--- name: "SR-12_component-disposal" description: "Dispose of [organization-defined] using the following techniques and methods: [organization-defined]." category: "configuration" version: "5.2.0" author: "cyberstrike-official" tags: - nist - sp800-53 - rev5 - sr-12 - sr tech_stack: - any cwe_ids: [] chains_with: - MP-6 prerequisites: [] severity_boost: MP-6: "Chain with MP-6 for comprehensive security coverage" --- # SR-12 Component Disposal ## High-Level Description **Family:** Supply Chain Risk Management (SR) **Framework:** NIST SP 800-53 Rev 5 Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, disposal can occur during research and development, design, prototyping, or operations/maintenance and include methods such as disk cleaning, removal of cryptographic keys, partial reuse of components. Opportunities for compromise during disposal affect physical and logical data, including system documentation in paper-based or digital files; shipping and delivery documentation; memory sticks with software code; or complete routers or servers that include permanent media, which contain sensitive or proprietary information. Additionally, proper disposal of system components helps to prevent such components from entering the gray market. ## What to Check - [ ] Verify SR-12 Component Disposal is documented in SSP - [ ] Confirm control is operating effectively - [ ] Review evidence of continuous monitoring for SR-12 ## How to Test ### Step 1: Review Documentation Examine the System Security Plan (SSP) and related artifacts for SR-12 implementation details. Verify the organization has documented how this control is satisfied. ### Step 2: Validate Implementation ``` # For cloud environments, use cloud-audit-mcp tools # For on-premises, review system configurations directly # Example: Check if account management policies exist grep -r "account.management\|access.control" /etc/security/ 2>/dev/null ``` ### Step 3: Test Operating Effectiveness Verify the control is actively functioning, not just documented. Check logs, configurations, and operational evidence. ## Tools | Tool | Purpose | Usage | | ------------- | --------------------------------- | ----- | | Manual Review | Documentation and interview-based | N/A | ## Remediation Guide ### Control Statement Dispose of [organization-defined] using the following techniques and methods: [organization-defined]. ### Implementation Guidance Data, documentation, tools, or system components can be disposed of at any time during the system development life cycle (not only in the disposal or retirement phase of the life cycle). For example, disposal can occur during research and development, design, prototyping, or operations/maintenance and include methods such as disk cleaning, removal of cryptographic keys, partial reuse of components. Opportunities for compromise during disposal affect physical and logical data, including system documentation in paper-based or digital files; shipping and delivery documentation; memory sticks with software code; or complete routers or servers that include permanent media, which contain sensitive or proprietary information. Additionally, proper disposal of system components helps to prevent such components from entering the gray market. ## Risk Assessment | Finding | Severity | Impact | | ---------------------------------------- | -------- | --------------------------------------- | | SR-12 Component Disposal not implemented | Medium | Supply Chain Risk Management | | SR-12 partially implemented | Low | Incomplete Supply Chain Risk Management | ## CWE Categories | CWE ID | Title | | ------ | --------------------- | | N/A | No direct CWE mapping | ## References - [NIST SP 800-53 Rev 5 - SR-12](https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=sr-12) - [NIST SP 800-53A Rev 5 (Assessment Procedures)](https://csrc.nist.gov/pubs/sp/800/53/a/r5/final) - [NIST SP 800-53 Rev 5 Full Catalog](https://csrc.nist.gov/pubs/sp/800/53/r5/upd1/final) ## Checklist - [ ] Control documented in SSP - [ ] Implementation evidence collected - [ ] Operating effectiveness validated - [ ] Continuous monitoring in place - [ ] Related controls (MP-6) reviewed