14.6: Protect Information Through Access Control Lists

Protect all information stored on systems with file system, network share, claims, application, or database specific access control lists. These controls will enforce the principle that only authorized individuals should have access to the information based on their need to access the information as a part of their responsibilities.

Asset Type

Security Function

Implementation Groups

Data

Protect

1, 2, 3

Dependencies

  • Sub-control 1.4: Maintain Detailed Asset Inventory

  • Sub-control 1.5: Maintain Asset Inventory Information

  • Sub-control 5.1: Establish Secure Configurations

Inputs

  1. Endpoint Inventory

  2. Access control configuration policy

Operations

  1. For each endpoint in Input 1, collect the “ground truth” access policy for that endpoint and compare it to the access control configuration policy in Input 2. Generate a list of endpoints which comply with the specified access control configuration policy (M1) and a list of endpoints that do not comply with the specified policy (M2)

Measures

  • M1 = List of endpoints that comply with access control configuration policy (compliant list)

  • M2 = List of endpoints that do not comply with access control configuration policy (non-compliant list)

  • M3 = Count of endpoints in M1 (number of compliant endpoints)

  • M4 = Count of endpoints in M2 (number of non-compliant endpoints)

  • M5 = Count of endpoints in Input 1 (total number of endpoints to check)

Metrics

Coverage

Metric

What is the percentage of endpoints which are compliant with the organization’s
access control policy?

Calculation

M3 / M5