- •Can you demonstrate remote access encryption implementation?
- •What configurations show mandatory encryption for remote access?
- •Can you provide evidence of FIPS-validated encryption?
- •What logs verify all remote sessions are encrypted?
- •What audit findings confirm encrypted remote access compliance?
Ask AI
Configure your API key to use AI features.