3.1.20 Verify & Control/Limit Connections to & use of External Systems Guides NIST SP 800-41 – Guidelines on Firewalls and Firewall Policy NIST SP 800-77 – Guide to IPSec VPNs SANS...
3.2.2 Personnel Adequately Trained to Carry out Duties Guides NIST SP 800-16 – Information Technology Security Training Requirements: A Role–and Performance–Based Model NIST SP 800-50 – Building an...
3.3.5 Correlate Audit Review, Analysis & Reporting Guides NIST SP 800-92 – Guide to Computer Security Log Management SANS Institute – Successful SIEM and Log Management Strategies...
3.4.1 Establish & Maintain Baseline Configurations & Inventories Guides NIST SP 800-128 – Guide for Security-Focused Configuration Management of Information Systems MITRE – Systems Engineering Guide – Configuration...
3.4.2 Establish & Enforce Security Configurations Settings Guides DISA Security Technical Implementation Guides (STIGS) NIST Computer Resource Center National Checklist Program Repository Microsoft TechNet – Geek of...
3.4.4 Analyze Security Impact of Changes Guides NIST SP 800-128 – Guide for Security-Focused Configuration Management of Information Systems SANS Institute – Secure Configuration Management Demystified...
3.4.8 Apply Deny-by-Exception (Blacklisting) or Permit-by-Exception (Whitelisting) Policies Guides NIST SP 800-167 – Guide to Application Whitelisting US-Cert – Application Whitelisting Strategic Planning Guide Example Tools CarbonBlack Protection...
3.4.9 Control & Monitor User-Installed Software Vendor Documentation Defendpoint – Application Control
3.6.1 Establish Operational Incident Handling Capability Guides NIST SP 800-61r2 – Incident Handling Guide Example Tools RSA Netwitness SecOps Manager Sample Policy & Procedures Incident Management...
3.6.3 Test Organizational Incident Response Capability Guides NIST SP 800-84 – Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities NIST SP 800-115...