SIMP SCTM

This SCTM was developed based on the National Institute of Standards and Technology (NIST) Specical Publication 800-53 (Revision 3) controls that SIMP currently meets. Empty contents means SIMP does not meet that control. Implementations are free to take these tables and use them as a starting point for any accreditation activities that follow NIST 800-53.

SIMP SCTM Technical Controls

Table: SIMP SCTM

SIMP SCTM Operational Controls

Control ID Control Name Control Family SIMP Implementation Method
AT-1 Security Awareness and Training Policy and Procedures Awareness and Training  
AT-2(1) Security Awareness (Control Enhancement) Awareness and Training  
AT-3 Security Training Awareness and Training  
AT-3(1) Security Training (Control Enhancement) Awareness and Training  
AT-3(2) Security Training (Control Enhancement) Awareness and Training  
AT-4 Security Training Records Awareness and Training  
AT-5 Contacts with Security Groups and Associations Awareness and Training  
CM-1 Configuration Management Policy and Procedures Configuration Management  
CM-2 Baseline Configuration Configuration Management SIMP has strictly enforced version control during development. The baseline files for SIMP are kept and maintained in a git repository. Files are packaged and a series of auto tests are performed on each release. Once released, there is a version number associated for distribution. Additionally, custom puppet modules are in the form of RPMs and have version numbers associated with them. All documentation is also built with source code.
CM-2(1) Baseline Configuration (Control Enhancement) Configuration Management  
CM-2(2) Baseline Configuration (Control Enhancement) Configuration Management SIMP has strictly enforced version control during development. The baseline files for SIMP are kept and maintained in a git repository. Files are packaged and a series of auto tests are performed on the release. Once released, there is a version number associated for distribution. All documentation is also built with source code.
CM-2(3) Baseline Configuration (Control Enhancement) Configuration Management All old versions of SIMP remain in the code repository.
CM-2(4) Baseline Configuration (Control Enhancement) Configuration Management  
CM-2(5) Baseline Configuration (Control Enhancement) Configuration Management
  1. SIMP provides a minimal list of packages and services installed. The minimal list of packages can be found in kickstart files and the appendix of this document. Additional packages are installed by each implementation or as SIMP modules are applied. b. It’s not feasible to technically deny additional applications from being installed. There is nothing in SIMP that can stop and RPM from being applied. Applications that require network access to service activation must be registered with puppet.
CM-2(6) Baseline Configuration (Control Enhancement) Configuration Management As a project, SIMP is developmental only. The environments where it is tested is up to the implementation. Development testing is performed on SIMP in environments that have a code base frozen.
CM-3 Configuration Change Control Configuration Management  
CM-3(1) Configuration Change Control (Control Enhancement) Configuration Management  
CM-3(2) Configuration Change Control (Control Enhancement) Configuration Management  
CM-3(3) Configuration Change Control (Control Enhancement) Configuration Management Configuration changes in SIMP are automated using a combination of puppet, yum, and rsync. While not all files on an operating system are managed by those mechanisms, many are. Changes to critical files that are managed by puppet, revert back to their original state. These mechanisms were not meant to defeat an attack by a malicious insider.
CM-3(4) Configuration Change Control (Control Enhancement) Configuration Management  
CM-4 Security Impact Analysis Configuration Management All features or bugs in SIMP are vetted through the development process by being placed on the product backlog and discussed with the entire team. There is a security representative on the SIMP team that is part of that vetting process.
CM-4(1) Security Impact Analysis (Control Enhancement) Configuration Management  
CM-4(2) Security Impact Analysis (Control Enhancement) Configuration Management  
CM-5 Access Restrictions for Change Configuration Management SIMP can only meet the enforcement part of this control. The remainder must be met by the environment that SIMP is implemented in. Changes to a SIMP based systems are enforced with built in Unix/LDAP groups. Only someone with sudo or sudosh access (usually an admin group) can apply changes to the environment
CM-5(1) Access Restrictions for Change (Control Enhancement) Configuration Management SIMP can only meet the enforcement part of this control. The remainder must be met by the environment that SIMP is implemented in. Changes to a SIMP based systems are enforced with built in Unix/LDAP groups. Only someone with sudo or sudosh access (usually an admin group) can apply changes to the environment
CM-5(2) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(3) Access Restrictions for Change (Control Enhancement) Configuration Management Redhat and Centos packages are signed with gpg keys. Those keys are vendor specific. Package installation occurs only when those gpgkeys are validate using the installed gpg public keys for the operating system. SIMP specific RPMS that were developed are signed using keys generate by the development team.
CM-5(4) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(5) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(6) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(7) Access Restrictions for Change (Control Enhancement) Configuration Management Most of the critical files that are managed by puppet cannot be permanently changed on a puppet client without disabling puppet and rsync. If they are changed, puppet will revert them back to their original state.
CM-6 Configuration Settings Configuration Management Part “d” of this control is met my SIMP. The others are not. SIMP uses puppet to monitor changes to configuration settings. If changes to puppet controlled settings are manually made, they revert back to their original state.
CM-6(1) Configuration Settings (Control Enhancement) Configuration Management The puppet master is the central point of management for a SIMP system. While not required, the puppet master usually hosts a kickstart server so that clients are built the same every time.
CM-6(2) Configuration Settings (Control Enhancement) Configuration Management Puppet is not intended to be a security mechanism to prevent unauthorized changes to files. For files that are managed by puppet that changed, they will revert back to their original state. This control is really about protecting from unauthorized changes so access control to the puppet master should suffice to meet it. Changes to files are audited using auditd. Puppet changes are also audited. It’s up to the implementation to perform altering on those changes.
CM-6(3) Configuration Settings (Control Enhancement) Configuration Management This control is not fully met by SIMP. It’s important to point out that SIMP does provide logging of events to syslog. It’s currently up to the implementation to alert on those events.
CM-7 Least Functionality Configuration Management There isn’t an explicit list of services that SIMP denies. Instead, it was built to provide only the essential functionality. Additional services get added only as needed.
CM-7(1) Least Functionality (Control Enhancement) Configuration Management  
CM-7(2) Least Functionality (Control Enhancement) Configuration Management Applications can be installed, but new services will not run unless first registered with puppet. Additionally, puppet modules must be modified to ensure that IPtables opens up the necessary services. Minimally, for a service to remain active, it must be registered with puppet or the svckill.rb script will stop them.To be clear, there is nothing in SIMP that prevents the installation of RPMs (from the command line or YUM).
CM-7(3) Least Functionality (Control Enhancement) Configuration Management The registration process for ports, protocols, and services are handled via puppet.
CM-8 Information System Component Inventory Configuration Management  
CM-8(1) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(2) Information System Component Inventory (Control Enhancement) Configuration Management To the extent possible, puppet tracks clients that are within it’s control. It’s not meant to be a true inventory mechanism.
CM-8(3) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(4) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(5) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(6) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-9 Configuration Management Plan Configuration Management  
CM-9(1) Configuration Management Plan (Control Enhancement) Configuration Management  
CP-1 Contingency Planning Policy and Procedures Contingency Planning  
CP-2 Contingency Plan Contingency Planning  
CP-2(1) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(2) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(3) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(4) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(5) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(6) Contingency Plan (Control Enhancement) Contingency Planning  
CP-3 Contingency Training Contingency Planning  
CP-3(1) Contingency Training (Control Enhancement) Contingency Planning  
CP-3(2) Contingency Training (Control Enhancement) Contingency Planning  
CP-4 Contingency Plan Testing and Exercises Contingency Planning  
CP-4(1) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-4(2) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-4(3) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-6 Alternate Storage Site Contingency Planning  
CP-6(1) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-6(2) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-6(3) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-7 Alternate Processing Site Contingency Planning  
CP-7(1) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(2) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(3) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(4) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(5) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-8 Telecommunications Services Contingency Planning  
CP-8(1) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(2) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(3) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(4) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-9 Information System Backup Contingency Planning The BackupPC module is not currently available in SIMP 5.0.
CP-9(1) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(2) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(3) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(5) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(6) Information System Backup (Control Enhancement) Contingency Planning  
CP-10 Information System Recovery and Reconstitution Contingency Planning The BackupPC module is not currently available in SIMP 5.0.
CP-10(1) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(2) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(3) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(4) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(5) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(6) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
IR-1 Incident Response Policy and Procedures Incident Response  
IR-2 Incident Response Training Incident Response  
IR-2(1) Incident Response Training (Control Enhancement) Incident Response  
IR-2(2) Incident Response Training (Control Enhancement) Incident Response  
IR-3 Incident Response Testing and Exercises Incident Response  
IR-3(1) Incident Response Testing and Exercises (Control Enhancement) Incident Response  
IR-4 Incident Handling Incident Response  
IR-4(1) Incident Handling (Control Enhancement) Incident Response  
IR-4(2) Incident Handling (Control Enhancement) Incident Response If an implementation chooses, they can leverage puppet’s ability to reconfigure systems as part of incident response. While puppet is not intended to be a security product, its features can help provide security functionality such as dynamic reconfigurations.
IR-4(3) Incident Handling (Control Enhancement) Incident Response  
IR-4(4) Incident Handling (Control Enhancement) Incident Response  
IR-4(5) Incident Handling (Control Enhancement) Incident Response  
IR-5 Incident Monitoring Incident Response  
IR-5(1) Incident Monitoring (Control Enhancement) Incident Response  
IR-6 Incident Reporting Incident Response  
IR-6(1) Incident Reporting (Control Enhancement) Incident Response  
IR-6(2) Incident Reporting (Control Enhancement) Incident Response  
IR-7 Incident Response Assistance Incident Response  
IR-7(1) Incident Response Assistance (Control Enhancement) Incident Response  
IR-8 Incident Response Plan Incident Response  
MA-1 System Maintenance Policy and Procedures Maintenance  
MA-2 Controlled Maintenance Maintenance  
MA-2(1) Controlled Maintenance (Control Enhancement) Maintenance  
MA-2(2) Controlled Maintenance (Control Enhancement) Maintenance  
MA-3 Maintenance Tools Maintenance  
MA-3(1) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(2) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(3) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(4) Maintenance Tools (Control Enhancement) Maintenance  
MA-4 Non-Local Maintenance Maintenance Remote maintenance can be performed on SIMP using SSH or direct console access. SSH sessions are tracked and logged using the security features built into SIMP. Console access requires someone to have access to the physical (or virtual) console along with the root password. Auditing of those actions also occurs in accordance with the configured audit policy. It’s up to the implementation to decide how to distribute authentication information for remote maintenance.
MA-4(1) Non-Local Maintenance (Control Enhancement) Maintenance Remote maintenance can be performed on SIMP using SSH or direct console access. SSH sessions are tracked and logged using the security features built into SIMP. Console access requires someone to have access to the physical (or virtual) console along with the root password. Audting of those actions also occurs in accordance with the configured audit policy. It’s up to the implementation to decide how to distribute authentication information for remote maintenance
MA-4(2) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(3) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(4) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(5) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(6) Non-Local Maintenance (Control Enhancement) Maintenance Remote maintenance is performed using SSH. SSH inherently provides confidentiality and integrity of data while in transit.
MA-4(7) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-5 Maintenance Personnel Maintenance  
MA-5(1) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(2) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(3) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(4) Maintenance Personnel (Control Enhancement) Maintenance  
MA-6 Timely Maintenance Maintenance  
MP-1 Media Protection Policy and Procedures Media Protection  
MP-2 Media Access Media Protection  
MP-2(1) Media Access (Control Enhancement) Media Protection  
MP-2(2) Media Access (Control Enhancement) Media Protection  
MP-4 Media Storage Media Protection  
MP-5 Media Transport Media Protection  
MP-5(1) Media Transport (Control Enhancement) Media Protection  
MP-5(2) Media Transport (Control Enhancement) Media Protection  
MP-5(3) Media Transport (Control Enhancement) Media Protection  
MP-5(4) Media Transport (Control Enhancement) Media Protection  
MP-6 Media Sanitization Media Protection  
MP-6(1) Media Sanitization (Control Enhancement) Media Protection  
MP-6(2) Media Sanitization (Control Enhancement) Media Protection  
MP-6(3) Media Sanitization (Control Enhancement) Media Protection  
MP-6(4) Media Sanitization (Control Enhancement) Media Protection  
MP-6(5) Media Sanitization (Control Enhancement) Media Protection  
MP-6(6) Media Sanitization (Control Enhancement) Media Protection  
PE-1 Physical and Environmental Protection Policy and Procedures Physical and Environmental Protection  
PE-2 Physical Access Authorizations Physical and Environmental Protection  
PE-2(1) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-2(2) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-2(3) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-3 Physical Access Control Physical and Environmental Protection  
PE-3(1) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(2) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(3) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(4) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(5) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(6) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-4 Access Control for Transmission Medium Physical and Environmental Protection  
PE-5 Access Control for Output Devices Physical and Environmental Protection  
PE-6 Monitoring Physical Access Physical and Environmental Protection  
PE-6(1) Monitoring Physical Access (Control Enhancement) Physical and Environmental Protection  
PE-6(2) Monitoring Physical Access (Control Enhancement) Physical and Environmental Protection  
PE-7 Visitor Control Physical and Environmental Protection  
PE-7(1) Visitor Control (Control Enhancement) Physical and Environmental Protection  
PE-7(2) Visitor Control (Control Enhancement) Physical and Environmental Protection  
PE-8 Access Records Physical and Environmental Protection  
PE-8(1) Access Records (Control Enhancement) Physical and Environmental Protection  
PE-8(2) Access Records (Control Enhancement) Physical and Environmental Protection  
PE-9 Power Equipment and Power Cabling Physical and Environmental Protection  
PE-9(1) Power Equipment and Power Cabling (Control Enhancement) Physical and Environmental Protection  
PE-9(2) Power Equipment and Power Cabling (Control Enhancement) Physical and Environmental Protection  
PE-10 Emergency Shutoff Physical and Environmental Protection  
PE-10(1) Emergency Shutoff (Control Enhancement) Physical and Environmental Protection  
PE-11 Emergence Power Physical and Environmental Protection  
PE-11(1) Emergence Power (Control Enhancement) Physical and Environmental Protection  
PE-11(2) Emergence Power (Control Enhancement) Physical and Environmental Protection  
PE-12 Emergency Lighting Physical and Environmental Protection  
PE-12(1) Emergency Lighting (Control Enhancement) Physical and Environmental Protection  
PE-13 Fire Protection Physical and Environmental Protection  
PE-13(1) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(2) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(3) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(4) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-14 Temperature and Humidity Controls Physical and Environmental Protection  
PE-14(1) Temperature and Humidity Controls (Control Enhancement) Physical and Environmental Protection  
PE-14(2) Temperature and Humidity Controls (Control Enhancement) Physical and Environmental Protection  
PE-15 Water Damage Protection Physical and Environmental Protection  
PE-15(1) Water Damage Protection (Control Enhancement) Physical and Environmental Protection  
PE-16 Delivery and Removal Physical and Environmental Protection  
PE-17 Alternate Work Site Physical and Environmental Protection  
PE-18 Location of Information System Components Physical and Environmental Protection  
PE-18(1) Location of Information System Components (Control Enhancement) Physical and Environmental Protection  
PE-19 Information Leakage Physical and Environmental Protection  
SI-1 System and Information Integrity Policy and Procedures System and Information Integrity  
SI-2(1) Flaw Remediation (Control Enhancement) System and Information Integrity Patches that are part of the software base for SIMP are tested within the development environment. There is automated testing that is constantly being extended to test more features. There are times that patches to the base operating system (Centos or RedHat) are needed to resolve issues in SIMP. Those are also tested at build time, but require additional testing by implementations as patches are released from vendors. It’s also important to note that SIMP is packaged and delivered decoupled with the operating system source files. It’s up to the implementation to test vendor specific patches that are not part of the SIMP code base. Flaws are tracked using the software project management tool Redmine.
SI-2(2) Flaw Remediation (Control Enhancement) System and Information Integrity  
SI-2(3) Flaw Remediation (Control Enhancement) System and Information Integrity  
SI-2(4) Flaw Remediation (Control Enhancement) System and Information Integrity SIMP uses the yellowdog update manager (YUM) to deliver software patches to clients. Each installation usually has at least one YUM repository. There is also a cronjob running that runs once per day. It’s the responsibility of the implementation to get patches to the yum server. Once they are there, the cron job will perform a yum update and the patches will be applied.
SI-3 Malicious Code Protection System and Information Integrity SIMP has modules available for mcafee and ClamAV. The ClamAV. Implementations need need to provide their own version of the mcafee software for the module to work. That module comes with the ability to sync dat updates to clients via rsync. The modulde does NOT specify how often and what files systems should be scanned. SIMP also implements the open source tool chkrootkit that comes installed by default.
SI-3(1) Malicious Code Protection (Control Enhancement) System and Information Integrity The provided anti-virus modules are installed via puppet modules. Those modules include the ability to sycn data file updates via rsync. Therefore, all management of malicious code detection is done centrally.
SI-3(2) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(3) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(4) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(5) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(6) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-4 Information System Monitoring Tools and Techniques System and Information Integrity  
SI-4(1) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(2) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(3) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(4) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(5) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(6) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(7) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(8) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(9) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(10) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(11) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(12) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(13) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(14) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(15) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(16) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(17) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-5 System Alerts, Advisories, and Directives System and Information Integrity The only part of the control (a) that is met by SIMP, is the tracking of security alerts for products that are part of the code base. The development team subscribes to message boards for the main products (puppet) that are part of the packaging. RedHat/Centos advisories are also tracked out of necessity but since ALL the OS files are not part of SIMP delivery, patches are not our direct responsibility.
SI-5(1) System Alerts, Advisories, and Directives (Control Enhancement) System and Information Integrity  
SI-6 Security Functionality Verification System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide (the checks for RHEL 7 are not yet complete/finalized). Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(1) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(2) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(3) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-7 Software and Information Integrity System and Information Integrity SIMP comes with AIDE installed. Puppet also serves the purpose of checking the integrity of files. During each client run, a change in file integrity means the file needs to be restored to it’s original state.
SI-7(1) Software and Information Integrity (Control Enhancement) System and Information Integrity AIDE baselines are not performed beyond initial install unless otherwise configured. Implementations can re-baseline the database.
SI-7(2) Software and Information Integrity (Control Enhancement) System and Information Integrity  
SI-7(3) Software and Information Integrity (Control Enhancement) System and Information Integrity AIDE is managed by puppet and is therefore centrally managed.
SI-7(4) Software and Information Integrity (Control Enhancement) System and Information Integrity  
SI-8 Spam Protection System and Information Integrity  
SI-8(1) Spam Protection (Control Enhancement) System and Information Integrity  
SI-8(2) Spam Protection (Control Enhancement) System and Information Integrity  
SI-9 Information Input Restrictions System and Information Integrity  
SI-10 Information Input Validation System and Information Integrity  
SI-11 Error Handling System and Information Integrity  
SI-13 Predictable Failure Prevention System and Information Integrity  
SI-13(1) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(2) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(3) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(4) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  

Table: SIMP SCTM

SIMP SCTM Management Controls

Control ID Control Name Control Family SIMP Implementation Method
AT-1 Security Awareness and Training Policy and Procedures Awareness and Training  
AT-2(1) Security Awareness (Control Enhancement) Awareness and Training  
AT-3 Security Training Awareness and Training  
AT-3(1) Security Training (Control Enhancement) Awareness and Training  
AT-3(2) Security Training (Control Enhancement) Awareness and Training  
AT-4 Security Training Records Awareness and Training  
AT-5 Contacts with Security Groups and Associations Awareness and Training  
CM-1 Configuration Management Policy and Procedures Configuration Management  
CM-2 Baseline Configuration Configuration Management SIMP has strictly enforced version control during development. The baseline files for SIMP are kept and maintained in a git repository. Files are packaged and a series of auto tests are performed on each release. Once released, there is a version number associated for distribution. Additionally, custom puppet modules are in the form of RPMs and have version numbers associated with them. All documentation is also built with source code.
CM-2(1) Baseline Configuration (Control Enhancement) Configuration Management  
CM-2(2) Baseline Configuration (Control Enhancement) Configuration Management SIMP has strictly enforced version control during development. The baseline files for SIMP are kept and maintained in a git repository. Files are packaged and a series of auto tests are performed on the release. Once released, there is a version number associated for distribution. All documentation is also built with source code.
CM-2(3) Baseline Configuration (Control Enhancement) Configuration Management All old versions of SIMP remain in the code repository.
CM-2(4) Baseline Configuration (Control Enhancement) Configuration Management  
CM-2(5) Baseline Configuration (Control Enhancement) Configuration Management
  1. SIMP provides a minimal list of packages and services installed. The minimal list of packages can be found in kickstart files and the appendix of this document. Additional packages are installed by each implementation or as SIMP modules are applied. b. It’s not feasible to technically deny additional applications from being installed. There is nothing in SIMP that can stop and RPM from being applied. Applications that require network access to service activation must be registered with puppet.
CM-2(6) Baseline Configuration (Control Enhancement) Configuration Management As a project, SIMP is developmental only. The environments where it is tested is up to the implementation. Development testing is performed on SIMP in environments that have a code base frozen.
CM-3 Configuration Change Control Configuration Management  
CM-3(1) Configuration Change Control (Control Enhancement) Configuration Management  
CM-3(2) Configuration Change Control (Control Enhancement) Configuration Management  
CM-3(3) Configuration Change Control (Control Enhancement) Configuration Management Configuration changes in SIMP are automated using a combination of puppet, yum, and rsync. While not all files on an operating system are managed by those mechanisms, many are. Changes to critical files that are managed by puppet, revert back to their original state. These mechanisms were not meant to defeat an attack by a malicious insider.
CM-3(4) Configuration Change Control (Control Enhancement) Configuration Management  
CM-4 Security Impact Analysis Configuration Management All features or bugs in SIMP are vetted through the development process by being placed on the product backlog and discussed with the entire team. There is a security representative on the SIMP team that is part of that vetting process.
CM-4(1) Security Impact Analysis (Control Enhancement) Configuration Management  
CM-4(2) Security Impact Analysis (Control Enhancement) Configuration Management  
CM-5 Access Restrictions for Change Configuration Management SIMP can only meet the enforcement part of this control. The remainder must be met by the environment that SIMP is implemented in. Changes to a SIMP based systems are enforced with built in Unix/LDAP groups. Only someone with sudo or sudosh access (usually an admin group) can apply changes to the environment
CM-5(1) Access Restrictions for Change (Control Enhancement) Configuration Management SIMP can only meet the enforcement part of this control. The remainder must be met by the environment that SIMP is implemented in. Changes to a SIMP based systems are enforced with built in Unix/LDAP groups. Only someone with sudo or sudosh access (usually an admin group) can apply changes to the environment
CM-5(2) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(3) Access Restrictions for Change (Control Enhancement) Configuration Management Redhat and Centos packages are signed with gpg keys. Those keys are vendor specific. Package installation occurs only when those gpgkeys are validate using the installed gpg public keys for the operating system. SIMP specific RPMS that were developed are signed using keys generate by the development team.
CM-5(4) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(5) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(6) Access Restrictions for Change (Control Enhancement) Configuration Management  
CM-5(7) Access Restrictions for Change (Control Enhancement) Configuration Management Most of the critical files that are managed by puppet cannot be permanently changed on a puppet client without disabling puppet and rsync. If they are changed, puppet will revert them back to their original state.
CM-6 Configuration Settings Configuration Management Part “d” of this control is met my SIMP. The others are not. SIMP uses puppet to monitor changes to configuration settings. If changes to puppet controlled settings are manually made, they revert back to their original state.
CM-6(1) Configuration Settings (Control Enhancement) Configuration Management The puppet master is the central point of management for a SIMP system. While not required, the puppet master usually hosts a kickstart server so that clients are built the same every time.
CM-6(2) Configuration Settings (Control Enhancement) Configuration Management Puppet is not intended to be a security mechanism to prevent unauthorized changes to files. For files that are managed by puppet that changed, they will revert back to their original state. This control is really about protecting from unauthorized changes so access control to the puppet master should suffice to meet it. Changes to files are audited using auditd. Puppet changes are also audited. It’s up to the implementation to perform altering on those changes.
CM-6(3) Configuration Settings (Control Enhancement) Configuration Management This control is not fully met by SIMP. It’s important to point out that SIMP does provide logging of events to syslog. It’s currently up to the implementation to alert on those events.
CM-7 Least Functionality Configuration Management There isn’t an explicit list of services that SIMP denies. Instead, it was built to provide only the essential functionality. Additional services get added only as needed.
CM-7(1) Least Functionality (Control Enhancement) Configuration Management  
CM-7(2) Least Functionality (Control Enhancement) Configuration Management Applications can be installed, but new services will not run unless first registered with puppet. Additionally, puppet modules must be modified to ensure that IPtables opens up the necessary services. Minimally, for a service to remain active, it must be registered with puppet or the svckill.rb script will stop them.To be clear, there is nothing in SIMP that prevents the installation of RPMs (from the command line or YUM).
CM-7(3) Least Functionality (Control Enhancement) Configuration Management The registration process for ports, protocols, and services are handled via puppet.
CM-8 Information System Component Inventory Configuration Management  
CM-8(1) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(2) Information System Component Inventory (Control Enhancement) Configuration Management To the extent possible, puppet tracks clients that are within it’s control. It’s not meant to be a true inventory mechanism.
CM-8(3) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(4) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(5) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-8(6) Information System Component Inventory (Control Enhancement) Configuration Management  
CM-9 Configuration Management Plan Configuration Management  
CM-9(1) Configuration Management Plan (Control Enhancement) Configuration Management  
CP-1 Contingency Planning Policy and Procedures Contingency Planning  
CP-2 Contingency Plan Contingency Planning  
CP-2(1) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(2) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(3) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(4) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(5) Contingency Plan (Control Enhancement) Contingency Planning  
CP-2(6) Contingency Plan (Control Enhancement) Contingency Planning  
CP-3 Contingency Training Contingency Planning  
CP-3(1) Contingency Training (Control Enhancement) Contingency Planning  
CP-3(2) Contingency Training (Control Enhancement) Contingency Planning  
CP-4 Contingency Plan Testing and Exercises Contingency Planning  
CP-4(1) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-4(2) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-4(3) Contingency Plan Testing and Exercises (Control Enhancement) Contingency Planning  
CP-6 Alternate Storage Site Contingency Planning  
CP-6(1) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-6(2) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-6(3) Alternate Storage Site (Control Enhancement) Contingency Planning  
CP-7 Alternate Processing Site Contingency Planning  
CP-7(1) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(2) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(3) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(4) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-7(5) Alternate Processing Site (Control Enhancement) Contingency Planning  
CP-8 Telecommunications Services Contingency Planning  
CP-8(1) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(2) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(3) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-8(4) Telecommunications Services (Control Enhancement) Contingency Planning  
CP-9 Information System Backup Contingency Planning The BackupPC module is not currently available in SIMP 5.0.
CP-9(1) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(2) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(3) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(5) Information System Backup (Control Enhancement) Contingency Planning  
CP-9(6) Information System Backup (Control Enhancement) Contingency Planning  
CP-10 Information System Recovery and Reconstitution Contingency Planning The BackupPC module is not currently available in SIMP 5.0.
CP-10(1) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(2) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(3) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(4) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(5) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
CP-10(6) Information System Recovery and Reconstitution (Control Enhancement) Contingency Planning  
IR-1 Incident Response Policy and Procedures Incident Response  
IR-2 Incident Response Training Incident Response  
IR-2(1) Incident Response Training (Control Enhancement) Incident Response  
IR-2(2) Incident Response Training (Control Enhancement) Incident Response  
IR-3 Incident Response Testing and Exercises Incident Response  
IR-3(1) Incident Response Testing and Exercises (Control Enhancement) Incident Response  
IR-4 Incident Handling Incident Response  
IR-4(1) Incident Handling (Control Enhancement) Incident Response  
IR-4(2) Incident Handling (Control Enhancement) Incident Response If an implementation chooses, they can leverage puppet’s ability to reconfigure systems as part of incident response. While puppet is not intended to be a security product, its features can help provide security functionality such as dynamic reconfigurations.
IR-4(3) Incident Handling (Control Enhancement) Incident Response  
IR-4(4) Incident Handling (Control Enhancement) Incident Response  
IR-4(5) Incident Handling (Control Enhancement) Incident Response  
IR-5 Incident Monitoring Incident Response  
IR-5(1) Incident Monitoring (Control Enhancement) Incident Response  
IR-6 Incident Reporting Incident Response  
IR-6(1) Incident Reporting (Control Enhancement) Incident Response  
IR-6(2) Incident Reporting (Control Enhancement) Incident Response  
IR-7 Incident Response Assistance Incident Response  
IR-7(1) Incident Response Assistance (Control Enhancement) Incident Response  
IR-8 Incident Response Plan Incident Response  
MA-1 System Maintenance Policy and Procedures Maintenance  
MA-2 Controlled Maintenance Maintenance  
MA-2(1) Controlled Maintenance (Control Enhancement) Maintenance  
MA-2(2) Controlled Maintenance (Control Enhancement) Maintenance  
MA-3 Maintenance Tools Maintenance  
MA-3(1) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(2) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(3) Maintenance Tools (Control Enhancement) Maintenance  
MA-3(4) Maintenance Tools (Control Enhancement) Maintenance  
MA-4 Non-Local Maintenance Maintenance Remote maintenance can be performed on SIMP using SSH or direct console access. SSH sessions are tracked and logged using the security features built into SIMP. Console access requires someone to have access to the physical (or virtual) console along with the root password. Auditing of those actions also occurs in accordance with the configured audit policy. It’s up to the implementation to decide how to distribute authentication information for remote maintenance.
MA-4(1) Non-Local Maintenance (Control Enhancement) Maintenance Remote maintenance can be performed on SIMP using SSH or direct console access. SSH sessions are tracked and logged using the security features built into SIMP. Console access requires someone to have access to the physical (or virtual) console along with the root password. Auditing of those actions also occurs in accordance with the configured audit policy. It’s up to the implementation to decide how to distribute authentication information for remote maintenance
MA-4(2) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(3) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(4) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(5) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-4(6) Non-Local Maintenance (Control Enhancement) Maintenance Remote maintenance is performed using SSH. SSH inherently provides confidentiality and integrity of data while in transit.
MA-4(7) Non-Local Maintenance (Control Enhancement) Maintenance  
MA-5 Maintenance Personnel Maintenance  
MA-5(1) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(2) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(3) Maintenance Personnel (Control Enhancement) Maintenance  
MA-5(4) Maintenance Personnel (Control Enhancement) Maintenance  
MA-6 Timely Maintenance Maintenance  
MP-1 Media Protection Policy and Procedures Media Protection  
MP-2 Media Access Media Protection  
MP-2(1) Media Access (Control Enhancement) Media Protection  
MP-2(2) Media Access (Control Enhancement) Media Protection  
MP-4 Media Storage Media Protection  
MP-5 Media Transport Media Protection  
MP-5(1) Media Transport (Control Enhancement) Media Protection  
MP-5(2) Media Transport (Control Enhancement) Media Protection  
MP-5(3) Media Transport (Control Enhancement) Media Protection  
MP-5(4) Media Transport (Control Enhancement) Media Protection  
MP-6 Media Sanitization Media Protection  
MP-6(1) Media Sanitization (Control Enhancement) Media Protection  
MP-6(2) Media Sanitization (Control Enhancement) Media Protection  
MP-6(3) Media Sanitization (Control Enhancement) Media Protection  
MP-6(4) Media Sanitization (Control Enhancement) Media Protection  
MP-6(5) Media Sanitization (Control Enhancement) Media Protection  
MP-6(6) Media Sanitization (Control Enhancement) Media Protection  
PE-1 Physical and Environmental Protection Policy and Procedures Physical and Environmental Protection  
PE-2 Physical Access Authorizations Physical and Environmental Protection  
PE-2(1) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-2(2) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-2(3) Physical Access Authorizations (Control Enhancement) Physical and Environmental Protection  
PE-3 Physical Access Control Physical and Environmental Protection  
PE-3(1) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(2) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(3) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(4) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(5) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-3(6) Physical Access Control (Control Enhancement) Physical and Environmental Protection  
PE-4 Access Control for Transmission Medium Physical and Environmental Protection  
PE-5 Access Control for Output Devices Physical and Environmental Protection  
PE-6 Monitoring Physical Access Physical and Environmental Protection  
PE-6(1) Monitoring Physical Access (Control Enhancement) Physical and Environmental Protection  
PE-6(2) Monitoring Physical Access (Control Enhancement) Physical and Environmental Protection  
PE-7 Visitor Control Physical and Environmental Protection  
PE-7(1) Visitor Control (Control Enhancement) Physical and Environmental Protection  
PE-7(2) Visitor Control (Control Enhancement) Physical and Environmental Protection  
PE-8 Access Records Physical and Environmental Protection  
PE-8(1) Access Records (Control Enhancement) Physical and Environmental Protection  
PE-8(2) Access Records (Control Enhancement) Physical and Environmental Protection  
PE-9 Power Equipment and Power Cabling Physical and Environmental Protection  
PE-9(1) Power Equipment and Power Cabling (Control Enhancement) Physical and Environmental Protection  
PE-9(2) Power Equipment and Power Cabling (Control Enhancement) Physical and Environmental Protection  
PE-10 Emergency Shutoff Physical and Environmental Protection  
PE-10(1) Emergency Shutoff (Control Enhancement) Physical and Environmental Protection  
PE-11 Emergence Power Physical and Environmental Protection  
PE-11(1) Emergence Power (Control Enhancement) Physical and Environmental Protection  
PE-11(2) Emergence Power (Control Enhancement) Physical and Environmental Protection  
PE-12 Emergency Lighting Physical and Environmental Protection  
PE-12(1) Emergency Lighting (Control Enhancement) Physical and Environmental Protection  
PE-13 Fire Protection Physical and Environmental Protection  
PE-13(1) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(2) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(3) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-13(4) Fire Protection (Control Enhancement) Physical and Environmental Protection  
PE-14 Temperature and Humidity Controls Physical and Environmental Protection  
PE-14(1) Temperature and Humidity Controls (Control Enhancement) Physical and Environmental Protection  
PE-14(2) Temperature and Humidity Controls (Control Enhancement) Physical and Environmental Protection  
PE-15 Water Damage Protection Physical and Environmental Protection  
PE-15(1) Water Damage Protection (Control Enhancement) Physical and Environmental Protection  
PE-16 Delivery and Removal Physical and Environmental Protection  
PE-17 Alternate Work Site Physical and Environmental Protection  
PE-18 Location of Information System Components Physical and Environmental Protection  
PE-18(1) Location of Information System Components (Control Enhancement) Physical and Environmental Protection  
PE-19 Information Leakage Physical and Environmental Protection  
SI-1 System and Information Integrity Policy and Procedures System and Information Integrity  
SI-2(1) Flaw Remediation (Control Enhancement) System and Information Integrity Patches that are part of the software base for SIMP are tested within the development environment. There is automated testing that is constantly being extended to test more features. There are times that patches to the base operating system (Centos or RedHat) are needed to resolve issues in SIMP. Those are also tested at build time, but require additional testing by implementations as patches are released from vendors. It’s also important to note that SIMP is packaged and delivered decoupled with the operating system source files. It’s up to the implementation to test vendor specific patches that are not part of the SIMP code base. Flaws are tracked using the software project management tool Redmine.
SI-2(2) Flaw Remediation (Control Enhancement) System and Information Integrity  
SI-2(3) Flaw Remediation (Control Enhancement) System and Information Integrity  
SI-2(4) Flaw Remediation (Control Enhancement) System and Information Integrity SIMP uses the yellowdog update manager (YUM) to deliver software patches to clients. Each installation usually has at least one YUM repository. There is also a cronjob running that runs once per day. It’s the responsibility of the implementation to get patches to the yum server. Once they are there, the cron job will perform a yum update and the patches will be applied.
SI-3 Malicious Code Protection System and Information Integrity SIMP has modules available for mcafee and ClamAV. The ClamAV. Implementations need need to provide their own version of the mcafee software for the module to work. That module comes with the ability to sync dat updates to clients via rsync. The module does NOT specify how often and what files systems should be scanned. SIMP also implements the open source tool chkrootkit that comes installed by default.
SI-3(1) Malicious Code Protection (Control Enhancement) System and Information Integrity The provided anti-virus modules are installed via puppet modules. Those modules include the ability to sycn data file updates via rsync. Therefore, all management of malicious code detection is done centrally.
SI-3(2) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(3) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(4) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(5) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-3(6) Malicious Code Protection (Control Enhancement) System and Information Integrity  
SI-4 Information System Monitoring Tools and Techniques System and Information Integrity  
SI-4(1) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(2) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(3) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(4) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(5) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(6) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(7) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(8) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(9) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(10) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(11) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(12) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(13) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(14) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(15) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(16) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-4(17) Information System Monitoring Tools and Techniques (Control Enhancement) System and Information Integrity  
SI-5 System Alerts, Advisories, and Directives System and Information Integrity The only part of the control (a) that is met by SIMP, is the tracking of security alerts for products that are part of the code base. The development team subscribes to message boards for the main products (puppet) that are part of the packaging. RedHat/Centos advisories are also tracked out of necessity but since ALL the OS files are not part of SIMP delivery, patches are not our direct responsibility.
SI-5(1) System Alerts, Advisories, and Directives (Control Enhancement) System and Information Integrity  
SI-6 Security Functionality Verification System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide (the checks for RHEL 7 are not yet complete/finalized). Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(1) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(2) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-6(3) Security Functionality Verification (Control Enhancement) System and Information Integrity SIMP comes with an optional module to install and perform regular runs of the SCAP-Security-Guide. Doing so will report (for a user defined frequency) OVAL results of security settings of a host against SSG recommendations.
SI-7 Software and Information Integrity System and Information Integrity SIMP comes with AIDE installed. Puppet also serves the purpose of checking the integrity of files. During each client run, a change in file integrity means the file needs to be restored to it’s original state.
SI-7(1) Software and Information Integrity (Control Enhancement) System and Information Integrity AIDE baselines are not performed beyond initial install unless otherwise configured. Implementations can re-baseline the database.
SI-7(2) Software and Information Integrity (Control Enhancement) System and Information Integrity  
SI-7(3) Software and Information Integrity (Control Enhancement) System and Information Integrity AIDE is managed by puppet and is therefore centrally managed.
SI-7(4) Software and Information Integrity (Control Enhancement) System and Information Integrity  
SI-8 Spam Protection System and Information Integrity  
SI-8(1) Spam Protection (Control Enhancement) System and Information Integrity  
SI-8(2) Spam Protection (Control Enhancement) System and Information Integrity  
SI-9 Information Input Restrictions System and Information Integrity  
SI-10 Information Input Validation System and Information Integrity  
SI-11 Error Handling System and Information Integrity  
SI-13 Predictable Failure Prevention System and Information Integrity  
SI-13(1) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(2) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(3) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
SI-13(4) Predictable Failure Prevention (Control Enhancement) System and Information Integrity  
Control ID Control Name Control Family SIMP Implementation Method
Control ID Control Name Control Family SIMP Implementation Method
CA-1 Security Assessment and Authorization Policies Security Assessment and Authorization  
CA-2 Security Assessments Security Assessment and Authorization  
CA-2(1) Security Assessments (Control Enhancement) Security Assessment and Authorization  
CA-2(2) Security Assessments (Control Enhancement) Security Assessment and Authorization  
CA-3 Information System Connections Security Assessment and Authorization  
CA-3(1) Information System Connections (Control Enhancement) Security Assessment and Authorization  
CA-3(2) Information System Connections (Control Enhancement) Security Assessment and Authorization  
CA-5 Plan of Action and Milestones Security Assessment and Authorization  
CA-5(1) Plan of Action and Milestones (Control Enhancement) Security Assessment and Authorization  
CA-6 Security Authorization Security Assessment and Authorization  
CA-7 Continuous Monitoring Security Assessment and Authorization  
CA-7(1) Continuous Monitoring (Control Enhancement) Security Assessment and Authorization  
CA-7(2) Continuous Monitoring (Control Enhancement) Security Assessment and Authorization  
Pl-1 Security Planning Policy and Procedures Planning The SIMP installation manual provides instructions for the installation of the product in a manner that is compliant with a multitude of security controls.
PL-2 System Security Plan Planning Security Plans are provided for specific implementations. The SIMP team will continue to develop security documentation that can be used as s resource for implementation specific System Security Plans.
PL-2(1) System Security Plan (Control Enhancement) Planning TODO: Develop SIMP specific SSP.
PL-2(2) System Security Plan (Control Enhancement) Planning  
PL-4 Rules of Behavior Planning  
PL-4(1) Rules of Behavior (Control Enhancement) Planning  
PL-5 Privacy Impact Assessment Planning  
PL-6 Security-Related Activity Planning Planning  
PS-1 Personnel Security Policy and Procedures Planning  
PS-2 Position Categorization Planning  
PS-3(2) Personnel Screening (Control Enhancement) Planning  
RA-1 Risk Assessment Policy and Procedures Risk Assessment  
RA-2 Security Categorization Risk Assessment  
RA-3 Risk Assessment Risk Assessment  
RA-5 Vulnerability Scanning Risk Assessment The SIMP team performs a variety of security testing as part of the development process. Compliance and configuration checking is done using SSG. SIMP makes every effort to address problems discovered by these tools. Some configuration settings will not align with tools since the product was meant to be used for operational settings where some security features cause a loss in functionality. Implementations have the option of further hardening their system further at the risk of losing some functionality.
RA-5(1) Vulnerability Scanning (Control Enhancement) Risk Assessment SCAP-Security-Guide is the two primary tool used to check for suspected configuration errors. Puppet also continues to protect clients against unwanted changes.
RA-5(2) Vulnerability Scanning (Control Enhancement) Risk Assessment SCAP-Security-Guide is the two primary tool used to check for suspected configuration errors. Puppet also continues to protect clients against unwanted changes.
RA-5(3) Vulnerability Scanning (Control Enhancement) Risk Assessment Regular vulnerability scanning is performed during development of SIMP.
RA-5(4) Vulnerability Scanning (Control Enhancement) Risk Assessment Part of the vulnerability scanning process determines what information can be determined by a malicious outside user.
RA-5(5) Vulnerability Scanning (Control Enhancement) Risk Assessment The compliance tools require that privileged accounts be used to perform testing.
RA-5(6) Vulnerability Scanning (Control Enhancement) Risk Assessment  
RA-5(7) Vulnerability Scanning (Control Enhancement) Risk Assessment Only part of this requirement is met. SIMP can detect when any software is installed via auditd and syslog. Services that are not registered with puppet will not operate without user intervention. Those changes are also audited. SIMP does not provide the ability to alert on those actions, however, Logstash filters or Elasticsearch queries can be applied if needed.
RA-5(8) Vulnerability Scanning (Control Enhancement) Risk Assessment  
RA-5(9) Vulnerability Scanning (Control Enhancement) Risk Assessment  
SA-1 System and Services Acquisition Policy and Procedures System and Service Acquisition  
SA-2 Allocation of Resources System and Service Acquisition  
SA-3 Life Cycle Support System and Service Acquisition  
SA-4 Acquisitions System and Service Acquisition  
SA-4(1) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(2) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(3) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(4) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(5) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(6) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-4(7) Acquisitions (Control Enhancement) System and Service Acquisition  
SA-5 Information System Documentation System and Service Acquisition  
SA-5(1) Information System Documentation (Control Enhancement) System and Service Acquisition  
SA-5(2) Information System Documentation (Control Enhancement) System and Service Acquisition  
SA-5(3) Information System Documentation (Control Enhancement) System and Service Acquisition  
SA-5(4) Information System Documentation (Control Enhancement) System and Service Acquisition  
SA-5(5) Information System Documentation (Control Enhancement) System and Service Acquisition  
SA-6 Software Usage Restrictions System and Service Acquisition  
SA-6 (1) Software Usage Restrictions System and Service Acquisition  
SA-7 User Installed Software System and Service Acquisition  
SA-8 Security Engineering Principles System and Service Acquisition  
SA-9 External Information System Services System and Service Acquisition  
SA-9(1) External Information System Services (Control Enhancement) System and Service Acquisition  
SA-10 Developer Configuration Management System and Service Acquisition  
SA-10(1) Developer Configuration Management (Control Enhancement) System and Service Acquisition  
SA-10(2) Developer Configuration Management (Control Enhancement) System and Service Acquisition  
SA-11 Developer Security Testing System and Service Acquisition  
SA-11(1) Developer Security Testing (Control Enhancement) System and Service Acquisition  
SA-11(2) Developer Security Testing (Control Enhancement) System and Service Acquisition  
SA-11(3) Developer Security Testing (Control Enhancement) System and Service Acquisition  
SA-12 Supply Chain Protection System and Service Acquisition  
SA-12(1) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(2) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(3) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(4) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(5) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(6) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-12(7) Supply Chain Protection (Control Enhancement) System and Service Acquisition  
SA-13 Trustworthiness System and Service Acquisition  
SA-14 Critical Information System Components System and Service Acquisition  
SA-14(1) Critical Information System Components (Control Enhancement) System and Service Acquisition  

Table: Management Controls