When software programs in a network are unmanaged, or unidentified, they are vulnerable to attacks, and the programs can be used as a persistent platform from which to attack components on a network. To address these vulnerabilities, NIST and DHS researchers have developed an automated process to assess the effectiveness of the security controls that provide the information security capability known as Software Asset Management (SWAM). The focus of the SWAM capability is to manage risk created by unmanaged or unauthorized programs that are on a network.
A newly released draft document, called NIST Interagency Report (NISTIR) 8011 Volume 3, Automation Support for Security Control Assessments, Software Asset Management, provides an operational approach for automating security control assessments to manage software download and installation and/or the execution of unauthorized and/or malicious software (malware). This approach is consistent with the NIST Risk Management Framework as described in NIST SP 800-37 and the guidance in NIST SPs 800-53 and 800-53A in particular.
NISTIR 8011 will ultimately consist of 13 volumes. Volumes 1 and 2 were published in 2017. Volume 3 provides details specific to the software asset management security capability. The remaining 10 ISCM security capability volumes will provide details specific to each capability but will be organized in a very similar way to Volumes 2 and 3.
Public comment period is open through May 4th 2018.
Please submit public comments to sec-cert@nist.gov. Comments are accepted in any desired format.
Security and Privacy: asset management, assurance, controls assessment, risk assessment, security automation, security controls, system authorization
Technologies: software & firmware
Laws and Regulations: Federal Information Security Modernization Act, OMB Circular A-130