Compliance Reports: Federal Information Security Management Act (FISMA)

Document created by RSA Information Design and Development on May 25, 2016Last modified by RSA Information Design and Development on Jun 18, 2018
Version 152Show Document
  • View in full screen mode
 

The Federal Information Security Management Act (FISMA) is designed to ensure appropriate security controls for government information systems.

Dependencies

The FISMA compliance reports have the following dependencies.

               
SA RulesApp Rules

Accounts Created

Accounts Deleted

Accounts Modified

Accounts Created

Logon Failures Details

Logon Failures Summary

Failed Remote Access Details

Failed Remote Access Summary

Successful Remote Access Details

Successful Remote Access Summary

Change in Audit Settings

Encryption Failures

Key Generation and Changes

Firewall Configuration Changes

Password Changes

Password Changes Summary

account:created

account:deleted

account:modified

account:logon-success

config:change-audit-setting

encryption:failures

encryption:key-gen-and-changes

config:fw-config-changes

account:logon-failure

account:password-change

config:router-change

Citations

The FISMA reports have the following Citations.

                                                                                        
Report RuleCitation NameCitation Description
Accounts CreatedNIST 800-53 AC-2ACCOUNT MANAGEMENT
Accounts ModifiedNIST 800-53 AC-2ACCOUNT MANAGEMENT
Accounts DeletedNIST 800-53 AC-2ACCOUNT MANAGEMENT
Account ManagementNIST 800-53 AC-2ACCOUNT MANAGEMENT
Logon Failures - DetailNIST 800-53 AC-7UNSUCCESSFUL LOGIN ATTEMPTS
Logon Failures - Top 25NIST 800-53 AC-8UNSUCCESSFUL LOGIN ATTEMPTS
Successful Remote Access - DetailNIST 800-53 AC-17REMOTE ACCESS
Successful Remote Access - Top 25NIST 800-53 AC-17REMOTE ACCESS
Failed Remote  Access - Top 25NIST 800-53 AC-17REMOTE ACCESS
Failed Remote Access - DetailNIST 800-53 AC-17REMOTE ACCESS
Change in Audit SettingsNIST 800-53 AU-9PROTECTION OF AUDIT INFORMATION
Firewall Configuration ChangesNIST 800-53 CM-3CONFIGURATION CHANGE CONTROL
Router Configuration ChangesNIST 800-53 CM-3CONFIGURATION CHANGE CONTROL
Password Changes - Detail
Password Changes - Top 25
NIST 800-53 IA-5AUTHENTICATOR MANAGEMENT
Key Generation and ChangesNIST 800-53 SC-12Cryptographic Key Establishment and
Management
You are here
Table of Contents > Compliance Reports: Federal Information Security Management Act (FISMA)

Attachments

    Outcomes