2.10: Physically or Logically Segregate High Risk Applications

Physically or logically segregated systems should be used to isolate and run software that is required for business operations but incurs higher risk for the organization.

Asset Type

Security Function

Implementation Groups

Applications

Protect

3

Dependencies

  • Sub-control 2.1: Maintain Inventory of Authorized Software

Inputs

  1. List of approved high-risk applications (subset of Approved Software List). For each, include the mechanisms used to provide separation.

  2. Approved configuration(s) for each separation mechanism listed in Input 1

Operations

  1. For each application in Input 1, compare the configurations of the associated separation mechanisms to the appropriate approved configuration(s) from Input 2.
    1. Create a list of applications that are adequately separated noting which configuration(s) were checked (M1)

    2. Create a list of applications that are not adequately separated noting which configurations were checked and any deviations

Measures

  • M1 = List of high-risk applications that are properly segregated (compliant list)

  • M2 = List of high-risk applications that are not properly segregated (non-compliant list)

  • M3 = Count of high-risk applications that are properly segregated (count of M1)

  • M4 = The total number of approved high-risk applications (count of Input 1)

Metrics

Metric

The ratio of properly separated high-risk applications to the total number of high-risk
applications

Calculation

M3 / M4