question
stringlengths 13
90
| context
stringclasses 1
value | answer
stringlengths 1
5.37k
|
---|---|---|
AC-17 (4) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Authorizes the execution of privileged commands and access to security-relevant information via remote access only for [Assignment: organization-defined needs]; and</li>
<li>Documents the rationale for such access in the security plan for the information system.</li>
</ol>
|AC-17 (4)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-17(4)(a):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-17 (4) What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AC-17 (9) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization provides the capability to expeditiously disconnect or disable remote access to the information system within [FedRAMP Assignment: fifteen (15) minutes].
|AC-17 (9)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-17(9):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-17 (9) What is the solution and how is it implemented?|
|---|
|| |
AC-18 Wireless Access Restrictions (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li> Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and</li>
<li>Authorizes wireless access to the information system prior to allowing such connections.</li>
</ol>
|AC-18|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-18:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-18 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AC-18 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
|AC-18 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-18 (1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-18 (1) What is the solution and how is it implemented?|
|---|
|| |
AC-19 Access Control for Portable and Mobile Systems (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and</li>
<li>Authorizes the connection of mobile devices to organizational information systems.</li>
</ol>
|AC-19|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-19 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AC-19 (5) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
|AC-19 (5)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-19(5)-1:
|Parameter AC-19(5)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-19 (5) What is the solution and how is it implemented?|
|---|
|| |
AC-20 Use of External Information Systems (L) (M) (H) | Refer to the specific section and subsections for details. | The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:
<ol type="a">
<li>Access the information system from external information systems; and</li>
<li>Process, store, or transmit organization-controlled information using external information systems.</li>
</ol>
|AC-20|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-20 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AC-20 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:
<ol type="a">
<li>Verifies the implementation of required security controls on the external system as specified in the organization’s information security policy and security plan; or</li>
<li>Retains approved information system connection or processing agreements with the organizational entity hosting the external information system.</li>
</ol>
|AC-20 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-20 (1) What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AC-20 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.
|AC-20 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-20(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-20 (2) What is the solution and how is it implemented?|
|---|
|| |
AC-21 Information Sharing (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and</li>
<li>Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.</li>
</ol>
|AC-21|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-21(a):
|Parameter AC-21(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-21 What is the solution and how is it implemented?|
|---|
|Part a
|Part b |
AC-22 Publicly Accessible Content (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Designates individuals authorized to post information onto a publicly accessible information system;</li>
<li>Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;</li>
<li>Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and</li>
<li>Reviews the content on the publicly accessible information system for nonpublic information [FedRAMP Assignment: at least quarterly] and removes such information, if discovered.</li>
</ol>
|AC-22|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AC-22
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AC-22 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
---
title: Awareness and Training (AT)
--- |
Awareness and Training (AT) | Refer to the specific section and subsections for details. | # |
AT-1 Security Awareness and Training Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Security awareness and training policy [FedRAMP Assignment: at least every 3 years]; and</li>
<li>Security awareness and training procedures [FedRAMP Assignment: at least annually].
</li>
</ol>
</ol>
|AC-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AT-1(a):
|Parameter AT-1(b)(1):
|Parameter AT-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|AT-1 What is the solution and how is it implemented?|
|---
|Part a:
|Part b1:
|Part b2:
# |
AT-2 Security Awareness (L) (M) (H) | Refer to the specific section and subsections for details. | The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):
<ol type="a">
<li>As part of initial training for new users;</li>
<li>When required by information system changes; and</li>
<li>[FedRAMP Assignment: at least annually] thereafter.</li>
</ol>
|AT-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AT-2(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AT-2 What is the solution and how is it implemented?|
|---
|Part a:
|Part b1:
|Part b2:
# |
AT-2 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.
|AT-2 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AT-2(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AT-2 (2) What is the solution and how is it implemented?|
|---
|Part a:
# |
AT-3 Role-Based Security Training (L) (M) (H) | Refer to the specific section and subsections for details. | The organization provides role-based security training to personnel with assigned security roles and responsibilities:
<ol type="a">
<li>Before authorizing access to the information system or performing assigned duties;</li>
<li>When required by information system changes; and</li>
<li>[FedRAMP Assignment: at least annually] thereafter.</li>
</ol>
|AT-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AT-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AT-3 What is the solution and how is it implemented?|
|---
|Part a:
|Part b:
|Part c:
# |
AT-4 Security Training Records (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and</li>
<li>Retains individual training records for [FedRAMP Assignment: at least one year].</li>
</ol>
|AT-4(b)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AT-4(b)(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AT-4 What is the solution and how is it implemented?|
|---
|Part a:
|Part b:
---
title: Audit and Accountability (AU)
--- |
Audit and Accountability (AU) | Refer to the specific section and subsections for details. | # |
AU-1 Audit and Accountability Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Audit and accountability policy [FedRAMP Assignment: at every 3 years]; and</li>
<li>Audit and accountability procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|AU-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-1(a):
|Parameter AU-1(b)(1):
|Parameter AU-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|AU-1 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
AU-2 Audit Events (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Determines that the information system is capable of auditing the following events: [FedRAMP Assignment: [Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes];</li>
<li>Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events</li>
<li>Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and</li>
<li>Determines that the following events are to be audited within the information system: [FedRAMP Assignment: organization-defined subset of the auditable events defined in AU-2 a. to be audited continually for each identified event].</li>
<b>AU-2 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.
</ol>
|AU-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-1(a):
|Parameter AU-1(d):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-2 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
# |
AU-2 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization reviews and updates the audited events [FedRAMP Assignment: annually or whenever there is a change in the threat environment].<br>
<b>AU-2 (3) Additional FedRAMP Requirements and Guidance:</b>
Guidance: Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.
|AU-2 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-2(3):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-2 (3) What is the solution and how is it implemented?|
|---|
||
# |
AU-3 Content of Audit Records (L) (M) (H) | Refer to the specific section and subsections for details. | The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event.
|AU-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-3 What is the solution and how is it implemented?|
|---|
||
# |
AU-3 (1) Control Enhancement (M) | Refer to the specific section and subsections for details. | The information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information].<br>
<b>AU-3 (1) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider defines audit record types [FedRAMP Assignment: session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon]. The audit record types are approved and accepted by the JAB.<br>
<b>Guidance:</b> For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.
|AU-3 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-3(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-3 (1) What is the solution and how is it implemented?|
|---|
||
# |
AU-4 Audit Storage Capacity (L) (M) (H) | Refer to the specific section and subsections for details. | The organization allocates audit record storage capacity in accordance with [Assignment: organization-defined audit record storage requirements].
|AU-4|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-4:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-4 What is the solution and how is it implemented?|
|---|
||
# |
AU-5 Response to Audit Processing Failures (L) (M) (H) | Refer to the specific section and subsections for details. | The information system:
<ol type="a">
<li>Alerts [Assignment: organization-defined personnel or roles] in the event of an audit processing failure; and</li>
<li>Takes the following additional actions: [FedRAMP Assignment: organization-defined actions to be taken; (overwrite oldest record)].</li>
</ol>
|AU-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-5(a):
|Parameter AU-5(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-5 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-6 Audit Review, Analysis, and Reporting (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Reviews and analyzes information system audit records [FedRAMP Assignment: at least weekly] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and</li>
<li>Reports findings to [Assignment: organization-defined personnel or roles].</li>
<b>AU-6 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Coordination between service provider and consumer shall be documented and accepted by the Authorizing Official. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.
</ol>
|AU-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-6(a)-1:
|Parameter AU-6(a)-2:
|Parameter AU-6(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-6 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-6 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.
|AU-6 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-6 (1) What is the solution and how is it implemented?|
|---|
||
# |
AU-6 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.
|AU-6 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-6 (3) What is the solution and how is it implemented?|
|---|
||
# |
AU-7 Audit Reduction and Report Generation (M) (H) | Refer to the specific section and subsections for details. | The information system provides an audit reduction and report generation capability that:
<ol type="a">
<li>Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and</li>
<li>Does not alter the original content or time ordering of audit records.</li>
</ol>
|AU-7|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-7 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system provides the capability to process audit records for events of interest based on [Assignment: organization-defined audit fields within audit records].
|AU-7 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-7(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-7 (1) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-8 Time Stamps (L) (M) (H) | Refer to the specific section and subsections for details. | The information system:
<ol type="a">
<li>Uses internal system clocks to generate time stamps for audit records; and</li>
<li>Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: one second granularity of time measurement].</li>
</ol>
|AU-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-8(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-8 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-8 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system:
<ol type="a">
<li>Compares the internal information system clocks with [FedRAMP Assignment: authoritative time source: [http://tf.nist.gov/tf-cgi/servers.cgi] [at least hourly]]; and</li>
<li>Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period].</li>
<b>AU-8 (1) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.<br>
Requirement:< The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.<br>
<b>Guidance:</b> The service provider selects primary and secondary time servers used by the NIST Internet time service, or by a Stratum-1 time server. The secondary server is selected from a different geographic region than the primary server.<br>
If using Windows Active Directory, all servers should synchronize time with the time source for the Windows Domain Controller. If using some other directory services (e.g., LDAP), all servers should synchronize time with the time source for the directory server. Synchronization of system clocks improves the accuracy of log analysis.
</ol>
|AU-8 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-8(1)(a)-1:
|Parameter AU-8(1)(a)-2:
|Parameter AU-8(1)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-8 (1) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
AU-9 Protection of Audit Information (L) (M) (H) | Refer to the specific section and subsections for details. | The information system protects audit information and audit tools from unauthorized access, modification, and deletion.
|AU-9|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-9 What is the solution and how is it implemented?|
|---|
||
# |
AU-9 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system backs up audit records [FedRAMP Assignment: at least weekly] onto a physically different system or system component than the system or component being audited.
|AU-9 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-9(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-9 (2) What is the solution and how is it implemented?|
|---|
||
# |
AU-9 (4) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization authorizes access to management of audit functionality to only [Assignment: organization-defined subset of privileged users].
|AU-9 (4)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-9(4):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-9 (4) What is the solution and how is it implemented?|
|---|
||
# |
AU-11 Audit Record Retention (M) | Refer to the specific section and subsections for details. | The organization retains audit records for [FedRAMP Assignment: at least ninety (90) days] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.<br>
<b>AU-11 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements
|AU-11|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-11:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-11 What is the solution and how is it implemented?|
|---|
||
# |
AU-12 Audit Generation (L) (M) (H) | Refer to the specific section and subsections for details. | The information system:
<ol type="a">
<li>Provides audit record generation capability for the auditable events defined in AU-2 a. at [FedRAMP Assignment: all information system components where audit capability is deployed/available];</li>
<li>Allows [Assignment: organization-defined personnel or roles] to select which auditable events are to be audited by specific components of the information system; and</li>
<li>Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.</li>
</ol>
|AU-12|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter AU-12(a):
|Parameter AU-12(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|AU-12 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
---
title: Security Assessment and Authorization (CA)
--- |
Security Assessment and Authorization (CA) | Refer to the specific section and subsections for details. | # |
CA-1 Certification, Authorization, Security Assessment Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Security assessment and authorization policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Security assessment and authorization procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|CA-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-1(a):
|Parameter CA-1(b)(1):
|Parameter CA-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|CA-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CA-2 Security Assessments (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops a security assessment plan that describes the scope of the assessment including:</li>
<ol type="1">
<li>Security controls and control enhancements under assessment;</li>
<li>Assessment procedures to be used to determine security control effectiveness; and</li>
<li>Assessment environment, assessment team, and assessment roles and responsibilities;</li>
</ol>
<li>Assesses the security controls in the information system and its environment of operation [FedRAMP Assignment: at least annually] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;</li>
<li>Produces a security assessment report that documents the results of the assessment; and</li>
<li>Provides the results of the security control assessment to [FedRAMP Assignment: individuals or roles to include the FedRAMP Program Management Office (PMO)].</li>
<b>CA-2 Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Annual Assessment Guidance https://www.fedramp.gov/documents/
</ol>
|CA-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(b):
|Parameter CA-2(d):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
# |
CA-2 (1) Control Enhancement (L) (M) (H) | Refer to the specific section and subsections for details. | The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.<br>
<b>CA-2 (1) Additional FedRAMP Requirements and Guidance: </b><br>
<b>Requirement:</b> For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).
|CA-2 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-2 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization includes as part of security control assessments, [FedRAMP Assignment: at least annually], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].<br>
<b>CA-2 (2) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> To include 'announced', 'vulnerability scanning’ to occur at least annually.
|CA-2 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(2)-1:
|Parameter CA-2(2)-2:
|Parameter CA-2(2)-3:
|Parameter CA-2(2)-4:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (2) What is the solution and how is it implemented?|
|---|
||
# |
CA-2 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization accepts the results of an assessment of [FedRAMP Assignment: organization-defined information system] performed by [FedRAMP Assignment: any FedRAMP Accredited 3PAO] when the assessment meets [FedRAMP Assignment: the conditions of the JAB/AO in the FedRAMP Repository].
|CA-2 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(3)-1:
|Parameter CA-2(3)-2:
|Parameter CA-2(3)-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (3) What is the solution and how is it implemented?|
|---|
||
# |
CA-3 System Interconnections (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;</li>
<li>Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and</li>
<li>Reviews and updates Interconnection Security Agreements [FedRAMP Assignment: at least annually and on input from FedRAMP].</li>
</ol>
|Authorized Connections Information System Name|Name of Organization CSP Name System Connects To|Role and Name of Person Who Signed Connection Agreement|Name and Date of Interconnection Agreement|
|---|---|---|---|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|CA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 What is the solution and how is it implemented?|
|---|
|Part a: See System Interconnections for information about implementation.|
|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|
|Part c|
# |
CA-3 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].<br>
<b>CA-3 (3) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Refer to Appendix H – Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22
|CA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 What is the solution and how is it implemented?|
|---|
|Part a: See System Interconnections for information about implementation.|
|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|
|Part c|
# |
CA-3 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].<br>
<b>CA-3 (3) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Refer to Appendix H – Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22
|CA-3 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(3)-1:
|Parameter CA-3(3)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 (3) What is the solution and how is it implemented?|
|---|
||
# |
CA-3 (5) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization employs [Selection: allow-all, deny-by-exception, deny-all, permit by exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.<br>
<b>CA-3 (5) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> For JAB Authorization, CSPs shall include details of this control in their architecture briefing.
|CA-3 (5)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(5)-1:
|Parameter CA-3(5)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 (5) What is the solution and how is it implemented?|
|---|
||
# |
CA-5 Plan of Action and Milestones (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and</li>
<li>Updates existing plan of action and milestones [FedRAMP Assignment: at least monthly] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.</li>
<b>CA-5 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Plan of Action & Milestones (POA&M) must be provided at least monthly.
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Plan of Action and Milestones (POA&M) Template Completion Guide
https://www.FedRAMP.gov/documents/
</ol>
|CA-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-5(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-5 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CA-6 Security Authorization (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Assigns a senior-level executive or manager as the authorizing official for the information system;</li>
<li>Ensures that the authorizing official authorizes the information system for processing before commencing operations; and</li>
<li>Updates the security authorization [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs].</li>
<b>CA-6c Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
</ol>
|CA-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-6(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-6 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CA-7 Continuous Monitoring (L) (M) (H) | Refer to the specific section and subsections for details. | The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:
<ol type="a">
<li>Establishment of [Assignment: organization-defined metrics] to be monitored;</li>
<li>Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;</li>
<li>Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;</li>
<li>Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;</li>
<li>Correlation and analysis of security-related information generated by assessments and monitoring;</li>
<li>Response actions to address results of the analysis of security-related information; and</li>
<li>Reporting the security status of organization and the information system to [FedRAMP Assignment: to meet Federal and FedRAMP requirements] [Assignment: organization-defined frequency].</li>
<b>CA-7 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.<br>
<b>Guidance:</b> CSPs must provide evidence of closure and remediation of a high vulnerability within the timeframe for standard POA&M updates.<br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Continuous Monitoring Strategy Guide
https://www.fedramp.gov/documents/
</ol>
|CA-7|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-7(a):
|Parameter CA-7(b)-1:
|Parameter CA-7(b)-2:
|Parameter CA-7(g)-1:
|Parameter CA-7(g)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
|Part e|
|Part f|
|Part g|
<b>CA-7 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement 1:</b> Operating System Scans: at least monthly<br>
<b>Requirement 2:</b> Database and Web Application Scans: at least monthly<br>
<b>Requirement 3:</b> All scans performed by Independent Assessor: at least annually<br>
|CA-7 Req.|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 What is the solution and how is it implemented?|
|---|
|Req. 1|
|Req. 2|
|Req. 3|
# |
CA-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.
|CA-7 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-7(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-8 Penetration Testing (M) (H) | Refer to the specific section and subsections for details. | The organization conducts penetration testing [FedRAMP Assignment: at least annually] on [Assignment: organization-defined information systems or system components].
<b>CA-8 Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Penetration Test Guidance
https://www.fedramp.gov/documents/
|CA-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-8-1:
|Parameter CA-8-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-8 What is the solution and how is it implemented?|
|---|
||
# |
CA-8 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.
|CA-8 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-8 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-9 Internal System Connections (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and</li>
<li>Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.</li>
</ol>
|CA-9|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-9(a):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-9 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
---
title: Configuration Management (CM)
--- |
Configuration Management (CM) | Refer to the specific section and subsections for details. | # |
CM-1 Configuration Management Policies and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Configuration management policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Configuration management procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|CM-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CM-1(a):
|Parameter CM-1(b)(1):
|Parameter CM-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|CM-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-2 Baseline Configuration (L) (M) (H) | Refer to the specific section and subsections for details. | The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system.
|CM-2|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-2 What is the solution and how is it implemented?|
|---|
|Part a|
# |
CM-2 (1) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization reviews and updates the baseline configuration of the information system:
<ol type="a">
<li>[FedRAMP Assignment: at least annually];</li>
<li>When required due to [FedRAMP Assignment: to include when directed by the JAB]; and</li>
<li>As an integral part of information system component installations and upgrades.</li>
</ol>
|CM-2 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CM-2(1)(a):
|Parameter CM-2(1)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-2 (1) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CM-2 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system.
|CM-2 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-2 (2) What is the solution and how is it implemented?|
|---|
||
# |
CM-2 (3) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback.
|CM-2 (3)|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-2(3):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-2 (3) What is the solution and how is it implemented?|
|---|
||
# |
CM-2 (7) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Issues [Assignment: organization-defined information systems, system components, or devices] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk; and</li>
<li>Applies [Assignment: organization-defined security safeguards] to the devices when the individuals return.</li>
</ol>
|CM-2 (7)|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-2(7)(a)-1:
|Parameter CM-2(7)(a)-2:
|Parameter CM-2(7)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-2 (7) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-3 Configuration Change Control (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>(a) Determines the types of changes to the information system that are configuration-controlled;</li>
<li>Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;</li>
<li>Documents configuration change decisions associated with the information system; </li>
<li>Implements approved configuration-controlled changes to the information system; </li>
<li>Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period];</li>
<b>CM-3 (e) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> In accordance with record retention policies and procedures.
<li>Audits and reviews activities associated with configuration-controlled changes to the information system; and</li>
<li>Coordinates and provides oversight for configuration change control activities through [FedRAMP Assignment: see additional FedRAMP requirements and guidance] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]].</li>
<b>CM-3 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.
</ol>
|CM-3|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-3(e):
|Parameter CM-3(g)-1:
|Parameter CM-3(g)-2:
|Parameter CM-3(g)-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-3 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
|Part e|
|Part f|
|Part g|
# |
CM-4 Security Impact Analysis (L) (M) (H) | Refer to the specific section and subsections for details. | The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.
|CM-4|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-4 What is the solution and how is it implemented?|
|---|
||
# |
CM-5 Access Restrictions for Change (M) (H) | Refer to the specific section and subsections for details. | The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system.
|CM-5|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-5 What is the solution and how is it implemented?|
|---|
||
# |
CM-5 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system enforces access restrictions and supports auditing of the enforcement actions.
|CM-5 (1)|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-5 (1) What is the solution and how is it implemented?|
|---|
||
# |
CM-5 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system prevents the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.<br>
<b>CM-5 (3) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be used.
|CM-5 (3)|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-5(3):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-5 (3) What is the solution and how is it implemented?|
|---|
||
# |
CM-5 (5) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Limits privileges to change information system components and system-related information within a production or operational environment; and</li>
<li>Reviews and reevaluates privileges [FedRAMP Assignment: at least quarterly].</li>
</ol>
|CM-5 (5)|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-5(5):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-5 (5) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-6 Configuration Settings (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes and documents configuration settings for information technology products employed within the information system using [FedRAMP Assignment: see CM-6(a) Additional FedRAMP Requirements and Guidance] that reflect the most restrictive mode consistent with operational requirements;</li>
<b>CM-6(a) Additional FedRAMP Requirements and Guidance: </b><br>
<b>Requirement 1:</b> The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.<br>
<b>Requirement 2:</b> The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).<br>
<b>Guidance:</b> Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.
</ol>
</ol>
<ol type="a">
<li>Implements the configuration settings;</li>
<li>Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment: organization-defined operational requirements]; and</li>
<li>Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.</li>
</ol>
|CM-6|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-6(a)-1:
|Parameter CM-6(a)-2:
|Parameter CM-6(c)-1:
|Parameter CM-6(c)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-6 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
# |
CM-6 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for [Assignment: organization-defined information system components].
|CM-6|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-6(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-6 What is the solution and how is it implemented?|
|---|
|Part a|
# |
CM-7 Least Functionality (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Configures the information system to provide only essential capabilities; and</li>
<li>Prohibits or restricts the use of the following functions, ports, protocols, and/or services [FedRAMP Assignment: United States Government Configuration Baseline (USGCB)]</li>
<b>CM-7 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.<br>
<b>Guidance:</b> Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline
Partially derived from AC-17 (8).
</ol>
|CM-7|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-7:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-7 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Reviews the information system [FedRAMP Assignment: at least Monthly] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and</li>
<li>Disables [Assignment: organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure].</li>
</ol>
|CM-7 (1) |Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-7(1)(a):
|Parameter CM-7(1)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-7 (1) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-7 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The information system prevents program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].<br>
<b>CM-7 (2) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e., white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.
|CM-7 (2) |Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-7(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-7 (2) What is the solution and how is it implemented?|
|---|
||
# |
CM-7 (5) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Identifies [Assignment: organization-defined software programs authorized to execute on the information system];</li>
<li>Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and</li>
<li>Reviews and updates the list of authorized software programs [FedRAMP Assignment: at least annually or when there is a change].</li>
</ol>
|CM-7 (5) |Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-7(5)(a):
|Parameter CM-7(5)(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-7 (5) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CM-8 Information System Component Inventory (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops and documents an inventory of information system components that:</li>
<ol type="1">
<li>Accurately reflects the current information system;</li>
<li>Includes all components within the authorization boundary of the information system;</li>
<li>Is at the level of granularity deemed necessary for tracking and reporting; and</li>
</ol>
<li>Includes [Assignment: organization-defined information deemed necessary to achieve effective information system component accountability]; and</li>
<li>Reviews and updates the information system component inventory [FedRAMP Assignment: at least monthly].</li>
<b>CM-8 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Must be provided at least monthly or when there is a change.
</ol>
|CM-8 |Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-8(a)(4):
|Parameter CM-8(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-8 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-8 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.
<b>Instruction:</b> A description of the inventory information is documented in Section 10. It is not necessary to re-document it here.<br>
Delete this and all other instructions from your final version of this document.
|CM-8 (1)|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-8 (1) What is the solution and how is it implemented?|
|---|
||
# |
CM-8 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Employs automated mechanisms [FedRAMP Assignment: Continuously, using automated mechanisms with a maximum five-minute delay in detection] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and</li>
<li>Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]].</li>
</ol>
|CM-8 (3)|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-8 (3) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CM-8 (5) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories.
|CM-8 (5)|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-8 (5) What is the solution and how is it implemented?|
|---|
||
# |
CM-9 Configuration Management Plan (M) (H) | Refer to the specific section and subsections for details. | The organization develops, documents, and implements a configuration management plan for the information system that:
<ol type="a">
<li>Addresses roles, responsibilities, and configuration management processes and procedures;</li>
<li>Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;</li>
<li>Defines the configuration items for the information system and places the configuration items under configuration management; and</li>
<li>Protects the configuration management plan for unauthorized disclosure and modification.</li>
</ol>
|CM-9|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-9 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
# |
CM-10 Software Usage Restrictions (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Uses software and associated documentation in accordance with contract agreements and copyright laws;</li>
<li>Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and</li>
<li>Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.</li>
</ol>
|CM-10|Control Summary Information|
|---|--|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-10 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CM-10 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].
CM-10|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-10(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-10 What is the solution and how is it implemented?|
|---|
||
# |
CM-11 User-Installed Software (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes [Assignment: organization-defined policies] governing the installation of software by users;</li>
<li>Enforces software installation policies through [Assignment: organization-defined methods]; and</li>
<li>Monitors policy compliance [FedRAMP Assignment: Continuously (via CM-7 (5))].</li>
</ol>
CM-11|Control Summary Information|
|---|--|
|Responsible Role:
|Parameter CM-11(a):
|Parameter CM-11(b):
|Parameter CM-11(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CM-11 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
---
title: Contingency Planning (CP)
--- |
Contingency Planning (CP) | Refer to the specific section and subsections for details. | # |
CP-1 Contingency Planning Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Contingency planning policy [FedRAMP Assignment: at least every three (3) years].; and</li>
<li>Contingency planning procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|CP-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CP-1(a):
|Parameter CP-1(b)(1):
|Parameter CP-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|CP-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CP-2 Contingency Plan (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops a contingency plan for the information system that:</li>
<ol type="1">
<li>Identifies essential missions and business functions and associated contingency requirements;</li>
<li>Provides recovery objectives, restoration priorities, and metrics;</li>
<li>Addresses contingency roles, responsibilities, assigned individuals with contact information;</li>
<li>Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;</li>
<li>Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and</li>
<li>Is reviewed and approved by [Assignment: organization-defined personnel or roles];</li>
</ol>
<li>Distributes copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];</li>
<li>Coordinates contingency planning activities with incident handling activities;</li>
<li>Reviews the contingency plan for the information system [FedRAMP Assignment: at least annually];</li>
<li>Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;</li>
<li>Communicates contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements]; and</li>
<li>Protects the contingency plan from unauthorized disclosure and modification.</li>
<b>CP-2 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> For JAB authorizations the contingency lists include designated FedRAMP personnel.
</ol>
|CP-2|Control Summary Information|
|---|---|
|Responsible Role
|Parameter CP-2(a)(6):
|Parameter CP-2(b):
|Parameter CP-2(d):
|Parameter CP-2(f):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-2 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
|Part e|
|Part f|
|Part g|
# |
CP-2 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization coordinates contingency plan development with organizational elements responsible for related plans.
|CP-2 (1)|Control Summary Information|
|---|---|
|Responsible Role
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
# |
CP-2 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.
|CP-2 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
# |
CP-2 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization plans for the resumption of essential missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.
|CP-2 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CP-2(3):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
# |
CP-2 (8) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization identifies critical information system assets supporting essential missions and business functions.
|CP-2 (8)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-2 (8) What is the solution and how is it implemented?|
|---|
||
# |
CP-3 Contingency Training (L) (M) (H) | Refer to the specific section and subsections for details. | The organization provides contingency training to information system users consistent with assigned roles and responsibilities:
<ol type="a">
<li>Within [FedRAMP Assignment: ten (10) days] of assuming a contingency role or responsibility;</li>
<li>When required by information system changes; and</li>
<li>[FedRAMP Assignment: at least annually] thereafter.</li>
</ol>
|CP-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CP-3(a):
|Parameter CP-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-3 What is the solution and how is it implemented?|
|---|
||
# |
CP-4 Contingency Plan Testing (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Tests the contingency plan for the information system [FedRAMP Assignment: at least annually] using [FedRAMP Assignment: functional exercises] to determine the effectiveness of the plan and the organizational readiness to execute the plan;</li>
<b>CP-4(a) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended) and provides plans to FedRAMP prior to initiating testing. Test plans are approved and accepted by the JAB/AO prior to initiating testing.
<li>Reviews the contingency plan test results; and</li>
<li>Initiates corrective actions, if needed.</li>
</ol>
|CP-4|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-4 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CP-4 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization coordinates contingency plan testing and/or exercises with organizational elements responsible for related plans.
|CP-4 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-4 (1) What is the solution and how is it implemented?|
|---|
||
# |
CP-6 Alternate Storage Site (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and</li>
<li>Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.</li>
</ol>
|CP-6 |Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-6 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CP-6 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.
|CP-6 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-6 (1) What is the solution and how is it implemented?|
|---|
||
# |
CP-6 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP-6 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-6 (3) What is the solution and how is it implemented?|
|---|
||
# |
CP-7 Alternate Processing Site (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined information system operations] for essential missions/business functions within [FedRAMP Assignment: see additional FedRAMP requirements and guidance] when the primary processing capabilities are unavailable;</li>
<b>CP-7a Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
<li>Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption; and</li>
<li>Ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.</li>
</ol>
CP-7|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CP-7(a)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-7 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CP-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.<br>
<b>CP-7 (1) Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber-attack), the degree of separation between sites will be less relevant.
CP-7 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-7 (1) What is the solution and how is it implemented?|
|---|
||
# |
CP-7 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP-7 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-7 (2) What is the solution and how is it implemented?|
|---|
||
# |
CP-7 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
CP-7 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-7 (3) What is the solution and how is it implemented?|
|---|
||
# |
CP-8 Telecommunications Services (M) (H) | Refer to the specific section and subsections for details. | The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of [Assignment: organization-defined information system operations] for essential missions and business functions within [FedRAMP Assignment: See CP-8 additional FedRAMP requirements and guidance] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.<br>
<b>CP-8 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider defines a time period consistent with the recovery time objectives and business impact analysis.
CP-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CP-8-1:
|Parameter CP-8-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-8 What is the solution and how is it implemented?|
|---|
||
1. CP-8 (1) Control Enhancement (M) (H)
The organization:
<ol type="a">
<li>Develops primary and alternate telecommunications service agreements that contain priority- of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and</li>
<li>Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and/or alternate telecommunications services are provided by a common carrier.</li>
</ol>
CP-8 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-8 (1) What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CP-8 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
CP-8 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CP-8 (2) What is the solution and how is it implemented?|
|---|
||
# |
Subsets and Splits