Graylog GO logo
What is NIST 800-53

Imagine compliance is like a driving application. You know your location and you plug in the destination address, then it shows you the route’s overview. If you want a more specific map, you can zoom in a bit and get more details.

Similarly, the National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and it’s most recent revision provide the overview roadmap for your compliance journey. Meanwhile, NIST Special Publication (SP) 800-53 revision 5 gives you the street by street directions for how to travel from where you are to where you want to be.

By understanding how NIST 800-53 fits into your compliance program, you can build the security controls and monitoring that help you achieve your security and business objectives.

 

What is NIST 800-53?

NIST 800-53 sets out a series of controls that organizations can use to meet compliance requirements:

  • Requirements: protection needs created by-laws, executive orders, directives, regulations, policies, standards, business needs, or risk assessments
  • Controls: safeguards and protection capabilities that achieve the organization’s security and privacy objectives.

In short, an organization takes actions or deploys technologies that prove it follows the rules set forth in the requirements.

 

NIST 800-53 establishes 20 security and privacy control families that outline actions organizations can take to prove they followed a rule. Controls may include:

  • Policies
  • Oversight
  • Supervision
  • Manual processes
  • Automated mechanisms

 

What are the 20 Control Families?

For each control family, NIST 800-53 defines Base Controls, Related Controls, and Control Enhancements with each step becoming more sophisticated. For each of these, the publication also provides a Discussion section with information about how to implement the control within the organization’s risk context.

 

The 20 Control Families are:

  1. Access Control (AC): Providing, limiting, and monitoring people’s access to and use of resources
  2. Awareness and Training (AT): Providing training about information security and privacy risks and issues
  3. Audit and Accountability (AU): Logging events to document activities across the IT environment, including the event type, time, location, source, outcome, and people or entities involved
  4. Assessment, Authorization, and Monitoring (CA): Engaging in third-party, independent control reviews, like audits and penetration tests, to determine whether controls work as intended
  5. Configuration Management (CM): Establishing secure baseline configurations, like disabling unnecessary functions, and creating official processes for changing, reviewing, and documenting configurations
  6. Contingency Planning (CP): Plans for maintaining or restoring critical business functions when systems are compromised or breached
  7. Identification and Authentication (IA): Creating unique user accounts and processes for ensuring that people are who they say they are when granting access to systems and resources, including considering multi-factor authentication (MFA)
  8. Incident Response (IR): Establishing and testing policies and procedures for handling and reporting incidents, including information spillage where sensitive information may end up in less secure systems
  9. Maintenance (MA): Scheduling, documenting, performing, and reviewing records of system component maintenance, repair, and replacement
  10. Media Protection (MP): Establishing and enforcing controls for protection digital and non-digital media, including access, marking, storage, transport, sanitization, use, and downgrading
  11. Physical and Environmental Protection (PE): Limiting control fo physical facilities, including for visitors, and protecting information from emergencies like power outages, fires, or natural disasters
  12. Planning (PL): Implementing policies, security and privacy architectures, central management operations, and baselines
  13. Program Management (PM): Implementing an information security program plan that assigns responsibility and sets strategies for sensitive data management, privacy management, data governance, risk management, and supply chain risk management
  14. Personnel Security (PS): Implementing policies and procedures for human resources risk management like screening, onboarding, and terminating personnel and third-party contractors
  15. Personally Identifiable Information Processing and Transparency (PT): Implementing and enforcing policies and procedures for what, how, when, and why to process personally identifiable information (PII)
  16. Risk Assessment (RA): Analyzing, documenting, and updating the organization’s risk tolerance and response as the foundation of its program, including privacy impact statements and threat hunting
  17. System and Services Acquisition (SA): Establishing, documenting, and enforcing policies and processes for allocating resources, acquiring technologies, usage, software installation, configuration management, secure development processes, and supply chain protection
  18. Systems and Communications Protections (SC): Enforcing low-level security controls, like separating system management and general use functionalities, implementing denial-of-service protections, protecting boundaries, data encryption, and operations security.
  19. System and Information Integrity (SI): Monitoring for incidents with tools like anti-virus, threat intelligence, spam protection, web application vulnerability remediation, and information handling processes
  20. Supply Chain Risk Management (SR): Implementing and enforcing policies and processes for reducing vendor and software component risk

 

What does NIST 800-53 compliance look like?

Within each of the 20 Control Families, NIST 800-53 contains anywhere from 6 to 51 Base Controls. Within those Base Controls, you then have the various Related Controls and Control Enhancements.

 

For example, AC-2 Account Management contains 12 control enhancements:

  1. Using automated system account management mechanisms
  2. Managing temporary or emergency accounts
  3. Disabling accounts for various reasons
  4. Automating audits of account creation, modification, enabling, disabling, and removal
  5. Requiring user logout
  6. Implementing dynamic access controls, like attribute-based access controls (ABAC)
  7. Managing privileged user accounts
  8. Using trust relationships, business rules, and mechanisms for dynamic account management
  9. Limiting use of shared or group accounts
  10. Generating alerts for least privilege violations to enforce the control
  11. Monitoring for abnormal user activity
  12. Disabling accounts for high-risk users

 

Tracking Logons

 

To enforce these controls and monitor their effectiveness, you likely collect data from various sources like:

  • Identity and Access Management (IAM)
  • Device logs
  • Application logs
  • User and entity behavior analytics (UEBA)
  • Privileged Access Management (PAM) tools
  • Network firewall logs
  • Web Application Firewall (WAF) logs

 

IAM Modifications

After integrating these inputs, you need to parse, normalize, and correlate the data generated which becomes time-consuming and overwhelming, especially if you have a small team with limited resources.

 

Despite these difficulties, a centralized threat detection and incident response (TDIR) solution provides long-term benefits. By centralizing your security and compliance monitoring data in a single location, you can create dashboards for these NIST 800-53 Control Families for continuous insights and audit documentation. Some examples of alerts that you may want to map to your NIST 800-53 compliance documentation include:

  • Account lockout alerts
  • Total number of account management activities completed overall or during a defined audit period, like accounts created, deleted, disabled, enabled, or modified
  • Percentages for each type of account management activity as part of the whole overall or during a defined audit period, like accounts created, deleted, disabled, enabled, or modified
  • Data about high-risk user groups like privileged, temporary accounts, and emergency accounts
  • Activities related to NIST 800-53 controls
  • Total populations for audit periods
  • Access activity trends over time, including the ability to adjust for the audit period

 

Further, you may need to implement reporting procedures that include:

  • Sharing data with internal and external auditors, compliance teams, and control owners
  • Sending senior leadership reports with compliance summaries in an easy-to-digest way
  • Exporting findings or data to downstream compliance platforms or validating findings against ticketing systems

 

Graylog Security: Continuous Monitoring for NIST Compliance

 

With Graylog’s security analytics and anomaly detection capabilities, you get the cybersecurity platform you need without the complexity that makes your team’s job harder. With our powerful, lightning-fast features and intuitive user interface, you can lower your labor costs while reducing alert fatigue and getting the answers you need – quickly.

Our prebuilt search templates, dashboards, correlated alerts, and dynamic look-up tables enable you to get immediate value from your logs while empowering your security team.

For more information about how Graylog Security can help you achieve your NIST CSF 2.0 objectives, contact us today.

 

Categories

Get the Monthly Tech Blog Roundup

Subscribe to the latest in log management, security, and all things Graylog blog delivered to your inbox once a month.