Mcaffe GD Nist 800 171 Product Mapping
Mcaffe GD Nist 800 171 Product Mapping
Mcaffe GD Nist 800 171 Product Mapping
Product Summary
McAfee Product NIST 800-171 Mapping Product Suite
McAfee Advanced Threat Defense
®
Section 3.14: System and Information Integrity
3.14.1, 3.14.2
http://www.mcafee.com/us/products/advanced-threat-
defense.aspx
McAfee Complete Data Protection Section 3.1: Access Control McAfee Complete Data Protection Advanced
3.1.19
http://www.mcafee.com/us/products/complete-data- Uses McAfee ePO™ software, full disk encryption (Windows and
Section 3.8: Media Protection
protection-advanced.aspx Macintosh), McAfee Endpoint DLP, McAfee Drive Control, McAfee
3.8.6
ePO Deep Command,McAfee File & Removeable Media Encryption
Section 3.13: System and Communication Protection
(Windows and Macintosh)
3.13.16
McAfee Data Loss Prevention Section 3.1: Access Control McAfee Complete Data Protection Advanced
3.1.3
http://www.mcafee.com/us/products/total-protection-for- Uses McAfee ePO software, full disk encryption (Windows and
Section 3.8: Media Protection
data-loss-prevention.aspx Macintosh), McAfee Endpoint DLP, McAfee Drive Control, McAfee
3.8.2, 3.8.7
ePO Deep Command, McAfee File & Removeable media encryption
Section 3.13: System and Communications Protection
(Windows and Macintosh)
3.13.1, 3.13.16
Section 3.14: System and Information Integrity
3.14.5, 3.14.7
McAfee Enterprise Security 10.x Section 3.14: System and Information Integrity McAfee Endpoint Threat Protection
3.14.1, 3.14.2, 3.14.5, 3.14.7
http://www.mcafee.com/us/products/endpoint-threat- Uses McAfee ePO software, desktop and email server antivirus,
protection.aspx Email server antivirus, desktop firewall, endpoint URL and web
filtering, host intrusion prevention system (HIPS), device control,
multiplatform antivirus (Linux/Unix/Macintosh)
McAfee Enterprise Security Manager Section 3.3: Audit and Accountability
3.3.1, 3.3.5, 3.3.6, 3.3.8
http://www.mcafee.com/us/products/enterprise-security-
Section 3.6: Incident Response
manager.aspx
3.6.2
Section 3.12: Security Assessment
3.12.3
Section 3.14: Security and Information Integrity
3.14.1, 3.14.2, 3.14.3, 3.14.7 Connect With Us
McAfee Global Threat Intelligence Section 3.14: Security and Information Integrity
3.14.3
http://www.mcafee.com/us/threat-center/technology/
global-threat-intelligence-technology.aspx
McAfee Enterprise Security 10.x Section 3.1: Access Control McAfee Endpoint Threat Protection
3.1.2, 3.1.16, 3.1.17, 3.1.20
http://www.mcafee.com/us/products/endpoint-threat- Uses McAfee ePO software, desktop and server antivirus, email
Section 3.4: Configuration Management
protection.aspx server antivirus, desktop firewall, endpoint URL and web filtering,
3.4.6, 3.4.7, 3.4.8, 3.4.9
host IPS, device control, multiplatform antivirus (Linux/Unix/Mac)
Section 3.8: Media Protection
3.8.2, 3.8.8
Section 3.13: System and Communications Protection
3.13.7, 3.13.12
Section 3.14: Security and Information Integrity
3.14.7
McAfee Training Section 3.2: Training and Awareness
3.2.2
McAfee Active Response Section 3.1: Access Control McAfee Endpoint Threat Defense and Response
3.1.2, 3.1.11
http://www.mcafee.com/us/products/endpoint-threat- Uses McAfee ePO software, Dynamic Application Control (DAC),
Section 3.4: Configuration Management
defense-response.aspx Real Protect, McAfee Threat Intelligence Exchange, McAfee Active
3.4.7
Response
Section 3.8: Media Protection
3.8.2
Section 3.14: Security and Information Integrity
3.14.1, 3.14.2, 3.14.5, 3.14.7
McAfee Application Control Section 3.4: Configuration Management
3.4.6, 3.4.7, 3.4.8, 3.4.9
McAfee Change Control Section 3.1: Access Control
3.1.7
http://www.mcafee.com/us/products/change-control.aspx
Section 3.3: Audit and Accountability
3.3.1, 3.3.4, 3.3.8
Section 3.4: Configuration Management
3.4.1, 3.4.2
Section 3.6: Incident Response
3.6.2
Section 3.12: Security Assessment
3.12.3
Section 3.14: Security and Information Integrity
3.14.1
3.1—Access Control
3.4—Configuration Management
McAfee Products C# Requirement
McAfee Change Control 3.4.1 Establish and maintain baseline configurations and inventories of organizational information systems (including
McAfee Policy Auditor hardware, software, firmware, and documentation) throughout the respective system development lifecycles.
McAfee Change Control 3.4.2 Establish and enforce security configuration settings for information technology products employed in
McAfee Policy Auditor organizational information systems.
3.4.3 Track, review, approve/disapprove, and audit changes to information systems.
3.4.4 Analyze the security impact of changes prior to implementation.
3.4.5 Define, document, approve, and enforce physical and logical access restrictions associated with changes to the
information system.
McAfee Host Intrusion Prevention 3.4.6 Employ the principle of least functionality by configuring the information system to provide only essential
McAfee Application Control capabilities.
McAfee Device Control
McAfee Policy Auditor
McAfee Host Intrusion Prevention 3.4.7 Restrict, disable, and prevent the use of nonessential programs, functions, ports, protocols, and services.
McAfee Active Response
McAfee Application Control
McAfee Device Control
McAfee Host Intrusion Prevention 3.4.8 Apply deny-by-exception (blacklist) policy to prevent the use of unauthorized software or deny-all, permit-by-
McAfee Application Contro exception (whitelisting) policy to allow the execution of authorized software.
McAfee Host Intrusion Prevention 3.4.9 Control and monitor user-installed software.
McAfee Application Control
3.5.9 Allow temporary password use for system logons with an immediate change to a permanent password.
3.5.10 Store and transmit only encrypted representation of passwords.
3.5.11 Obscure feedback of authentication information.
3.6—Incident Response
McAfee Products C# Requirement
Establish an operational incident-handling capability for organizational information systems that includes
McAfee Endpoint Protection 3.6.1
adequate preparation, detection, analysis, containment, recovery, and user response activities.
McAfee Enterprise Security Manager
Track, document, and report incidents to appropriate officials and/or authorities both internal and external to
McAfee Change Control 3.6.2
the organization.
McAfee Policy Auditor
3.6.3 Test the organizational incident response capability.
3.7—Maintenance
McAfee Products Req. # Requirement
3.7.1 Perform maintenance on organizational information systems
3.7.2 Provide effective controls on the tools, techniques, mechanisms, and personnel used to conduct information
system maintenance.
3.7.3 Ensure equipment removed for off-site maintenance is sanitized of any CUI.
3.7.4 Check media containing diagnostic and test programs for malicious code before the media are used in the
information system.
3.7.5 Require multifactor authentication to establish nonlocal maintenance sessions via external network
connections and terminate such connections when nonlocal maintenance is complete.
3.7.6 Supervise the maintenance activities of maintenance personnel without required access authorization.
3.8—Media Protection
McAfee Products Req. # Requirement
3.8.1 Protect (physically control and securely store) information system media containing CUI, both paper and digital.
McAfee Data Loss Prevention 3.8.2 Limit access to CUI on information system media to authorized users.
McAfee Host Intrusion Prevention
McAfee Active Response
3.8.3 Sanitize or destroy information system media containing CUI before disposal or release for reuse.
3.8.4 Mark media with necessary CUI markings and distribution limitations.
3.8.5 Control access to media containing CUI and maintain accountability for media during transport outside of
controlled areas.
McAfee Complete Data Protection 3.8.6 Implement cryptographic mechanisms to protect the confidentiality of CUI stored on digital media during
transport unless otherwise protected by alternative physical safeguards.
McAfee Data Loss Prevention 3.8.7 Control the use of removable media on information system components.
McAfee Device Control
McAfee Host Intrusion Prevention 3.8.8 Prohibit the use of portable storage devices when such devices have no identifiable owner.
McAfee Device Control
3.8.9 Protect the confidentiality of backup CUI at storage locations.
3.9—Personal Security
McAfee Products Req. # Requirement
3.9.1 Screen individuals prior to authorizing access to information systems containing CUI.
3.9.2 Ensure that CUI and information systems containing CUI are protected during and after personnel actions, such
as terminations and transfers.
3.10—Physical Protection
McAfee Products Req. # Requirement
3.10.1 Limit physical access to organizational information systems, equipment, and the respective operating
environments to authorized individuals.
3.10.2 Protect and monitor the physical facility and support infrastructure for those information systems.
3.10.3 Escort visitors and monitor visitor activity.
3.10.4 Maintain audit logs of physical access.
3.10.5 Control and manage physical access devices.
3.10.6 Enforce safeguarding measures for CUI at alternate work sites ( telework sites).
3.11—Risk Assessment
McAfee Products Req. # Requirement
Foundstone 3.11.1 Periodically assess the risk to organizational operations (including mission, functions, image, or reputation),
organizational assets, and individuals, resulting from the operation of organizational information systems and
the associated processing, storage, or transmission of CUI.
Foundstone 3.11.2 Scan for vulnerabilities in the information system and applications periodically and when new vulnerabilities
affecting the system are identified.
3.11.3 Remediate vulnerabilities in accordance with assessments of risk.
3.12—Security Assessment
McAfee Products Req. # Requirement
Foundstone 3.12.1 Periodically assess the security controls in organizational information systems to determine if the controls are
effective in their application
3.12.2 Develop and implement plans of action designed to correct deficiencies and reduce or eliminate vulnerabilities
in organizational information systems.
McAfee Enterprise Security Manager 3.12.3 Monitor information system security controls on an ongoing basis to ensure the continued effectiveness of the
McAfee Change Control controls.
McAfee Policy Auditor
2821 Mission College Blvd. McAfee and the McAfee logo, ePolicy Orchestrator, and McAfee ePO are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in
Santa Clara, CA 95054 the US and other countries. Other marks and brands may be claimed as the property of others. Copyright © 2017 McAfee, LLC. 3755_0218
888.847.8766 FEBRUARY 2018
www.mcafee.com