5.1: Establish Secure Configurations
Sub-control 5.1 states that you must maintain documented security configuration standards for all authorized operating systems and software.
| Asset Type | Security Function | Implementation Groups |
|---|---|---|
| Applications | Protect | 1, 2, 3 |
Dependencies
- Sub-control 2.1: Maintain Inventory of Authorized Software
Inputs
-
Authorized Software List: The list of authorized software. This can be pulled from sub-control 2.1.
-
Security Configuration Standards: The list of enterprise security configuration standards.
Assumptions
-
Documentation of secure configuration standards should include any approved deviations/exceptions from industry-standard security baselines such as CIS benchmarks, DISA Security Technical Implementation Guides (STIGs), or U.S. government configuration baselines (USGCB).
Operations
-
Perform a calculation to compute the intersection (M1) of I1 and I2.
Measures
| Measure | Definition |
|---|---|
| M1 = List of authorized software with security configuration standards | A list of all the software/applications the organization has, including operating systems, that have associated enterprise security configuration standards. |
|
M2 = Count of items in M1 |
A count of the total number of items in M1. |
|
M3 = List of authorized software with security configuration standards |
A list of all the software/applications the organization has, including operating systems, that do not have associated enterprise security configuration standards. |
| M4 = Count of items in M3 |
A count of the total number of items in M3. |
| M5 = List of security configuration standards without associated software |
A list of all the enterprise security configuration standards that do not have installed applications/software or operating systems within the organization. |
| M6 = Count of items in M5 | A count of the total number of items in M5. |
| M7 = List of authorized software |
|
| M8 = Count of items in M7 | A count of the total number of items in M7. |
Metrics
Security Configuration Standards Coverage
| Metric | Calculation |
|---|---|
| The percentage of the total OS/Software in an enterprise that have security configuration standards documented and maintained. | (M8 - M4) / M8 |