Skip to content

Latest commit

 

History

History
81 lines (66 loc) · 2.75 KB

control-3.3.rst

File metadata and controls

81 lines (66 loc) · 2.75 KB

3.3: Configure Data Access Control Lists

Configure data access control lists based on a user’s need to know. Apply data access control lists, also known as access permissions, to local and remote file systems, databases, and applications.

Asset Type Security Function Implementation Groups
Data Protect 1, 2, 3

Dependencies

  • Safeguard 3.2: Establish and Maintain a Data Inventory
  • Safeguard 4.1: Establish and Maintain a Secure Configuration Process
  • Safeguard 5.1: Establish and Maintain an Inventory of Accounts

Inputs

  1. GV12: Sensitive Data Inventory
  2. GV1: Enterprise asset inventory
  3. GV3: Configuration Standards
  4. GV13: Portion of data management process addressing data owners
  5. GV14: Portion of data management process addressing data handling
  6. GV22: Inventory of Accounts

Assumptions ----------

Operations

  1. Use the data managemet process, specifically GV13 and GV14, as guidelines to map user account to sensitive data in GV12.
    1. Identify and enumerate sensitive data correctly mapped to user accounts (M1)
    2. Idenitfy and enumerate sensitive data not correctly mapped to user accounts (M2)
  2. For each enterprise asset storing sensitive data, as outlined by GV12, #. Identify and enumerate all assets storing sensitive data (3) #. Use :code:`GV3 to check and enumerate assets that are properly configured to only allow users as identified in Operation 1 (M3)
    1. Use GV3 to check and enumerate assets that are improperly configured to only allow users as identified in Operation 1 (M4)

Measures

  • M1 = Count of sensitive data correctly mapped to user accounts per the data management process
  • M2 = Count of sensitive data correctly mapped to user accounts per the data management process
  • M3 = Count of assets storing sensitive data
  • M4 = Count of properly configured assets to support data access control
  • M5 = Count of improperly configured assets to support data access control
  • M6 = Count of GV17
  • M7 = :code:'GV13`
  • M8 = GV14

Metrics

If either M7 or M8 is 0, this safeguard receives a failing score. The other metrics don't apply.

Completeness of User Access Control ^^^^^^^^^^^^^^^^^^^^^^^^^^^ .. list-table:

* - **Metric**
  - | Percentage of user accounts properly mapped to sensitive data 
* - **Calculation**
  - :code:`M1 / M6`

Properly Configured Assets

Metric
Percentage of assets properly configured to control acess of
sensitive data
Calculation M4 / M3