Proposed Cybersecurity Questions - HWY BASE (Cybersecurity Annex)
|
NIST Category |
Section |
Description |
|
1.100 |
Cybersecurity Annex |
|
1.100 |
IDENTIFY |
|
1.101 |
Does your organization have a cybersecurity program? |
Asset Management |
1.102 |
Does your organization have written and approved cybersecurity policy, plan, process, and supporting procedures? |
Asset Management |
1.103 |
Do your cybersecurity plans incorporate any of the following approaches/guidance? |
Asset Management |
|
*National Institute of Standards and Technology (NIST), Framework for Improving Critical Infrastructure Cybersecurity |
Asset Management |
|
*NIST 800-171 - Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations |
Asset Management |
|
*NIST Special Publication 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations |
Asset Management |
|
*ISO/IEC 27001 - Information Security Management |
Asset Management |
|
*U.S. Department of Homeland Security, Transportation Systems Sector Cybersecurity Framework Implementation Guidance |
Asset Management |
|
*Industry-specific methodologies (See TRB, APTA, and ATA Fleet CyWatch, etc.) |
Asset Management |
|
*Other (if checked, elaborate) |
Asset Management |
1.104 |
Does your organization review, assess, and update as necessary all cybersecurity policies, plans, processes, and supporting procedures at least every 12 months, or when there is a significant organizational or technological change? |
Governance |
1.105 |
For critical cyber assets (i.e. "critical cyber asset" – a cyber asset that performs one or more operationally critical tasks), does your organization review, assess, and update as necessary all cybersecurity policies plans, processes, and supporting procedures at least every 12 months, or when there is a significant organizational change? |
Governance |
1.106 |
Does your organization evaluate and classify cyber assets using the following criteria? |
Business Environment |
|
*Cyber Assets - Programmable electronic devices, including the hardware, software, and data in those devices? |
Business Environment |
|
*Critical Cyber Asset – A cyber asset that performs one or more operationally critical tasks? |
Business Environment |
|
*Cyber System - One or more critical cyber assets logically grouped by an organization to perform one or more operationally critical tasks? |
Business Environment |
1.107 |
Does your organization review and assess cyber asset classification as critical or noncritical at least every 12 months? |
Business Environment |
|
*Cyber Assets - Programmable electronic devices, including the hardware, software, and data in those devices? |
Business Environment |
|
*Critical Cyber Asset – A cyber asset that performs one or more operationally critical tasks? |
Business Environment |
|
*Cyber System - One or more critical cyber assets logically grouped by an organization to perform one or more operationally critical tasks? |
Business Environment |
1.108 |
Does your organization have a cybersecurity risk assessment process? |
Risk Assessment |
1.109 |
Does your organization conduct cyber vulnerability assessments as described in your risk assessment process in the following environments? |
Risk Assessment |
|
*OT environment? |
Risk Assessment |
|
* IT environment? |
Risk Assessment |
1.110 |
Has your organization conducted a risk assessment to identify operational control(s) and communication/business enterprise assets and potential vulnerabilities at least every 12 months in the following environments? |
Risk Assessment |
|
*OT environment? |
Risk Assessment |
|
* IT environment? |
Risk Assessment |
1.111 |
Has your organization conducted a risk assessment to identify cyber assets and their vulnerabilities using the following criteria? |
Risk Assessment |
|
* IT(devices that support communication, business enterprise)? |
Risk Assessment |
|
* IT/OT (devices that support the operations and ICS environment)? |
Risk Assessment |
|
*ICS (cyber systems for operations and management)? |
Risk Assessment |
|
*Operational control(s) and communication/business enterprise IT assets and potential vulnerabilities? |
Risk Assessment |
1.112 |
Does the vulnerability management process address unmitigated/accepted vulnerabilities in the following environments? |
Business Environment |
|
*OT environment? |
Business Environment |
|
* IT environment? |
Business Environment |
1.113 |
Has your organization established a process to identify and evaluate vulnerabilities and compensating security controls? |
Business Environment |
1.114 |
Has a written cybersecurity incident response strategy been developed and integrated into the overall cybersecurity program? |
Risk Management Strategy |
1.115 |
For critical assets, has an inventory of the components of the operating system been developed, documented, and maintained for the following? |
Risk Assessment |
|
*Current OT System? |
Risk Assessment |
|
*Current IT System? |
Risk Assessment |
1.116 |
For critical cyber assets, is there a defined list of software programs authorized to execute in the operating system? |
Risk Assessment |
1.117 |
Does your organization have architecture and/or logic diagrams (i.e. components in a control system, Remote Terminal Units (RTUs), Programmable Logic Controllers (PLCs))? |
Business Environment |
1.118 |
Are methods in place to verify the accuracy of the architecture and/or logic diagrams (i.e. components in a control system, Remote Terminal Units (RTUs), Programmable Logic Controllers (PLCs)) and/or other documentation related to your OT system? |
Business Environment |
1.119 |
Has the organization implemented protocols to ensure that all facilities (e.g., data centers, server rooms, etc.) and equipment are properly secured to guard against internal or external cyber threats or attacks? |
Supply Chain Management |
|
*Current OT System? |
Risk Assessment |
|
*Current IT System? |
Risk Assessment |
1.120 |
Are insider threats considered when vetting/assessing new hires and existing organization’s staff to include employees and contract personnel? |
Asset Management |
1.121 |
ŸAre hardware/software components of a system evaluated and optimized to prevent vulnerabilities that can be exploited by a remote attacker? |
Asset Management |
1.122 |
If third-party service providers have access to the organization's system, are they properly vetted? |
Asset Management |
1.123 |
Does the organization have an established network security baseline for the following? |
Asset Management |
|
*OT? |
Asset Management |
|
*IT? |
Asset Management |
1.124 |
Has your organization taken actions to ensure their supply chain policies, procedures, and processes—include acquisition, receipt, warehouse, inventory control, and distribution—when acquiring vehicles, equipment, goods and services to ensure that cybersecurity risks are addressed? |
Supply Chain Management |
1.125 |
Are IT and OT hardware, software and services addressed in the organization’s supply chain risk management program and policies? |
Supply Chain Management |
1.126 |
Has your organization accurately and completely mapped the IT and OT supply chain including a list of companies that you procure assets, hardware, software and services from? |
Supply Chain Management |
1.127 |
Has your organization identified an essential list of IT and OT components (e.g., hardware, software, services) for your business to operate? |
Supply Chain Management |
1.128 |
Does your organization have written and approved program and policies regarding the procurement of IT and OT hardware and software (i.e. NIST standards compliant)? |
Supply Chain Management |
1.129 |
Does your organization evaluate the security of IT and OT providers including security requirements and audits? |
Supply Chain Management |
1.200 |
PROTECT |
|
1.201 |
Does your organization have a designated and alternate cybersecurity representative and/or team responsible for the following? |
Identity Management & Access Control |
|
*OT? |
Identity Management & Access Control |
|
*IT? |
Identity Management & Access Control |
1.202 |
Does the organization provide cybersecurity training? |
Awareness and Training |
|
*Annually? |
Awareness and Training |
1.203 |
Does the organization ensure that recurring cybersecurity training reinforces security roles, responsibilities, and duties of employees at all levels to protect against and recognize cyber threats for the following? |
Awareness and Training |
|
*OT? |
Awareness and Training |
|
*IT? |
Awareness and Training |
1.204 |
For critical cyber assets, does your organization provide role-based security training on recognizing and reporting potential indicators of system compromise prior to granting access to critical cyber assets? |
Awareness and Training |
1.205 |
Are all personnel requiring access to the organization's cyber assets provided initial onboarding and subsequent annual cybersecurity awareness training? |
Awareness and Training |
1.206 |
Is there a cybersecurity awareness program for employees that includes practical exercises/testing for the following? |
Awareness and Training |
|
*OT? |
Awareness and Training |
|
*IT? |
Awareness and Training |
1.207 |
Has your organization developed and distributed cybersecurity policies, plans, processes, and supporting procedures to the appropriate personnel? |
Awareness and Training |
1.208 |
Has your organization established and documented policies and procedures for the following? |
Data Security |
|
*Access Control |
Data Security |
|
*Awareness and Training |
Data Security |
|
*Audit and Accountability |
Data Security |
|
*Configuration Management/Baseline security controls |
Data Security |
|
*Cyber Asset Management and Maintenance/Change Management |
Data Security |
|
*Cybersecurity Incident Response |
Data Security |
|
*Identification and Authentication |
Data Security |
|
*Information Protection |
Data Security |
|
*Insider Threat |
Data Security |
|
*Media Protection |
Data Security |
|
*Patch Management |
Data Security |
|
*Personnel Security |
Data Security |
|
*Physical Protection (related to cyber systems, cyber assets, communications) |
Data Security |
|
*Recovery (disaster, business continuity) plan(s) |
Data Security |
|
*Risk Assessment |
Data Security |
|
*Security Assessment |
Data Security |
1.209 |
Has your organization developed and maintained a comprehensive set of network/system architecture diagrams or other documentation, including nodes, interfaces, remote and third-party connections, and information flows? |
Data Security |
1.210 |
Does the organization have policies and processes in place to inventory operational control (OT) and enterprise (IT) assets, including hardware, software and applications? |
Data Security |
1.211 |
Has your organization developed an operational framework to ensure coordination, communication, and accountability for information security on and between the control systems and enterprise networks? |
Data Security |
1.212 |
Has your organization implemented the following measures? |
Data Security |
|
*Establish and enforce unique accounts for each individual user and administrator? |
Data Security |
|
*Establish and enforce access control policies for local and remote users? |
Data Security |
|
*Prohibit the sharing of these accounts? |
Data Security |
|
*Procedures and controls in place for approving and enforcing remote and third-party connections? |
Data Security |
1.213 |
Are authentication methods and specific standards employed throughout your company’s cyber access control environment? |
Data Security |
1.214 |
Where systems do not support unique user accounts, are appropriate compensating security controls (e.g., physical controls) implemented? |
Data Security |
1.215 |
Does your organization ensure user accounts are modified, deleted, or de-activated expeditiously for personnel who no longer require access or are no longer employed by the organization? |
Data Security |
1.216 |
Does your organization ensure appropriate segregation of duties is in place and, where this is not feasible, apply appropriate compensating security controls? |
Data Security |
1.217 |
Does your organization change all default passwords for new software, hardware, etc., upon installation and, where this is not feasible (e.g., a control system with a hard-wired password), implement appropriate compensating security controls (e.g., administrative controls)? |
Data Security |
1.218 |
For critical cyber assets, has your organization implemented the following measures?
|
Data Security |
|
*Restrict user physical access to control systems and control networks by using appropriate controls? |
Data Security |
|
*Employ more stringent identity and access management practices (e.g., authenticators, permissions, password-construct, access control)? |
Data Security |
|
*Tiered administrative access based on need to access the different systems? |
Data Security |
1.219 |
Does your organization monitor physical and remote user access to critical cyber assets? |
Information Protection Processes & Procedures |
1.220 |
Does your organization employ mechanisms (e.g., active directory) to support the management of accounts for critical cyber assets? |
Information Protection Processes & Procedures |
1.221 |
Has your organization established and implemented policies and procedures to ensure data protection measures are in place, including the following?
|
Information Protection Processes & Procedures |
|
*Identifying critical data and establishing classification of different types of data. |
Information Protection Processes & Procedures |
|
*Establishing specific data handling procedures. |
Information Protection Processes & Procedures |
|
*Establishing specific data disposal procedures. |
Information Protection Processes & Procedures |
1.222 |
If data protection measures are not in place, are compensating controls in place? |
Information Protection Processes & Procedures |
1.223 |
Are cyber assets segregated and protected from enterprise networks and the internet by use of physical separation, firewalls, and other protections (OT and IT – Payment Systems etc.)? |
Information Protection Processes & Procedures |
1.224 |
Does the OT/IT system deny network traffic by default and allow only authorized network traffic? |
Information Protection Processes & Procedures |
1.225 |
Does the OT system monitor and manage communications at appropriate OT network boundaries? |
Information Protection Processes & Procedures |
1.226 |
Do OT system controls protect the integrity of electronically-communicated information? (e.g., preventing man in the middle)? |
Information Protection Processes & Procedures |
1.227 |
Does the OT system prevent traffic from being routed to the internet? |
Information Protection Processes & Procedures |
1.228 |
Does your organization regularly validate that technical controls comply with the organization's cybersecurity policies, plans, and procedures, and report results to senior management? |
Information Protection Processes & Procedures |
1.229 |
Has your organization implemented technical or procedural controls to restrict the use of cyber assets to only approved activities? |
Information Protection Processes & Procedures |
1.230 |
Does the organization prioritize protection for accounts with elevated privileges, remote access, and/or used on high value assets by using a multi-factor authentication approach for the identified high-value assets? |
Information Protection Processes & Procedures |
1.231 |
Does the organization maintain control via VPN or some other means as it relates to accessing the agencies cyber infrastructure via the use of personally owned devices, e.g. Android, iPhone, iPad, etc.? |
Protective Technology |
1.232 |
Does the organization have a method for severing the connection/disconnecting access to personally owned devices when the employee has left the organization? |
Protective Technology |
1.300 |
DETECT |
|
1.301 |
Does the organization have documented IT roles and responsibilities? |
Anomalies and Events |
1.302 |
For critical cyber assets, does your organization employ mechanisms to detect unauthorized components? |
Anomalies and Events |
1.303 |
For critical cyber assets, does your organization review network connections periodically, including remote access and third-party connections? |
Anomalies and Events |
1.304 |
Has your organization implemented processes to respond to anomalous activity through the following? |
Anomalies and Events |
|
*Generating alerts and responding to them in a timely manner? |
Anomalies and Events |
|
*Logging cybersecurity events and reviewing these logs? |
Anomalies and Events |
|
*Are logs regularly analyzed and maintained for a minimum of 12 months? |
Anomalies and Events |
1.305 |
Does your organization monitor for unauthorized access or the introduction of malicious code or communications? |
Security Continuous Monitoring |
1.306 |
Has your organization established technical or procedural controls for cyber intrusion monitoring and detection? |
Security Continuous Monitoring |
1.307 |
Does your organization perform regular testing of intrusion and malware detection processes and procedures (e.g., penetration testing)? |
Detection Processes |
1.308 |
Does the organization take proactive measures to detect, contain, and remove malicious presence within the network? |
Detection Processes |
1.309 |
Does the organization have mechanisms in place to analyze cyber anomalies for the following? |
Anomalies and Events |
|
*OT? |
Anomalies and Events |
|
*IT? |
Anomalies and Events |
1.310 |
Does the organization have established documented incremental alert levels for cyber incidents? |
Anomalies and Events |
1.311 |
Does the organization have mechanisms in place to ensure continuous monitoring of the following? |
Security Continuous Monitoring |
|
*OT systems? |
Security Continuous Monitoring |
|
*IT systems? |
Security Continuous Monitoring |
1.312 |
Does the organization audit and test its IT monitoring systems to verify effectiveness? |
Security Continuous Monitoring |
|
*Independent (internal) review annually? |
Security Continuous Monitoring |
|
*3rd party (external) review every 3 years? |
Security Continuous Monitoring |
1.313 |
Has your organization invested in cybersecurity assessment in the last 5 years? |
Detection Processes |
|
*Independent (internal) review in the last 5 years? |
Detection Processes |
|
*3rd party (external) review in the last 5 years? |
Detection Processes |
1.314 |
Does your organization employ Threat Hunting/Red Teaming to identify existing threats on the network? |
Detection Processes |
1.400 |
RESPOND |
|
1.401 |
Has your organization established policies and procedures for cybersecurity incident handling, analysis, and notifications (reporting/alerting), including assignments of specific roles/tasks to individuals and teams? |
Response Planning |
1.402 |
Has your organization established and maintained a cyber-incident response capability? |
Response Planning |
1.403 |
For critical cyber assets, has your organization established and maintained a process that supports 24/7 cyber-incident response? |
Response Planning |
1.404 |
Do your organization's response plans and procedures include mitigation measures to help prevent further impacts? |
Response Planning |
1.405 |
Does the organization have procedures in place for reporting incidents through the appropriate channels (i.e. local FBI and CISA cyber incident response office(s)) and also contacting TSA's Transportation Security Operations Center (TSOC) for actual or suspected cyber-attacks that could impact transportation operations? |
Communications |
1.500 |
RECOVER |
|
1.501 |
Has your organization established a plan for the recovery and reconstitution of cyber assets within a time frame to align with the organization's safety and business continuity objectives? |
Recovery Planning |
1.502 |
Has the organization developed, separately or as part of another document, recovery plans in the event of a cybersecurity incident for the following? |
Recovery Planning |
|
*IT(devices that support communication, business enterprise)? |
Recovery Planning |
|
*IT/OT (devices that support the organization's operations)? |
Recovery Planning |
|
*ICS (cyber systems for operations and management)? |
Recovery Planning |
1.503 |
Does your organization review its cyber recovery plan annually and update it as necessary? |
Recovery Planning |
1.504 |
For critical cyber assets, are cybersecurity incident response exercises conducted as follows? |
Recovery Planning |
|
*Quarterly? |
Recovery Planning |
|
*Semi-annually? |
Recovery Planning |
|
*Annually? |
Recovery Planning |
1.505 |
Does the organization document lessons learned and incorporate them into cybersecurity planning and training? |
Improvements |
1.506 |
Does the organization have documented procedures in place to coordinate restoration efforts with internal and external stakeholders (coordination centers, Internet Service Providers, victims, vendors, etc.)? |
Communications |
1.507 |
Does the organization conduct System Recovery Plan exercises at least every 12 months to ensure the restoration of data as part of their comprehensive disaster recovery strategy? |
Improvements |