FISMA/NIST 800-53 Compliance

Overview

FISMA/NIST 800-53 is a compliance requirement established by the Federal Information Security Management Act and the National Institute of Standards and Technology. It provides guidelines and standards for federal agencies and organizations that handle sensitive government information. Compliance with FISMA/NIST 800-53 ensures the confidentiality, integrity, and availability of federal information systems. 

For more information, refer to the FISMA/NIST 800-53 publication: https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final

Logcollect for FISMA/NIST 800-53 Compliance

Logcollect combines SIEM, log management, proactive threat hunting, and guided incident response to effectively meet the requirements outlined in FISMA/NIST 800-53 compliance. With comprehensive monitoring, analysis, and reporting capabilities organizations can identify and manage their assets, establish access controls, protect resources, and respond promptly to incidents. 

By leveraging Logcollect, organizations can strengthen their information security posture, protect sensitive government information, and achieve compliance with FISMA/NIST 800-53. This ensures the confidentiality, integrity, and availability of federal information systems. 

Using Logcollect to meet FISMA/NIST 800-53 Requirements

Access Control

AC-2 – Account Management

The organization manages information system accounts, including establishing, activating, modifying, reviewing, disabling, and removing accounts. The organization reviews information system accounts.

Logcollect  collects all account management activities which get generated in the system. Logcollect  reports provide easy and standard review of all account management activity and can also detect any changes to Account Management.

AC-3 – Access Enforcement

The information system enforces assigned authorizations for controlling access to the system in accordance with applicable policy.

Logcollect  collects all access activities which get generated in the system. Logcollect  reports provide easy and independent review of access control settings and enforcement.

AC-5 – Separation of Duties

The information system enforces separation of duties through assigned access organizations.

Logcollect  collects information from production access control systems to help define role usage requirements, determine attempts to cross role boundaries, and changes to configurations that can affect separation of duties.

AC-6 – Least Privilege

The organization employs the concept of least privilege for specific duties and information systems (including specific ports, protocols, and services) in accordance with risk assessments as necessary to adequately mitigate risk to organizational operations, organizational assets, and individuals.

Logcollect  monitors activities of both users and systems to assist in determining necessary access, frivolous access, and resource needs of production systems. Review of activities such as network connections, application access, and system logons can help identify appropriate and inappropriate use according to policy.

AC-7 – Unsuccessful Login Attempts

The information system enforces a limit of specific number of consecutive invalid access attempts by a user within a certain time period. The information system automatically locks the account for a specified time period and delays next login prompt after a set timeframe has expired.

Logcollect  collects all authentication activities which get generated in the system. Logcollect  reports provide easy and standard review of unsuccessful login attempts to systems and applications. Logcollect  alerts can detect & report on multiple unsuccessful login attempts.

AC-17 – Remote Access

The organization authorizes, monitors, and controls all methods of remote access to the information system.

Logcollect  collects all account management activities which get generated in the system. Logcollect  reports provide easy and standard review of all account management activities.

AC-18 – Wireless Access Restriction

The organization:

  • Establishes usage restrictions and implementation guidance for wireless technologies; and
  • Authorizes, monitors, controls wireless access to the information system.

Logcollect  collects all access activities which get generated in the system. Logcollect  reports provide easy and independent review of access control settings and enforcement.

AC-19-Access Control for Portable and Mobile Systems

The organization:

  • Establishes usage restrictions and implementation guidance for organization-controlled portable and mobile devices; and
  • Authorizes, monitors, and controls device access to organizational information systems.

Logcollect  entity and network definitions allow for correlation and event monitoring based on location relative to the organizational networks, to determine inbound, outbound, and local network traffic. Remote access and usage activities from mobile devices can be monitored by observation of the logs from authentication systems, security systems and production servers.

AC-20 – Personally Owned Information Systems/Use of External Information Systems

The organization establishes terms and conditions for authorized individuals to:

  • Access the information system from an external information system; and
  • Process, Store, and/or transmit organization controlled information using an external information system.

Logcollect  collects remote access activities which get generated in the system. Logcollect  analysis facilities and reports provide easy and independent review of external access to information systems.

Audit and Accountability

AU-4 – Audit Storage Capacity

The organization allocates sufficient audit record storage capacity and configures auditing to reduce the likelihood of such capacity being exceeded.

Logcollect  provides central, secure, and independent audit log storage Logcollect ’s high compression of the data (> 80%) ensures extensible storage of audit log data, ensures capacity will not be exceeded.

AU-5 – Response to Audit Processing Failures

The information system alerts designated organizational officials in the event of an audit processing failure.

Logcollect  provides support for NIST 800-53 control enhancement AU-5.

  • By completely automating the process of centrally collecting and retaining all audit log messages. Logcollect  core functionality provides alerting for audit storage over utilization. Logcollect  also provides direct support for NIST 800-53 control enhancement AU-5.
  • By collecting and analyzing audit processing failure logs. Logcollect  provide alerting on processing failure activity including audit log clearing, audit logging stoppage, and failed audit log writes. Logcollect  investigations, reports, and details provide evidence of audit processing failure activity including audit log clearing, audit logging stoppage, and failed audit log writes.

AU-6 – Audit Monitoring, Analysis, and Reporting

The organization regularly reviews/analyzes information system audit records for indications of inappropriate or unusual activity, investigates suspicious activity or suspected violations, report findings to appropriate officials, and takes necessary actions.

Logcollect  provides centralized monitoring, analysis, and reporting of audit activity across the entire IT infrastructure. Logcollect  automates the process of identifying high-risk activity and prioritizes based on asset risk. High-risk activity can be monitored in real-time or alerted on. Logcollect  reports provide easy and standard review of inappropriate, unusual, and suspicious activity

AU-7 – Audit Reduction and Report Generation

The information system provides an audit reduction and report generation capability.

Logcollect  policy based log processing capabilities provide automatic audit log reduction. “Interesting” audit logs can be forwarded as events for immediate monitoring and/or alerting. “Uninteresting” audit logs can be filtered out and/or retained at an archive-only level. Logcollect  analysis and reporting facilities provide aggregated views of audit data providing further audit reduction. Logcollect  provides extensive report generation capabilities.

AU-8 – Time Stamps

The information system provides time stamps for use in audit record generation.

Logcollect  collects all user access events logs in real-time and retains the date and time stamp in which they occurred.

AU-9 – Protection of Audit Information

The information system protects audit information and audit tools from unauthorized access, modification, and deletion.

Logcollect  provides central and secure storage of all audit log data.

AU-11 – Audit Retention

The organization retains audit records for an appropriate time period to provide support for after the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.

Logcollect  completely automates the process and requirement of collecting and retaining audit logs. Logcollect  retains logs in compressed archive files, easy-to-manage, long-term storage. Log archives can be restored quickly and easily months or years later in support of after-the-fact investigations.

AU-13 – Monitoring for Information Disclosure

The organization monitors open source information for evidence of unauthorized ex-filtration or disclosure of organizational information.

Logcollect  provides support for NIST 800-53 control requirement AU-13 by utilizing the feature of the Windows System Monitor. Logcollect  independently monitors and logs the connection and disconnection of external data devices to the host computer where the Agent is running. Also monitors and logs the transmission of files to an external storage device. It can be configured to protect against external data device connections by ejecting specified devices upon detection. External USB drive storage devices include Flash/RAM drives and CD/DVD drives.

Security Assessment and Authorization

CA-2 – Security Assessments

The organization conducts an assessment of the security controls in the information system periodically to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.

Logcollect ’s log analysis and reporting capabilities can be leveraged during a security assessment to help ensure implemented controls are functioning as intended and to potentially identify any weaknesses.

CA-3 – Information System Connections

The organization authorizes all connections from the information system to other information systems outside of the accreditation boundary through the use of system connection agreements and monitors/controls the system connections on an ongoing basis.

Logcollect  can collect network device logs and also Logcollect ’s Network Connection Monitoring feature will identify the network connections established. Logcollect ’s analysis & reporting capabilities can be used for reviewing network activity to ensure only authorized communications occur. Logcollect  alerts can be used for detecting unauthorized communications.

CA-7 – Continuous Monitoring

The organization monitors the security controls in the information system on an ongoing basis.

Logcollect  monitoring, analysis, and reporting capabilities provide for continuous monitoring of specific controls across the IT infrastructure. For instance, Logcollect  alerts can detect the use of restricted accounts.

Configuration Management

CM-3 – Configuration Change Control

The organization: Audits activities associated with configuration-controlled changes to the system.

Logcollect  provides support for NIST 800-53 control requirement CM-3 by collecting and analyzing all configuration change logs. Logcollect  provide alerting on configuration/policy changes on critical systems. Logcollect  investigations, reports, and details provide evidence of configuration/policy changes.

CM-4 – Monitoring Configuration Changes

The organization monitors changes to the information system conducting security impact analyses to determine the effects of the changes.

Logcollect  monitoring capability can be used to detect the following changes to the file system:

  • Additions
  • Deletions
  • Modifications
  • Permissions

Logcollect  analysis & reporting capabilities can be used for monitoring configuration changes. Logcollect  alerting can be utilized to detect and notify of changes to specific configurations.

CM-5 – Access Restrictions for Change

The organization:

  • approves individual access privileges and enforces physical and logical access restrictions associated with changes to the information system; and
  • Generates, retains, and reviews record reflecting all such changes

Logcollect  collects all access activity and changes to access controls. Logcollect  reports provide easy and independent review of access control settings and enforcement.

CM-6 – Configuration Settings

The organization: Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.

Logcollect  provides support for NIST 800-53 control requirement CM-6 by collecting and analyzing all configuration change logs. Logcollect  provide alerting on configuration/policy changes on critical systems. Logcollect  investigations, reports, and details provide evidence of configuration/policy changes.

CM-11 – User Installed Software

The organization enforces explicit rules governing the installation of software by users.

Logcollect  monitoring, analysis, and reporting capabilities provide for continuous monitoring of specific controls across the IT infrastructure. For instance, Logcollect  alerts can detect the use of restricted accounts.

Contingency Planning

CP-9 – Information System Backup

The organization:

  • Conducts backups of user-level information contained in the information system
  • Conducts backups of system-level information contained in the information system
  • Conducts backups of information system documentation including security related documentation

Logcollect  provides support for NIST 800-53 control requirement CM-9 by collecting and analyzing all software backup logs. Logcollect  provide alerting on backup failures. Logcollect  investigations, reports, and details provide evidence of backup failures/success.

Identification and Authentication

IA-2 – Identification and Authentication (Organizational Users)

The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).

Logcollect  provides support for NIST 800-53 control requirements IA-2 by collecting and analyzing all authentication logs. Logcollect  provide alerting on authentication failures. Logcollect  investigations, reports, and details provide evidence of all account authentication activity.

IA-3 – Device Identification and Authentication

The information system uniquely identifies and authenticates before establishing a connection.

Logcollect  provides support for NIST 800-53 control requirements IA-3 by collecting and analyzing all authentication logs. Logcollect  provide alerting on vendor default account authentications. Logcollect  investigations, reports, and details provide evidence of all account authentication activity including those from vendor default accounts.

IA-8 – Identification and Authentication (Non-Organizational Users)

The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).

Logcollect  provides support for NIST 800-53 control requirements IA-8 by collecting and analyzing all authentication logs. Logcollect  provide alerting on vendor or 3rd party account authentication failures. Logcollect  investigations, reports, and details provide evidence of all account authentication activity including those from vendor or 3rd party accounts.

Incident Response

IR-4 – Incident Handling

The organization implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.

Logcollect  provides support for NIST 800-53 control enhancement IR-4 by detecting and notifying individuals of activity that may constitute an incident. Logcollect ’s analysis capabilities provide quick & easy analysis of activity to determine the incidents. Logcollect  provides correlation, pattern recognition, and behavioral analysis. Logcollect ’s integrated knowledge base provides information useful in responding to and resolving the incident.

IR-5 – Incident Monitoring

The organization tracks and documents information system security incidents.

Logcollect  provides direct support for NIST 800-53 control requirements IR-5 by providing security incident tracking and documentation through the  management interface.

IR-6 – Incident Reporting

The organization promptly reports incident information to appropriate authorities.

Logcollect  notification capabilities can route alerts to the appropriate individual based on group membership or relationship to the impacted system. Logcollect  reports provide summary and detail level reporting of incident based alerts.

IR-7 – Incident Response Assistance

The organization provides an incident response support resource that offers advice and assistance to users of the information system for the handling and reporting of security incidents. The support resource is an integral part of the organization’s incident response capability.

Logcollect  integrated knowledge base provides information useful in responding to and resolving incidents.

Maintenance

MA-2 – Controlled Maintenance

The organization Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions.

Logcollect  provides support for NIST 800-53 control requirement MA-2 by collecting and analyzing all error logs. Logcollect  provide alerting on critical maintenance errors. Logcollect  investigations, reports, and details provide evidence of critical errors, process shutdowns, and system shutdowns which occur after maintenance.

MA-4 – Remote Maintenance

The organization authorizes, monitors, and controls any remotely executed maintenance and diagnostic activities, if employed.

Logcollect  can identify maintenance related activity for analysis and/or reporting. Logcollect  reports provide easy review of remotely executed maintenance activity.

MA-5 – Maintenance Personnel

The organization allows only authorized personnel to perform maintenance on the information system.

Logcollect  can identify maintenance related activity for analysis and/or reporting. Logcollect  reports provide easy review of maintenance activity.

Media Protection

MP-2 – Media Access

The organization restricts access to organization-defined types of digital and non-digital media to organization-defined list of authorized individuals using organization-defined security measures.

Logcollect  provides support for NIST 800-53 control requirement MP-2 by utilizing the feature of the Windows System Monitor. Logcollect ’s monitors and logs the connection and disconnection of external data devices to the host computer where the Agent is running, also monitors and logs the transmission of files to an external storage device. Logcollect  can be configured to protect against external data device connections by ejecting specified devices upon detection. External USB drive storage devices include Flash/RAM drives and CD/DVD drives.

Physical Environmental Protection

PE-3 – Physical Access Control

The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).

Logcollect  provides support for NIST 800-53 control requirement PE-3 by collecting log messages from physical access devices (i.e. Card Key) at all physical access points. Logcollect  provide alerting on suspicious physical access. Logcollect  investigations, reports, and details provide evidence of physical access failures/successes.

PE-5 – Access Control for Output Devices

The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.

Logcollect  provides support for NIST 800-53 control requirement MP-2 by utilizing the feature of the Windows System Monitor. Logcollect ’s monitors and logs the connection and disconnection of external data devices to the host computer where the Agent is running, also monitors and logs the transmission of files to an external storage device. Logcollect  can be configured to protect against external data device connections by ejecting specified devices upon detection. External USB drive storage devices include Flash/RAM drives and CD/DVD drives.

PE-6 – Monitoring Physical Access

The organization monitors physical access to the information system to detect and respond to physical security incidents.

Logcollect  can collect log messages from physical access devices (i.e. Card Key) for analysis and reporting.

Personal Security

PS-4 – Personnel Termination

The organization, upon termination of individual employment, terminates information system access, conducts exit interviews, retrieves all organizational information system related property, and provides appropriate personnel with access to official records created by the terminated employee that are stored on organizational information systems.

Logcollect  reports provide easy review of terminated personnel to ensure access rights have been removed. Logcollect  alerts can be used to detect usage of should-be terminated user accounts.

PS-5 – Personnel Transfer

The organization reviews information systems/facilities access authorizations when personnel are reassigned or transferred to other positions within the organization and initiates appropriate actions.

Logcollect  reports provide easy review of transferred personnel to ensure access rights have been terminated and/or appropriately modified.

PS-7 – Third-Party Personnel Security

The organization Monitors provider compliance.

Logcollect  provides support for NIST 800-53 control requirement PS-7 by collecting both physical and logical access control log messages. Logcollect  investigations, reports, and details provide evidence of revocation of cyber/physical access including access revocation, account deletion/modification, account disabling, and account locking for 3rd parties.

Risk Assessment

RA-5 – Vulnerability Scanning

The organization:

  • Scans for vulnerabilities in the information system and hosted applications and when new vulnerabilities potentially affecting the system/applications are identified and reported.
  • Analyzes vulnerability scan reports and results from security control assessments.

Logcollect  provides support for NIST 800-53 control requirement RA-5 by collecting vulnerability detection log messages. Logcollect  provides alerting on high risk vulnerabilities. Logcollect  investigations, reports, and details provide evidence of security vulnerabilities from vulnerability detection systems.

System and Communications Protection

SC-5 – Denial of Service Protection

The information system protects against or limits the effects of the following types of denial of service attacks (organization-defined list of types of denial of service attacks or reference to source for current list).

Logcollect  provides support for NIST 800-53 control requirement SC-5 by providing central collection and monitoring of security log messages. Logcollect  provide alerting on security events like any out of ordinary behavior in the environment. Logcollect  investigations, reports, and details provide evidence of security events.

SC-7 – Boundary Protection

The information system monitors and controls communications at the external boundary of the information system and at key internal boundaries within the system.

Logcollect  can collect boundary device logs from routers, firewalls, VPN servers, etc. Logcollect  can alert on unauthorized or suspicious activity. Logcollect  reports provide a consolidated review of internal/external boundary activity and threats.

SC-15 – Collaborative Protection

The information system prohibits remote activation of collaborative computing mechanisms and provides an explicit indication of use to the local users.

Logcollect  will be able to identify report and/or alert on the initiation of specific collaborative computing activity.

SC-18 – Mobile Code

The organization:

  • Establishes usage restrictions and implementation guidance for mobile code technologies based on the potential to cause damage to the information system if used maliciously.
  • Authorizes, monitors, and controls the use of mobile code within the information system.

Logcollect  will be able to identify report and/or alert on specific mobile code activity.

SC-19 – Voice over Internet Protocol

The organization:

  • Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
  • Authorizes, monitors, and controls the use of VoIP within the information system.

Logcollect  will be able to identify report and/or alert on specific VoIP activity.

SC-28 – Protection of Information at Rest

The information system protects the confidentiality and integrity of information at rest.

Logcollect  provides supplemental support for NIST 800-53 control requirement SC-28 by providing details of changes to information at rest. Logcollect  can be configured to monitor system file or directory activity, deletions, modification, and permission changes.

System and Information Integrity

SI-2 – Flaw Remediation

The organization identifies, reports, and corrects information system flaws.

Logcollect  provides support for NIST 800-53 control requirement SI-2 by collecting and analyzing all error logs. Logcollect  provide alerting on critical errors caused by flaws. Logcollect  investigations, reports, and details provide evidence of critical errors, process shutdowns, and system shutdowns caused by system flaws.

SI-3 – Malicious Code Protection

The organization:

  • Employs malicious code protection mechanisms at information system entry and exit points and at workstations, servers, or mobile computing devices on the network to detect and eradicate malicious code:
    – Transported by electronic mail, electronic mail attachments, web accesses, removable media, or other common means; or
    – Inserted through the exploitation of information system vulnerabilities;
  • Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;
  • Configures malicious code protection mechanisms to:
    – Perform periodic scans of the information system and real-time scans of files from external sources as the files are downloaded, opened, or executed in accordance with organizational security policy
    – Block malicious code; quarantine malicious code; send alert to administrator in response to malicious code detection

Logcollect  provides support for NIST 800-53 control requirement SI-3 by collecting log messages from antivirus software and other anti-malware tools. Logcollect  provide alerting on antivirus critical/error conditions, malware infections, and signature update failures. Logcollect  investigations, reports, and tails provide evidence of antivirus activity, malware infections, and signature update failures/successes. Logcollect  independently monitors and logs the connection and disconnection of external data devices to the host computer where the Agent is running. Also monitors and logs the transmission of files to an external storage device. It can be configured to protect against external data device connections by ejecting specified devices upon detection. External USB drive storage devices include Flash/RAM drives and CD/DVD drives.

SI-4 – Information System Monitoring

Information system monitoring capability is achieved through a variety of tools and techniques (e.g., intrusion detection systems, intrusion prevention systems, malicious code protection software, audit record monitoring software, network monitoring software).

Monitoring devices are strategically deployed within the information system to collect essential information. Monitoring devices are also deployed at ad hoc locations within the system to track specific transactions. Additionally, these devices are used to track the impact of security changes to the information system.

Logcollect  can collect logs from IDS/IPS systems, A/V systems, firewalls, and other security devices. Logcollect  provides central analysis and monitoring of intrusion related activity across the IT infrastructure. Logcollect  can correlate activity across user, origin host, impacted host, application and more. Logcollect  can be configured to identify known bad hosts and networks. Logcollect ’s Personal Dashboard provides customized real-time monitoring of events and alerts. Logcollect ’s Investigator provides deep forensic analysis of intrusion related activity. Logcollect ’s integrated knowledge base provides information and references useful in responding to and resolving intrusions.

SI-5 – Security Alerts and Advisories

The organization receives information system security alerts/advisories on a regular basis, issue alerts/ advisories to appropriate personnel, and takes appropriate actions in response.

Logcollect  can alert on specific intrusion related activity. Users can be notified based on department or role. Logcollect ’s integrated knowledge base provides information and references useful in responding to and resolving intrusions.

SI-7 – Software and Information Integrity

The information system detects and protects against unauthorized changes to software and information.

Logcollect  monitoring capability can be used to detect the following changes to the file system:

  • Additions
  • Deletions
  • Modifications
  • Permissions

This capability can be used to detect unauthorized changes to software and information.

SI-8 – Spam Protection

The organization employs spam protection mechanisms at information system entry and exit points and at workstations, servers, or mobile computing devices on the network to detect and take action on unsolicited messages transported by electronic mail, electronic mail attachments, web accesses, or other common means.

Logcollect  provides support for NIST 800-53 control requirement SI-8 by collecting and analyzing SPAM logs. Logcollect  investigations, reports, and details provide evidence of SPAM protection activity.

SI-11 – Error Handling

The information system identifies potentially securityrelevant error conditions.

Logcollect  provides support for NIST 800-53 control requirement SI-11 by collecting and analyzing all error logs. Logcollect  provide alerting on security related critical errors. Logcollect  investigations, reports, and details provide evidence of security related errors, process shutdowns, and system shutdowns.