Skip to content
  • There are no suggestions because the search field is empty.

Compliance Reports: Federal Information Security Management Act (FISMA)

The Federal Information Security Management Act (FISMA) is designed to ensure appropriate security controls for government information systems.

Dependencies

The FISMA compliance reports have the following dependencies.

  • SA Rules:

    Accounts Created

    Accounts Deleted

    Accounts Modified

    Accounts Created

    Logon Failures Details

    Logon Failures Summary

    Failed Remote Access Details

    Failed Remote Access Summary

    Successful Remote Access Details

    Successful Remote Access Summary

    Change in Audit Settings

    Encryption Failures

    Key Generation and Changes

    Firewall Configuration Changes

    Password Changes

    Password Changes Summary

  • App Rules:

    account:created

    account:deleted

    account:modified

    account:logon-success

    config:change-audit-setting

    encryption:failures

    encryption:key-gen-and-changes

    config:fw-config-changes

    account:logon-failure

    account:password-change

    config:router-change


Citations

The FISMA reports have the following Citations.

  • Report Rule: Accounts Created
  • Citation Name: NIST 800-53 AC-2
  • Citation Description: ACCOUNT MANAGEMENT

  • Report Rule: Accounts Modified
  • Citation Name: NIST 800-53 AC-2
  • Citation Description: ACCOUNT MANAGEMENT

  • Report Rule: Accounts Deleted
  • Citation Name: NIST 800-53 AC-2
  • Citation Description: ACCOUNT MANAGEMENT

  • Report Rule: Account Management
  • Citation Name: NIST 800-53 AC-2
  • Citation Description: ACCOUNT MANAGEMENT

  • Report Rule: Logon Failures - Detail
  • Citation Name: NIST 800-53 AC-7
  • Citation Description: UNSUCCESSFUL LOGIN ATTEMPTS

  • Report Rule: Logon Failures - Top 25
  • Citation Name: NIST 800-53 AC-8
  • Citation Description: UNSUCCESSFUL LOGIN ATTEMPTS

  • Report Rule: Successful Remote Access - Detail
  • Citation Name: NIST 800-53 AC-17
  • Citation Description: REMOTE ACCESS

  • Report Rule: Successful Remote Access - Top 25
  • Citation Name: NIST 800-53 AC-17
  • Citation Description: REMOTE ACCESS

  • Report Rule: Failed Remote  Access - Top 25
  • Citation Name: NIST 800-53 AC-17
  • Citation Description: REMOTE ACCESS

  • Report Rule: Failed Remote Access - Detail
  • Citation Name: NIST 800-53 AC-17
  • Citation Description: REMOTE ACCESS

  • Report Rule: Change in Audit Settings
  • Citation Name: NIST 800-53 AU-9
  • Citation Description: PROTECTION OF AUDIT INFORMATION

  • Report Rule: Firewall Configuration Changes
  • Citation Name: NIST 800-53 CM-3
  • Citation Description: CONFIGURATION CHANGE CONTROL

  • Report Rule: Router Configuration Changes
  • Citation Name: NIST 800-53 CM-3
  • Citation Description: CONFIGURATION CHANGE CONTROL

  • Report Rule: Password Changes - Detail
    Password Changes - Top 25
  • Citation Name: NIST 800-53 IA-5
  • Citation Description: AUTHENTICATOR MANAGEMENT

  • Report Rule: Key Generation and Changes
  • Citation Name: NIST 800-53 SC-12
  • Citation Description: Cryptographic Key Establishment and
    Management

docFeedback.png

You are here
Table of Contents > Compliance Reports: Federal Information Security Management Act (FISMA)