Back

Use automated mechanisms in the training environment, where appropriate.


CONTROL ID
06752
CONTROL TYPE
Behavior
CLASSIFICATION
Preventive

SUPPORTING AND SUPPORTED CONTROLS




This Control directly supports the implied Control(s):
  • Establish, implement, and maintain an education methodology., CC ID: 06671

There are no implementation support Controls.


SELECTED AUTHORITY DOCUMENTS COMPLIED WITH




  • Implement a security awareness program that (1) focuses on the methods commonly used in intrusions that can be blocked through individual action, (2) is delivered in short online modules convenient for employees (3) is updated frequently (at least annually) to represent the latest attack techniques,… (Control 17.3, The CIS Critical Security Controls for Effective Cyber Defense, Version 6.0)
  • The records management training program can include computer-based presentations. (§ 6.4.2 ¶ 1(f), ISO 15489-2: 2001, Information and Documentation: Records management: Part 2: Guidelines)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2) ¶ 1, StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
  • The organization includes practical exercises in security training that reinforce training objectives. (AT-3(3) ¶ 1, StateRAMP Security Controls Baseline Summary High Sensitivity Level, Version 1.1)
  • The organization includes practical exercises in security training that reinforce training objectives. (AT-3(3) High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2) High Baseline Controls, FedRAMP Baseline Security Controls, 8/28/2018)
  • Provide an incident response training environment using [Assignment: organization-defined automated mechanisms]. (IR-2(2) ¶ 1, FedRAMP Security Controls High Baseline, Version 5)
  • Provide an incident response training environment using [Assignment: organization-defined automated mechanisms]. (IR-2(2) ¶ 1, Control Baselines for Information Systems and Organizations, NIST SP 800-53B, High Impact Baseline, October 2020)
  • Provide practical exercises in literacy training that simulate events and incidents. (AT-2(1) ¶ 1, Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations, NIST Special Publication 800-161, Revision 1, Appendix A, C-SCRM Level 2 Controls)
  • Include practical exercises in awareness training for [Assignment: organization-defined roles] that are aligned with current threat scenarios and provide feedback to individuals involved in the training and their supervisors. (3.2.2e, Enhanced Security Requirements for Protecting Controlled Unclassified Information, NIST SP 800-172)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2) ¶ 1 High Baseline Controls, Guide to Industrial Control Systems (ICS) Security, Revision 2)
  • The organization should include exercises that simulate actual cyber attacks in the security awareness briefings. (SG.AT-2 Additional Considerations A2, NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, August 2010)
  • The organization should use automated mechanisms for a realistic training environment. (SG.IR-3 Additional Considerations A2, NISTIR 7628 Guidelines for Smart Grid Cyber Security: Vol. 1, Smart Grid Cyber Security Strategy, Architecture, and High-Level Requirements, August 2010)
  • The organization should use automated mechanisms to provide a more thorough and realistic training environment. (App F § IR-2(2), Recommended Security Controls for Federal Information Systems, NIST SP 800-53)
  • The organization should use automated mechanisms to provide more effective tests and exercises of the incident response capability. (App F § IR-3(1), Recommended Security Controls for Federal Information Systems, NIST SP 800-53)
  • The organization should develop Security Awareness Training that includes simulation of actual cyber attacks. (App F § AT-2(1), Recommended Security Controls for Federal Information Systems, NIST SP 800-53)
  • The organization includes practical exercises in security awareness training that simulate actual cyber attacks. (AT-2(1), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • The organization includes practical exercises in security training that reinforce training objectives. (AT-3(3), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • The organization employs automated mechanisms to more thoroughly and effectively test the incident response capability. (IR-3(1), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Deprecated, Revision 4, Deprecated)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2), Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Deprecated, Revision 4, Deprecated)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2) ¶ 1, Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, High Impact Baseline, Revision 4)
  • The organization includes practical exercises in security training that reinforce training objectives. (AT-3(3) ¶ 1, Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment. (IR-2(2) ¶ 1, Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • The organization includes practical exercises in security awareness training that simulate actual cyber attacks. (AT-2(1) ¶ 1, Security and Privacy Controls for Federal Information Systems and Organizations, NIST SP 800-53, Revision 4)
  • Provide practical exercises in literacy training that simulate events and incidents. (AT-2(1) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Provide practical exercises in security and privacy training that reinforce training objectives. (AT-3(3) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Provide an incident response training environment using [Assignment: organization-defined automated mechanisms]. (IR-2(2) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5)
  • Provide practical exercises in literacy training that simulate events and incidents. (AT-2(1) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
  • Provide practical exercises in security and privacy training that reinforce training objectives. (AT-3(3) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)
  • Provide an incident response training environment using [Assignment: organization-defined automated mechanisms]. (IR-2(2) ¶ 1, Security and Privacy Controls for Information Systems and Organizations, NIST SP 800-53, Revision 5.1.1)