13.2: Remove Sensitive Data or Systems Not Regularly Accessed by Organization

Remove sensitive data or systems not regularly accessed by the organization from the network. These systems shall only be used as stand-alone systems (disconnected from the network) by the business unit needing to occasionally use the system or completely virtualized and powered off until needed.

Asset Type

Security Function

Implementation Groups

Data

Protect

1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 13.1: Maintain an Inventory of Sensitive Information

Inputs

  1. List of sensitive systems (ideally using the endpoint inventory; see sub-control 1.4)

  2. The access frequency for any sensitive systems

  3. An organizationally-defined access frequency threshold

Assumptions

  • Access to sensitive data takes place through some system, therefore the system, when processing, storing, or transmitting sensitive data, is a sensitive system.

  • Isolation/exposure score of zero is assumed ideal

Operations

  1. Determine subset of sensitive systems that are infrequently used (using all Inputs)

  2. For each infrequently used sensitive system, calculate isolation/exposure

Measures

  • M1 = List of all systems used to process sensitive information

  • M2 = Count of M1

  • M3 = Set of infrequently used sensitive systems

  • M4 = Count of infrequently used sensitive systems

  • M5 = List of infrequently used sensitive systems with isolation/exposure scores greater than 0

  • M6 = Count of M4

Metrics

Coverage

Metric

What percentage of infrequently used sensitive systems are not properly isolated?

Calculation

M6 / M4