Skip to main content

WEB-01: Web Security

WEB 8 — High Govern

Mechanisms exist to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.

Control Question: Does the organization facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures?

General (9)
Framework Mapping Values
NIST 800-171 R2 (source) 3.1.22
NIST 800-171 R3 (source) 03.01.22.a
PCI DSS 4.0.1 (source) 6.4 6.4.1 6.4.2
PCI DSS 4.0.1 SAQ A-EP (source) 6.4.1 6.4.2
PCI DSS 4.0.1 SAQ D Merchant (source) 6.4.1 6.4.2
PCI DSS 4.0.1 SAQ D Service Provider (source) 6.4.1 6.4.2
SCF CORE Mergers, Acquisitions & Divestitures (MA&D) WEB-01
SCF CORE ESP Level 2 Critical Infrastructure WEB-01
SCF CORE ESP Level 3 Advanced Threats WEB-01
US (6)
Framework Mapping Values
US CMMC 2.0 Level 1 (source) AC.L1-B.1.IV
US CMMC 2.0 Level 2 (source) AC.L2-3.1.22
US CMMC 2.0 Level 3 (source) AC.L2-3.1.22
US FAR 52.204-21 52.204-21(b)(1)(iv)
US HIPAA HICP Medium Practice 6.M.A
US HIPAA HICP Large Practice 6.M.A
EMEA (5)
Framework Mapping Values
EMEA Austria Sec 14 Sec 15
EMEA Belgium 16
EMEA Saudi Arabia CSCC-1 2019 2-12 2-12-1-1 2-12-1-2
EMEA Saudi Arabia ECC-1 2018 2-15-1 2-15-2 2-15-3 2-15-4
EMEA Spain CCN-STIC 825 8.8.2 [MP.S.2]
APAC (1)
Framework Mapping Values
APAC New Zealand NZISM 3.6 14.5.6.C.01 14.5.7.C.01 14.5.8.C.01
Americas (1)
Framework Mapping Values
Americas Canada ITSP-10-171 03.01.22.A

Capability Maturity Model

Level 0 — Not Performed

There is no evidence of a capability to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.

Level 1 — Performed Informally

Web Security (WEB) efforts are ad hoc and inconsistent. CMM Level 1 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • The management of Internet-facing technologies are decentralized.
  • Internet-facing technologies are governed no differently from internal network assets.
Level 2 — Planned & Tracked

Web Security (WEB) efforts are requirements-driven and governed at a local/regional level, but are not consistent across the organization. CMM Level 2 control maturity would reasonably expect all, or at least most, the following criteria to exist:

  • Internet-facing technologies management is decentralized (e.g., a localized/regionalized function) and uses non-standardized methods to implement secure, resilient and compliant practices.
  • IT/cybersecurity personnel identify cybersecurity and data protection controls to address applicable statutory, regulatory and contractual requirements for Internet-facing technologies management.
  • Administrative processes and technologies focus on protecting High Value Assets (HVAs), including environments where sensitive/regulated data is stored, transmitted and processed (e.g., Demilitarized Zones (DMZs)).
  • Internet-facing technologies are configured to protect data with the strength and integrity commensurate with the classification or sensitivity of the information and mostly conform to industry-recognized standards for hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides), including cryptographic protections for sensitive/regulated data.
Level 3 — Well Defined

Web Security (WEB) efforts are standardized across the organization and centrally managed, where technically feasible, to ensure consistency. CMM Level 3 control maturity would reasonably expect all, or at least most, the following criteria to exist: o Utilize Web Application Firewalls (WAFs) to provide defense-in-depth protection for application-specific threats. o Restrict inbound traffic to authorized devices on certain services, protocols and ports.

  • A Validated Architecture Design Review (VADR) evaluates Internet-facing design criteria for secure practices and conformance with requirements for applicable statutory, regulatory and contractual controls to determine if the system/application/service is designed, built and operated in a secure and resilient manner.
  • A change notification capability exists to scan web pages for changes, which are reviewed by appropriate personnel to determine if changes are authorized or unauthorized.
  • Ongoing content reviews are performed to ensure web pages do not contain non-public information.
  • Security engineering, or a similar function, ensures that Internet-facing devices conform to industry-recognized standards for configuration hardening (e.g., DISA STIGs, CIS Benchmarks or OEM security guides) for test, development, staging and production environments. This includes creating special hardening requirements for High-Value Assets (HVAs).
  • An Identity & Access Management (IAM) function, or similar function, enables the implementation of identification and access management controls for Internet-facing technologies.
  • Technologies are configured to implement Strong Customer Authentication (SCA) for consumers to prove their identity.
  • Administrative processes exist and technologies are configured to provide Internet-facing individuals (e.g., customers, users, clients, etc.) with clear and precise information about cookies, in accordance with regulatory requirements for cookie management.
  • An IT Asset Management (ITAM) function, or similar function, categorizes network devices according to the data the asset stores, transmits and/ or processes and applies the appropriate technology controls to protect the asset and data.
  • Boundary protections:
Level 4 — Quantitatively Controlled

See C|P-CMM3. There are no defined C|P-CMM4 criteria, since it is reasonable to assume a quantitatively-controlled process is not necessary to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.

Level 5 — Continuously Improving

See C|P-CMM4. There are no defined C|P-CMM5 criteria, since it is reasonable to assume a continuously-improving process is not necessary to facilitate the implementation of an enterprise-wide web management policy, as well as associated standards, controls and procedures.

Assessment Objectives

  1. WEB-01_A01 an enterprise-wide web management policy, as well as associated standards, controls and procedures exists.
  2. WEB-01_A02 web security operations are conducted according to documented policies, standards, procedures and/or other organizational directives.
  3. WEB-01_A03 adequate resources (e.g., people, processes, technologies, data and/or facilities) are provided to support web security operations.
  4. WEB-01_A04 responsibility and authority for the performance of web security-related activities are assigned to designated personnel.
  5. WEB-01_A05 personnel performing web security-related activities have the skills and knowledge needed to perform their assigned duties.

Technology Recommendations

The Secure Controls Framework (SCF) is maintained by SCF Council. Use of SCF content is subject to the SCF Terms & Conditions.

Manage this control in SCF Connect

Track implementation status, collect evidence, and map controls to your compliance frameworks automatically.