Discretionary Access Control, v1.0

This Trustmark Definition addresses the requirement for organizations to enforce a discretionary access control policy.
If an assessment step references organization-defined elements (E.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), corresponding citations/excerpts must be provided to confirm that the organization has established and documented these values and that they apply as referenced in the conformance criteria.

Similarly, if a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]) is specified, evidence must be provided to establish that the option(s) implemented by the organization have been defined and documented.

The assessment step shall not be marked as satisfied without this evidence.

Assessment Step

1
Discretionary Access Control (DiscretionaryAccessControl)
Does the information system enforce <organization-defined discretionary access control policy> over defined subjects and objects where the policy specifies that a subject that has been granted access to information can do one or more of the following:
  1. Pass the information to any other subjects or objects;
  2. Grant its privileges to other subjects;
  3. Change security attributes on subjects, objects, the information system, or the information system's components;
  4. Choose the security attributes to be associated with newly created or revised objects; or
  5. Change the rules governing access control?
Artifact
Artifact

Provide evidence (policies, process documentation, actual compliance report, etc.) that a discretionary access control policy as described is enforced.

If conformance criteria reference organization-defined elements (e.g. <organization-defined personnel or roles>, <organization-defined frequency>, etc.), these values must be defined and documented by the organization.

Similarly, if the criteria specify a "Selection" among multiple options (e.g. [Selection (one or more): as needed; ]), the option(s) implemented by the organization must also be defined and documented.

Conformance Criteria (1)

Discretionary Access Control
The information system must enforce <organization-defined discretionary access control policy> over defined subjects and objects where the policy specifies that a subject that has been granted access to information can do one or more of the following:
  1. Pass the information to any other subjects or objects;
  2. Grant its privileges to other subjects;
  3. Change security attributes on subjects, objects, the information system, or the information system's components;
  4. Choose the security attributes to be associated with newly created or revised objects; or
  5. Change the rules governing access control.
Citation
SP800-53R4
Appendix F, AC-3 (4)