4.9 KiB
implementation-status | control-origination | |||||
---|---|---|---|---|---|---|
|
|
at-2 - [catalog] Literacy Training and Awareness
Control Statement
-
[a] Provide security and privacy literacy training to system users (including managers, senior executives, and contractors):
- [1] As part of initial training for new users and organization-defined frequency thereafter; and
- [2] When required by system changes or following organization-defined events;
-
[b] Employ the following techniques to increase the security and privacy awareness of system users awareness techniques;
-
[c] Update literacy training and awareness content frequency and following events ; and
-
[d] Incorporate lessons learned from internal or external security incidents or breaches into literacy training and awareness techniques.
Control guidance
Organizations provide basic and advanced levels of literacy training to system users, including measures to test the knowledge level of users. Organizations determine the content of literacy training and awareness based on specific organizational requirements, the systems to which personnel have authorized access, and work environments (e.g., telework). The content includes an understanding of the need for security and privacy as well as actions by users to maintain security and personal privacy and to respond to suspected incidents. The content addresses the need for operations security and the handling of personally identifiable information.
Awareness techniques include displaying posters, offering supplies inscribed with security and privacy reminders, displaying logon screen messages, generating email advisories or notices from organizational officials, and conducting awareness events. Literacy training after the initial training described in AT-2a.1 is conducted at a minimum frequency consistent with applicable laws, directives, regulations, and policies. Subsequent literacy training may be satisfied by one or more short ad hoc sessions and include topical information on recent attack schemes, changes to organizational security and privacy policies, revised security and privacy expectations, or a subset of topics from the initial training. Updating literacy training and awareness content on a regular basis helps to ensure that the content remains relevant. Events that may precipitate an update to literacy training and awareness content include, but are not limited to, assessment or audit findings, security incidents or breaches, or changes in applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
Control assessment-objective
security literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; privacy literacy training is provided to system users (including managers, senior executives, and contractors) as part of initial training for new users; security literacy training is provided to system users (including managers, senior executives, and contractors) frequency thereafter; privacy literacy training is provided to system users (including managers, senior executives, and contractors) frequency thereafter; security literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following events; privacy literacy training is provided to system users (including managers, senior executives, and contractors) when required by system changes or following events; awareness techniques are employed to increase the security and privacy awareness of system users; literacy training and awareness content is updated frequency; literacy training and awareness content is updated following events; lessons learned from internal or external security incidents or breaches are incorporated into literacy training and awareness techniques.
What is the solution and how is it implemented?
Implementation a.
Add control implementation description here for item at-2_smt.a
Implementation b.
Add control implementation description here for item at-2_smt.b
Implementation c.
Add control implementation description here for item at-2_smt.c
Implementation d.
Add control implementation description here for item at-2_smt.d