03.02.01: Literacy Training and Awareness
Control Familly: Awareness and Training
SPRS: N/A
Top Ten Failed Requirement: N/A
Supporting Publications:
SP 800-50 [32]
SP 800-160-2 [10]
Referenced in: N/A
Control Type: N/A
CPCSC Level 2: 03.02.01
CMMC Level(s): N/A
Derived From: NIST SP 800-53r5
AT-02
AT-02(02)
AT-02(03)
a. Provide security literacy training to system users:
1. As part of initial training for new users and [Assignment: organizationdefined frequency] thereafter,
2. When required by system changes or following [Assignment: organizationdefined events], and
3. On recognizing and reporting indicators of insider threat, social engineering, and social mining.
b. Update security literacy training content [Assignment: organization-defined frequency] and following [Assignment: organization-defined events].
Discussion:
Organizations provide basic and advanced levels of security literacy training to system users (including managers, senior executives, system administrators, and contractors) and measures to test the knowledge level of users. Organizations determine the content of literacy training based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and the actions required of users to maintain security and respond to incidents. The content also addresses the need for operations security and the handling of CUI. Security awareness techniques include displaying posters, offering supplies inscribed with security reminders, generating email advisories or notices from organizational officials, displaying logon screen messages, and conducting awareness events using podcasts, videos, and webinars. Security literacy training is conducted at a frequency consistent with applicable laws, directives, regulations, and policies. Updating literacy training content on a regular basis ensures that the content remains relevant. Events that may precipitate an update to literacy training content include assessment or audit findings, security incidents or breaches, or changes in applicable laws, Executive Orders, directives, regulations, policies, standards, and guidelines. Potential indicators and possible precursors of insider threats include behaviors such as inordinate, long-term job dissatisfaction; attempts to gain access to information that is not required for job performance; unexplained access to financial resources; sexual harassment or bullying of fellow employees; workplace violence; and other serious violations of the policies, procedures, rules, directives, or practices of organizations. Organizations may consider tailoring insider threat awareness topics to roles (e.g., training for managers may be focused on specific changes in the behavior of team members, while training for employees may be focused on more general observations). Social engineering is an attempt to deceive an individual into revealing information or taking an action that can be used to breach, compromise, or otherwise adversely impact a system. Social engineering includes phishing, pretexting, impersonation, baiting, quid pro quo, threadjacking, social media exploitation, and tailgating. Social mining is an attempt to gather information about the organization that may be used to support future attacks. Security literacy training includes how to communicate employee and management concerns regarding potential indicators of insider threat and potential and actual instances of social engineering and data mining through appropriate organizational channels in accordance with established policies and procedures.
Assessment Methods and Objectives
Examine [SELECT FROM: security literacy training and awareness policy and procedures; procedures for security literacy training and awareness implementation; codes of federal regulations; security literacy and awareness training curriculum; security literacy and awareness training materials; training records; system security plan; other relevant documents or records]
Interview[SELECT FROM: personnel with responsibilities for security literacy training and awareness; personnel comprising the general system user community; personnel with information security responsibilities]
Test [SELECT FROM: mechanisms for managing information security literacy training and awareness]
NIST SP 800-171A r3 Determining Statements Determine if:
A.03.01.02[01]: approved authorizations for logical access to CUI are enforced in accordance with applicable access control policies.
A.03.01.02[02]: approved authorizations for logical access to system resources are enforced in accordance with applicable access control policies.