SI.L1-B.1.XII
Flaw Remediation
FCI Data
Security Requirement
Identify, report, and correct information and information system flaws in a timely manner.
USU Policy, Procedures, and Standards
University Policy 5200: Information Security and Appropriate Use
- Section 2.3 - Device and Endpoint Management and Security
- Section 3.3 - Information Technology and IT Staff
Devices must meet security standards including updates, configurations, and vulnerability protections. IT staff are responsible for applying patches and maintaining system integrity.
NIST Cybersecurity Framework v2
- Protect (PR): PR.AA-01 - Identities are managed for authorized users, processes, and devices.
- Protect (PR): PR.AA-03 - Access to assets and associated facilities is limited to authorized users, processes, and devices.
Implementation Details
Documentation should include details to meet the Security Requirement for this control. Complete this list for each system or systems that process or access FCI data:
- List how system and software flaws (vulnerabilities) are identified (e.g., vulnerability scanning, vendor alerts).
- List the process for reporting and tracking identified vulnerabilities.
- List how patches and updates are tested and applied, and who is responsible.
- List any additional tools, schedules, or review procedures related to system flaw remediation.
Document How
- the time within which to identify system flaws is specified
- system flaws are identified within the specified time frame
- the time within which to report system flaws is specified
- system flaws are reported within the specified time frame
- the time within which to correct system flaws is specified
- system flaws are corrected within the specified time frame
Example
USU conducts vulnerability scans using scanning tools. IT administrators receive vendor alerts for critical systems and software, and any high-risk issues are prioritized for patching within 30 days. Patch management is coordinated through centralized tools for both servers and endpoints. Documentation is maintained for scan results, patch schedules, and remediation status.
How might an auditor assess this control?
Method
- Examine:
- Review patch management policies, vulnerability scan results, and remediation logs.
- Interview:
- Ask IT staff how vulnerabilities are discovered, prioritized, and patched.
- Test:
- Review sample scan results and follow the remediation timeline and documentation trail.
Objects (examples of items you could present to the auditor)
- Vulnerability Scan Reports: With dates and issue severity.
- Patch Management Policies: Describing update schedules and responsibilities.
- Remediation Logs: Tracking patching and mitigation activity.
- Test/Approval Records: For patch testing prior to deployment.
- Ticketing System Records: Showing vulnerability reports and resolution tracking.
- Vendor Advisory Subscriptions: Showing proactive flaw identification sources.