EMB-05: Embedded Technology Configuration Monitoring
Mechanisms exist to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Control Question: Does the organization generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected?
General (5)
| Framework | Mapping Values |
|---|---|
| CSA IoT SCF 2 | SNT-03 |
| IEC 62443-4-2 2019 | EDR 2.13 (13.3.3(1)) EDR 3.11 (13.6.3(1)) |
| OWASP Top 10 2021 | A05:2021 |
| UN R155 | 7.3.7(a) 7.3.7(b) |
| UN ECE WP.29 | 7.3.7(a) 7.3.7(b) |
US (1)
| Framework | Mapping Values |
|---|---|
| US DHS ZTCF | SYS-05 |
EMEA (2)
| Framework | Mapping Values |
|---|---|
| EMEA Saudi Arabia IoT CGIoT-1 2024 | 2-11-2 |
| EMEA Saudi Arabia OTCC-1 2022 | 1-5-4 |
APAC (2)
| Framework | Mapping Values |
|---|---|
| APAC Australia IoT Code of Practice | Principle 8 Principle 10 |
| APAC Singapore MAS TRM 2021 | 11.5.5 |
Capability Maturity Model
Level 0 — Not Performed
There is no evidence of a capability to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Level 1 — Performed Informally
C|P-CMM1 is N/A, since a structured process is required to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Level 2 — Planned & Tracked
Embedded Technology (EMB) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- Embedded technology management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
- IT/cybersecurity personnel identify cybersecurity and data protection controls that are appropriate to address applicable statutory, regulatory and contractual requirements for embedded technology management.
- Embedded technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
- Deviations to baseline for embedded technologies configurations are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
- Unauthorized configuration changes to embedded technologies are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
- Special baselines for embedded technologies configurations are created for higher-risk environments.
Level 3 — Well Defined
Embedded Technology (EMB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist:
- An IT Asset Management (ITAM) function, or similar function, categorizes embedded technologies according to the data the asset stores, transmits and/ or processes to ensure that the appropriate technology controls are applied to protect the asset and the data it stores, transmits or processes.
- An IT infrastructure team, or similar function, ensures that statutory, regulatory and contractual cybersecurity and data privacy obligations are addressed to ensure secure configurations for embedded technologies are designed, built and maintained for embedded technologies.
- Cybersecurity personnel perform annual evaluations of deployed embedded technologies to identify necessary updates to mitigate any newly discovered risks associated with legacy embedded technologies.
- Configurations for embedded technologies conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments.
- Configuration management of embedded technologies is centralized for all operating systems, applications, servers and other technologies that are capable of being configured.
- Special baseline configurations for embedded technologies are created for higher-risk environments.
- Deviations to baseline configurations for embedded technologies are required to have a risk assessment and the business process owner accepts the risk(s) associated with the deviation.
- Unauthorized configuration changes to embedded technologies are responded to in accordance with an Incident Response Plan (IRP) to determine if the unauthorized configuration is malicious in nature.
- A Data Protection Impact Assessment (DPIA) is used to help ensure the protection of sensitive/regulated data processed, stored or transmitted on embedded technologies, so that cybersecurity and data protection controls are implemented in accordance with applicable statutory, regulatory and contractual obligations.
- Previous versions of configurations are maintained for troubleshooting and forensics reasons.
Level 4 — Quantitatively Controlled
See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Level 5 — Continuously Improving
See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to generate log entries on embedded devices when configuration changes or attempts to access interfaces are detected.
Assessment Objectives
- EMB-05_A01 embedded devices generate log entries when configuration changes or attempts to access interfaces are detected.