CMMC RM.5.155 - Analyze the Effectiveness of Security Solutions

CMMC RM.5.155 - Analyze the Effectiveness of Security Solutions

Requirement text: RM.5.155: Analyze the effectiveness of security solutions at least annually to address
anticipated risk to the system and the organization based on current and accumulated threat intelligence.

DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171B
Since sophisticated threats such as the APT are constantly changing, the threat awareness
and risk assessment of the organization is dynamic, continuous and informs the actual
system operations, the security requirements for the system, and the security solutions
employed to meet those requirements. Threat intelligence (i.e., threat information that has
been aggregated, transformed, analyzed, interpreted, or enriched to provide the necessary
context for decision-making processes) is infused into risk assessment processes and
information security operations of the organization to identify any changes required to
address the dynamic threat environment.

NIST SP 800-30 provides guidance on risk assessments.

CMMC CLARIFICATION
Organizations should perform regular assessments of their cybersecurity capability to
include the effectiveness of the security controls in light of current threat intelligence. These
assessments go beyond identifying misconfigurations and vulnerabilities to assessing the
intended capability against newly acquired threat intelligence to determine if the expected
effectiveness against the threat is still being achieved. Such an assessment could identify
shortcomings in the intended cybersecurity capability that the adversary could take
advantage of resulting in risks to the organization These assessments of the security
solutions will help identify necessary changes in the design, architecture, and configuration
of the solutions. These changes should be rolled into standard operating procedure
timeframes and based on criticality of the findings.

Example 1
Your organization built a new service this year that will prevent users from browsing the
internet directly. The new solution allows users to have indirect internet and allows
downloaded content after a scrubbing and analysis process. During an assessment it was
identified that this solution is working properly, except that all PDF files can be downloaded
without being scrubbed and sent directly to the users’ machines. This finding leads the team
to look at the configuration of the solution and identify that a misconfiguration has been put
in place. The team makes this finding a high priority and immediately put in a change request
to the team that manages the solution. The assessment team works with the configuration
team and verifies the change is put in place and PDFs are no longer downloaded without
being analyzed.

Example 2
Your organization has end point protection on each enterprise user system. This solution
helps monitor for malicious commands being run on the solution. During an assessment it
is found that if a user attempts to run a music application that is already whitelisted, the end
point monitoring solution fails. This causes an endpoint to lack the extra protection and
monitoring desired by the organization. Upon further analysis, it is identified the endpoints
failing required a driver update to fix the problem. This problem was fixed and the endpoints
no longer suffer from this issue.

References
• CMMC modification of Draft NIST SP 800-171B 3.11.5e
• CERT RMM v1.2 RISK:SG6.SP1
    • Related Articles

    • Security Assessment: SP 800-171 Security Family 3.12

      A security requirement assessment is the testing and/or evaluation of the management, operational, and technical security requirements on a system to determine the extent to which the requirements are implemented correctly, operating as intended, and ...
    • Security and Compliance Glossary of Terms

      Access Control - The process of granting or denying specific requests to:        1) obtain and use information and related information processing services and        2) enter specific physical facilities (e.g., federal buildings, military ...
    • CMMC CA.2.158 - Periodically Assess Effectiveness of Security Controls

      Requirement text: CA.2.158: Periodically assess the security controls in organizational systems to determine if the controls are effective in their application. DISCUSSION FROM SOURCE: DRAFT NIST SP 800-171 R2 Organizations assess security controls ...
    • Personnel Security: SP 800-171 Security Family 3.9

      Users play a vital role in protecting a system as many important issues in information security involve users, designers, implementers, and managers. How these individuals interact with the system and the level of access they need to do their jobs ...
    • CMMC IR.2.094 - Analyze Security Events

      Requirement text: IR.2.094: Analyze and triage events to support event resolution and incident declaration. DISCUSSION FROM SOURCE: CERT RMM V1.2 The triage of event reports is an analysis activity that helps the organization to gather additional ...