The Federal Information Security Management Act (FISMA) is designed to ensure appropriate security controls for government information systems.
Dependencies
The FISMA compliance reports have the following dependencies.
SA Rules | App Rules |
---|---|
Accounts Created Accounts Deleted Accounts Modified Accounts Created Logon Failures Details Logon Failures Summary Failed Remote Access Details Failed Remote Access Summary Successful Remote Access Details Successful Remote Access Summary Change in Audit Settings Encryption Failures Key Generation and Changes Firewall Configuration Changes Password Changes Password Changes Summary | account:created account:deleted account:modified account:logon-success config:change-audit-setting encryption:failures encryption:key-gen-and-changes config:fw-config-changes account:logon-failure account:password-change config:router-change |
Citations
The FISMA reports have the following Citations.
Report Rule | Citation Name | Citation Description |
---|---|---|
Accounts Created | NIST 800-53 AC-2 | ACCOUNT MANAGEMENT |
Accounts Modified | NIST 800-53 AC-2 | ACCOUNT MANAGEMENT |
Accounts Deleted | NIST 800-53 AC-2 | ACCOUNT MANAGEMENT |
Account Management | NIST 800-53 AC-2 | ACCOUNT MANAGEMENT |
Logon Failures - Detail | NIST 800-53 AC-7 | UNSUCCESSFUL LOGIN ATTEMPTS |
Logon Failures - Top 25 | NIST 800-53 AC-8 | UNSUCCESSFUL LOGIN ATTEMPTS |
Successful Remote Access - Detail | NIST 800-53 AC-17 | REMOTE ACCESS |
Successful Remote Access - Top 25 | NIST 800-53 AC-17 | REMOTE ACCESS |
Failed Remote Access - Top 25 | NIST 800-53 AC-17 | REMOTE ACCESS |
Failed Remote Access - Detail | NIST 800-53 AC-17 | REMOTE ACCESS |
Change in Audit Settings | NIST 800-53 AU-9 | PROTECTION OF AUDIT INFORMATION |
Firewall Configuration Changes | NIST 800-53 CM-3 | CONFIGURATION CHANGE CONTROL |
Router Configuration Changes | NIST 800-53 CM-3 | CONFIGURATION CHANGE CONTROL |
Password Changes - Detail Password Changes - Top 25 | NIST 800-53 IA-5 | AUTHENTICATOR MANAGEMENT |
Key Generation and Changes | NIST 800-53 SC-12 | Cryptographic Key Establishment and Management |