Skip to content

Commit 99d7d12

Browse files
committed
waivers
1 parent bc0cb25 commit 99d7d12

File tree

2 files changed

+13
-13
lines changed

2 files changed

+13
-13
lines changed

RTN-082.tex

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,6 +47,7 @@
4747
% See LPM-51 for version number policy.
4848
\setDocChangeRecord{%
4949
\addtohist{0.1}{2024-07-05}{Initial Draft}{William O'Mullane}
50+
\addtohist{0.2}{2024-07-15}{Variance, Waiver Language}{William O'Mullane}
5051
}
5152

5253

compliance.tex

Lines changed: 12 additions & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656

5757
a. Identify the duties of individuals requiring separation.
5858

59-
b. Define system access authorizations to support separation of duties.}&{P}&{P}&{Principle of least privilege is applied. Some users have access to hosts that is unneeded.} \\ \hline
59+
b. Define system access authorizations to support separation of duties.}&{V}&{Y}&{Principle of least privilege is applied. Some users have access to hosts that is unneeded.} \\ \hline
6060
{03.01.05 Least Privilege
6161

6262
a. Allow only authorized system access for users (or processes acting on behalf of users) that is necessary to accomplish assigned organizational tasks.
@@ -65,13 +65,13 @@
6565

6666
c. Review the privileges assigned to roles or classes of users [Assignment: organization-defined frequency] to validate the need for such privileges.
6767

68-
d. Reassign or remove privileges, as necessary.}&{N}&{P}&{Targeted sudo rules are needed for common operations. IPA controls sudo centrally } \\ \hline
68+
d. Reassign or remove privileges, as necessary.}&{V}&{Y}&{Targeted sudo rules are needed for common operations. IPA controls sudo centrally } \\ \hline
6969
{03.01.06 Least Privilege – Privileged Accounts
7070

7171
a. Restrict privileged accounts on the system to [Assignment: organization-defined personnel or roles].
7272

7373
b. Require that users (or roles) with privileged accounts use non-privileged accounts when accessing non-security functions or non-security information.
74-
}&{P}&{N}&{These accounts were specifically target in the Gemini attack - we would rather not use this approach.} \\ \hline
74+
}&{V}&{W}&{These accounts were specifically target in the Gemini attack - we would rather not use this approach.} \\ \hline
7575
{03.01.07 Least Privilege – Privileged Functions
7676

7777
a. Prevent non-privileged users from executing privileged functions.
@@ -174,7 +174,7 @@
174174

175175
2. When required by system changes or following [Assignment: organization- defined events].
176176

177-
b. Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].}&{P}&{Y}&{OUO training at SLAC, DMTN-199 training for commissioners, Specific training for satellite catalog handlers.
177+
b. Update role-based training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].}&{V}&{Y}&{OUO training at SLAC, DMTN-199 training for commissioners, Specific training for satellite catalog handlers.
178178

179179
We would like to do more here like capture flag exercises for developers or blue/red teams events.
180180

@@ -308,7 +308,7 @@
308308

309309
b. Apply the following security requirements to the systems or components when
310310
the individuals return from travel: [Assignment: organization-defined security
311-
requirements].}&{N}&{N}&{Though people self select to remove vaults and carry clean personal devices we do not have a strict policy nor do we have a list of high risk areas. In general there is no data on peoples machines so it is account/password vulnerability we would need to cover.} \\ \hline
311+
requirements].}&{N}&{Y}&{Though people self select to remove vaults and carry clean personal devices we do not have a strict policy nor do we have a list of high risk areas. In general there is no data on peoples machines so it is account/password vulnerability we would need to cover.} \\ \hline
312312
{3.5 IDENTIFICATION AND AUTHENTICATION}&&& \\ \hline
313313
{03.05.01 User Identification and Authentication
314314

@@ -758,7 +758,7 @@
758758

759759
c. Receive a documented acknowledgement from individuals indicating that they have read, understand, and agree to abide by the rules of behavior before authorizing access to CUI and the system.
760760

761-
d. Review and update the rules of behavior [Assignment: organization-defined frequency].}&{P}&{Y}&{Need new AUP} \\ \hline
761+
d. Review and update the rules of behavior [Assignment: organization-defined frequency].}&{V}&{Y}&{Need new AUP} \\ \hline
762762
{3.16. System and Services Acquisition}&&& \\ \hline
763763
{03.16.01 Security Engineering Principles
764764

@@ -782,19 +782,18 @@
782782

783783
b. Review and update the supply chain risk management plan [Assignment: organization-defined frequency].
784784

785-
c. Protect the supply chain risk management plan from unauthorized disclosure.}&{N}&{N}&{Not applicable for this project.} \\ \hline
785+
c. Protect the supply chain risk management plan from unauthorized disclosure.}&{N}&{W}&{Not applicable for this project.} \\ \hline
786786
{03.17.02 Acquisition Strategies, Tools, and Methods
787787

788-
Develop and implement acquisition strategies, contract tools, and procurement methods to identify, protect against, and mitigate supply chain risks. }&{N}&{N}&{Not applicable for this project.} \\ \hline
788+
Develop and implement acquisition strategies, contract tools, and procurement methods to identify, protect against, and mitigate supply chain risks. }&{N}&{W}&{Not applicable for this project.} \\ \hline
789789
{03.17.03 Supply Chain Requirements and Processes
790790

791791
a. Establish a process for identifying and addressing weaknesses or deficiencies in the supply chain elements and processes.
792792

793-
b. Enforce the following security requirements to protect against supply chain risks to the system, system components, or system services and to limit the harm or consequences from supply chain-related events: [Assignment: organization- defined security requirements].}&{N}&{N}&{Not applicable for this project.} \\ \hline
793+
b. Enforce the following security requirements to protect against supply chain risks to the system, system components, or system services and to limit the harm or consequences from supply chain-related events: [Assignment: organization- defined security requirements].}&{N}&{W}&{Not applicable for this project.} \\ \hline
794794
\textbf{Total NIST800-171 requirements}&\textbf{}&\textbf{98}& \\ \hline
795-
\textbf{Total Rubin Intends to comply fully with }&\textbf{}&\textbf{91}& \\ \hline
796-
\textbf{Total Rubin Intends not to comply with }&\textbf{}&\textbf{5}& \\ \hline
797-
\textbf{Total Rubin Intends to partially comply with }&\textbf{}&\textbf{2}& \\ \hline
795+
\textbf{Total Rubin Intends to comply fully with }&\textbf{}&\textbf{94}& \\ \hline
798796
\textbf{Total Rubin Complies with in 2024}&\textbf{}&\textbf{84}& \\ \hline
799-
\textbf{Total Rubin Partially Complies with in 2024}&\textbf{}&\textbf{4}& \\ \hline
797+
\textbf{Total Rubin waivers requested }&\textbf{}&\textbf{4}& \\ \hline
798+
\textbf{Total Rubin variances in 2024}&\textbf{}&\textbf{5}& \\ \hline
800799
\end{longtable} \normalsize

0 commit comments

Comments
 (0)