This is a potential security issue, you are being redirected to https://nvd.nist.gov
Security and Privacy Controls for Federal Information Systems and Organizations
The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):
a. As part of initial training for new users;
b. When required by information system changes; and
c. [Assignment: organization-defined frequency] thereafter.
Organizations determine the appropriate content of security awareness training and security awareness techniques based on the specific organizational requirements and the information systems to which personnel have authorized access. The content includes a basic understanding of the need for information security and user actions to maintain security and to respond to suspected security incidents. The content also addresses awareness of the need for operations security. Security awareness techniques can include, for example, displaying posters, offering supplies inscribed with security reminders, generating email advisories/notices from senior organizational officials, displaying logon screen messages, and conducting information security awareness events.
SECURITY AWARENESS TRAINING |
The organization includes practical exercises in security awareness training that simulate actual cyber attacks.Supplemental Guidance: Practical exercises may include, for example, no-notice social engineering attempts to collect information, gain unauthorized access, or simulate the adverse impact of opening malicious email attachments or invoking, via spear phishing attacks, malicious web links.
Related to: CA-2 , CA-7 , CP-4 , IR-3
SECURITY AWARENESS TRAINING |
The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.Supplemental Guidance: Potential indicators and possible precursors of insider threat can include behaviors such as inordinate, long-term job dissatisfaction, attempts to gain access to information not required for job performance, unexplained access to financial resources, bullying or sexual harassment of fellow employees, workplace violence, and other serious violations of organizational policies, procedures, directives, rules, or practices. Security awareness training includes how to communicate employee and management concerns regarding potential indicators of insider threat through appropriate organizational channels in accordance with established organizational policies and procedures.
Related to: PL-4 , PM-12 , PS-3 , PS-6
|C.F.R. Part 5 Subpart C (5 C.F.R. 930.301)||http://www.gpo.gov/fdsys/granule/CFR-2009-title5-vol2/CFR-2009-title5-vol2-sec930-301/content-detail.html|
|Executive Order 13587||http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net|
|NIST Special Publication 800-50||https://csrc.nist.gov/publications/search?keywords-lg=800-50|