<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Liatris</id>
	<title>Cooey Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://cooey.wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Liatris"/>
	<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Special:Contributions/Liatris"/>
	<updated>2026-05-01T08:42:27Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.42.3</generator>
	<entry>
		<id>https://cooey.wiki/index.php?title=SPA_Objectives_-_SIEM_Tool&amp;diff=146</id>
		<title>SPA Objectives - SIEM Tool</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=SPA_Objectives_-_SIEM_Tool&amp;diff=146"/>
		<updated>2025-09-25T13:30:54Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Created page with &amp;quot;== When is a SIEM an SPA? == A SIEM is an SPA when it ingests/aggregates logs from one or more CUI assets.  == Assessment Objectives to Assess == AU.L2-3.3.1 - SYSTEM AUDITING [c,d,f]  * A SIEM will shows audit records are created, contain the defined content, and are retained as defined.  AU.L2-3.3.2 - USER ACCOUNTABILITY [b]  * The SIEM will show that audit records contain the defined content necessary to trace users to their actions.  AU.L2-3.3.4 - AUDIT FAILURE ALERT...&amp;quot;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== When is a SIEM an SPA? ==&lt;br /&gt;
A SIEM is an SPA when it ingests/aggregates logs from one or more CUI assets.&lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives to Assess ==&lt;br /&gt;
AU.L2-3.3.1 - SYSTEM AUDITING [c,d,f]&lt;br /&gt;
&lt;br /&gt;
* A SIEM will shows audit records are created, contain the defined content, and are retained as defined.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.2 - USER ACCOUNTABILITY [b]&lt;br /&gt;
&lt;br /&gt;
* The SIEM will show that audit records contain the defined content necessary to trace users to their actions.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.4 - AUDIT FAILURE ALERTING [c]&lt;br /&gt;
&lt;br /&gt;
* A SIEM may be able to show that identified personnel/roles are alerted in an audit logging process failure.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.5 - AUDIT CORRELATION [b]&lt;br /&gt;
&lt;br /&gt;
* A SIEM can help show review, analysis, and reporting processes are correlated.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.6 - REDUCTION &amp;amp; REPORTING [a,b]&lt;br /&gt;
&lt;br /&gt;
* A SIEM can be used to show on-demand analysis and reporting of audit logs&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.8 - AUDIT PROTECTION [a-f]&lt;br /&gt;
&lt;br /&gt;
* The SIEM will show how audit information and tools are protected from unauthorized access, modification, and deletion.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.9 - AUDIT MANAGEMENT [b]&lt;br /&gt;
&lt;br /&gt;
* The SIEM would need to be shown to demonstrate that a subset of users have access to manage the SIEM.&lt;br /&gt;
&lt;br /&gt;
IR.L2-3.6.1 - INCIDENT HANDLING [c,d]&lt;br /&gt;
&lt;br /&gt;
* A SIEM will likely help support detection and analysis during an incident.&lt;br /&gt;
&lt;br /&gt;
SI.L2-3.14.6 - MONITOR COMMUNICATIONS FOR ATTACKS [a,b,c]&lt;br /&gt;
&lt;br /&gt;
* A SIEM can show that the system, inbound traffic, and outbound traffic are monitored to detect attacks.&lt;br /&gt;
&lt;br /&gt;
SI.L2-3.14.7 - IDENTIFY UNAUTHORIZED USE [b]&lt;br /&gt;
&lt;br /&gt;
* A SIEM will likely show that unauthorized use is identified.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives that won&#039;t likely be Assessed ==&lt;br /&gt;
AU.L2-3.3.3 - EVENT REVIEW&lt;br /&gt;
&lt;br /&gt;
* A SIEM will likely not contain evidence that event types to be logged are reviewed and updated.&lt;br /&gt;
&lt;br /&gt;
AU.L2-3.3.7 - AUTHORITATIVE TIME SOURCE&lt;br /&gt;
&lt;br /&gt;
* No AOs require a SIEM to demonstrate that an authoritative time source is selected and used.&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=144</id>
		<title>SPA Objectives - Password Manager</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=144"/>
		<updated>2025-09-09T20:41:44Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Flushed out AOs for Password Managers&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== When is a Password Manager an SPA? ==&lt;br /&gt;
When a password manager is organizationally managed or provisioned for use within the scope of the CUI information system then the password manager should be scoped as an SPA. &lt;br /&gt;
&lt;br /&gt;
When users choose to use a password manager (such as one built-in to their browser on their in-scope computers), then these are not considered an SPA, since the protection of the password is the responsibility of the user, not the organization.&lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives to Assess ==&lt;br /&gt;
IA.L2-3.5.10 - CRYPTOGRAPHICALLY-PROTECTED PASSWORDS [a, b]&lt;br /&gt;
&lt;br /&gt;
* Password manager will need to securely store the passwords [a] and securely transmit them [b]. &lt;br /&gt;
&lt;br /&gt;
PS.L2-3.9.2 – PERSONNEL ACTIONS [a,b]&lt;br /&gt;
&lt;br /&gt;
* Likely will be a component of the evidence for [a] and [b] but will not be the only evidence for these AOs.&lt;br /&gt;
&lt;br /&gt;
SC.L2-3.13.10 - KEY MANAGEMENT [b]&lt;br /&gt;
&lt;br /&gt;
* May be used to manage cryptographic keys if password manager provides said functionality. &lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives that Don&#039;t need to be Assessed ==&lt;br /&gt;
IA.L2-3.5.7 – PASSWORD COMPLEXITY [c, d]&lt;br /&gt;
&lt;br /&gt;
* Password complexity is typically enforced on the system containing CUI.&lt;br /&gt;
&lt;br /&gt;
IA.L2-3.5.8 – PASSWORD REUSE [b]&lt;br /&gt;
&lt;br /&gt;
* Password reuse is typically enforced on the system containing CUI.&lt;br /&gt;
&lt;br /&gt;
IA.L2-3.5.9 – TEMPORARY PASSWORDS [a]&lt;br /&gt;
&lt;br /&gt;
* Password manager wouldn&#039;t enforce temporary password changes on systems containing CUI, the system containing CUI would do the enforcement.&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=143</id>
		<title>SPA Objectives - Password Manager</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=SPA_Objectives_-_Password_Manager&amp;diff=143"/>
		<updated>2025-09-09T19:51:49Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Created page in draft form&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== When is a Password Manager an SPA? ==&lt;br /&gt;
When a password manager is organizationally managed or provisioned for use within the scope of the CUI information system then the password manager should be scoped as an SPA. &lt;br /&gt;
&lt;br /&gt;
When users choose to use a password manager (such as one built-in to their browser on their in-scope computers), then these are not considered an SPA, since the protection of the password is the responsibility of the user, not the organization.&lt;br /&gt;
&lt;br /&gt;
== Assessment Objectives to Assess ==&lt;br /&gt;
IA.L2-3.5.10 - CRYPTOGRAPHICALLY-PROTECTED PASSWORDS&lt;br /&gt;
&lt;br /&gt;
SC.L2-3.13.10 - KEY MANAGEMENT&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Objectives_to_Assess_for_SPAs&amp;diff=142</id>
		<title>Objectives to Assess for SPAs</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Objectives_to_Assess_for_SPAs&amp;diff=142"/>
		<updated>2025-09-09T19:31:23Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Created dead links to make pages when clicked.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL2v2.pdf CMMC Level 2 Scoping Guide] includes a table describing the CMMC Assessment Requirements for each category of asset. For Security Protection Assets the Assessment Requirements are:&amp;lt;blockquote&amp;gt;Assess against Level 2 security requirements that are relevant to the capabilities provided.&amp;lt;/blockquote&amp;gt;But what are the relevant security requirements for different types of SPAs? This page will try to answer that question.&lt;br /&gt;
&lt;br /&gt;
== SPA Types ==&lt;br /&gt;
&lt;br /&gt;
* [[SPA Objectives - Password Manager|Password Manager]]&lt;br /&gt;
* [[SPA Objectives - SIEM Tool|SIEM Tool]]&lt;br /&gt;
* [[SPA Objectives - MFA Provider|MFA Provider]]&lt;br /&gt;
* [[SPA Objectives - EDR/XDR Tool|EDR/XDR Tool]]&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Main_Page&amp;diff=141</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Main_Page&amp;diff=141"/>
		<updated>2025-09-09T19:29:40Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Added link to new page&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;== Main Wiki Pages ==&lt;br /&gt;
*[[CMMC Overview]]&lt;br /&gt;
*[[Self-Assessment and Certification]] (includes summary of the CAP v2.0!)&lt;br /&gt;
*[[CUI]]&lt;br /&gt;
*[[Resources and Tools for Compliance]]&lt;br /&gt;
*[[Preferred Partners]]&lt;br /&gt;
*[[Training and Education]] - (for CCA/CCP/LTP)&lt;br /&gt;
*[[FAQ|Frequently Asked Questions]]&lt;br /&gt;
*[[Objectives to Assess for SPAs]]&lt;br /&gt;
&lt;br /&gt;
== Hot Topics ==&lt;br /&gt;
&lt;br /&gt;
* [[32 CFR Part 170 Key Takeaways]] (aka &amp;quot;The CMMC Final Rule&amp;quot;)&lt;br /&gt;
* [[48 CFR Parts 204, 212, 217, and 252 Proposed Rule]]&lt;br /&gt;
* CMMC Assessment Procedure (CAP) v2.0&lt;br /&gt;
* ESPs, MSPs, CSPs&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Objectives_to_Assess_for_SPAs&amp;diff=140</id>
		<title>Objectives to Assess for SPAs</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Objectives_to_Assess_for_SPAs&amp;diff=140"/>
		<updated>2025-09-09T19:27:53Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Create Page based on Cooey COE discussion&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;The [https://dodcio.defense.gov/Portals/0/Documents/CMMC/ScopingGuideL2v2.pdf CMMC Level 2 Scoping Guide] includes a table describing the CMMC Assessment Requirements for each category of asset. For Security Protection Assets the Assessment Requirements are:&amp;lt;blockquote&amp;gt;Assess against Level 2 security requirements that are relevant to the capabilities provided.&amp;lt;/blockquote&amp;gt;But what are the relevant security requirements for different types of SPAs? This page will try to answer that question.&lt;br /&gt;
&lt;br /&gt;
== SPA Types ==&lt;br /&gt;
&lt;br /&gt;
* Password Manager&lt;br /&gt;
* SIEM Tool&lt;br /&gt;
* MFA Provider&lt;br /&gt;
* EDR/XDR Tool&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
	<entry>
		<id>https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=121</id>
		<title>Identifying a Certified Third Party Assessing Organization (C3PAO)</title>
		<link rel="alternate" type="text/html" href="https://cooey.wiki/index.php?title=Identifying_a_Certified_Third_Party_Assessing_Organization_(C3PAO)&amp;diff=121"/>
		<updated>2025-03-01T02:41:13Z</updated>

		<summary type="html">&lt;p&gt;Liatris: Added section on work from home [Please Review]&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&#039;&#039;&#039;SPA Categorization&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Some assessors believe that a Security Protection Asset (SPA) includes any systems components that are used in an organizations SSP for supporting evidence.  Other assessors only identify an SPA a systems that provide protection to components as stated in the NIST 800-171 publication.  &lt;br /&gt;
&lt;br /&gt;
Ask your C3PAO if they expect systems mentioned in the SSP for the purpose of providing evidence to meeting an assessment objective an example of an SPA?   Do they believe an SPA has to provide a security function such as a SIEM or EDR?  This will impact the level of effort to provide evidence for an assessment.&lt;br /&gt;
&lt;br /&gt;
NIST 800-171 states that “The requirements apply to all components of nonfederal systems and organizations that process, store, and/or transmit CUI, or that provide protection for such components”.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;Browser used to Access CUI&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
Many organizations are accessing and modifying CUI documents  through a web browser but have restricted the ability to download and print.  Some DOD components also use the browser for accessing Government information.  One example is the Navy using Flank Speed.   &lt;br /&gt;
&lt;br /&gt;
However, when opening a document in a browser it does process information on the endpoint.  If that endpoint is not part of the organization information system and controlled then it could be a finding.  &lt;br /&gt;
&lt;br /&gt;
Some assessors will fail an organization if they are using a browser on an asset that is not controlled others will not.  As an alternative there are solutions such as VDI or technologies that provide a pixel representation of a browser that would pass assessment. &lt;br /&gt;
&lt;br /&gt;
If you are using a browser to access CUI ask your assessor if they would fail the organization.  &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&#039;&#039;&#039;CUI at Alternate Worksites (Work From Home)&#039;&#039;&#039;&lt;br /&gt;
&lt;br /&gt;
When CUI is physically at alternate work sites (Here we&#039;ll focus on work from home/WFH), the CUI needs to be physically protected. The physical protections may include locked filing cabinets, safes, locked briefcases. Some organizations even allow WFH users to print to corporate-issued printers in their home. At some level, the physical security of your home is providing safeguarding for that CUI.&lt;br /&gt;
&lt;br /&gt;
Some assessors will assess the WFH environment remotely, relying on policy/training, user interview, or maybe even demonstration on camera by a WFH user. Other assessors will require a visit on site to a representative WFH environment. Still other assessors won&#039;t even assess you if you have CUI at home. &lt;br /&gt;
&lt;br /&gt;
If you allow physical CUI at your user&#039;s homes, ask your assessor how they plan to assess your WFH environment, or if they will assess it at all.&lt;/div&gt;</summary>
		<author><name>Liatris</name></author>
	</entry>
</feed>