Risk Management Framework Rev. 4
Information security controls protect the confidentiality, integrity and/or availability of information (the so-called CIA Triad). Again, some would add further categories such as non-repudiation and accountability, depending on how narrowly or broadly the CIA Triad is defined.
Individual controls are often designed to act together to increase effective protection. Systems of controls can be referred to as frameworks or standards. Frameworks can enable an organization to manage security controls across different types of assets with consistency. For example, a framework can help an organization manage controls over access regardless of the type of computer operating system. This also enables an organization to assess overall risk. Risk-aware organizations may choose proactively to specify, design, implement, operate and maintain their security controls, usually by assessing the risks and implementing a comprehensive security management framework such as ISO27001:2013, the Information Security Forum’s Standard of Good Practice for Information Security, or NIST SP 800-53.
- RMF Control
- AC-1
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- AC-1b.
- Reviews and updates the current:
- AC-1.1 - CCI-002107
- The organization defines the personnel or roles to be recipients of the access control policy necessary to facilitate the implementation of the access control policy and associated access controls.
- AC-1.2 - CCI-002108
- The organization defines the personnel or roles to be recipients of the procedures necessary to facilitate the implementation of the access control policy and associated access controls.
- AC-1.3 - CCI-000001
- The organization develops and documents an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AC-1.4 - CCI-000002
- The organization disseminates the access control policy to organization-defined personnel or roles.
- AC-1.5 - CCI-000004
- The organization develops and documents procedures to facilitate the implementation of the access control policy and associated access controls.
- AC-1.6 - CCI-000005
- The organization disseminates the procedures to facilitate access control policy and associated access controls to the organization-defined personnel or roles.
- AC-1.8 - CCI-001545
- The organization defines a frequency for reviewing and updating the access control policy.
- AC-1.7 - CCI-000003
- The organization reviews and updates the access control policy in accordance with organization-defined frequency.
- AC-1.10 - CCI-001546
- The organization defines a frequency for reviewing and updating the access control procedures.
- AC-1.9 - CCI-000006
- The organization reviews and updates the access control procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- AC-2
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-2a.
- Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
- AC-2b.
- Assigns account managers for information system accounts;
- AC-2c.
- Establishes conditions for group and role membership;
- AC-2d.
- Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;
- AC-2e.
- Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;
- AC-2f.
- Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions];
- AC-2g.
- Monitors the use of information system accounts;
- AC-2h.
- Notifies account managers:
- AC-2i.
- Authorizes access to the information system based on:
- AC-2j.
- Reviews accounts for compliance with account management requirements [Assignment: organization-defined frequency]; and
- AC-2k.
- Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
- AC-2.1 - CCI-002110
- The organization defines the information system account types that support the organizational missions/business functions.
- AC-2.2 - CCI-002111
- The organization identifies and selects the organization-defined information system account types of information system accounts which support organizational missions/business functions.
- AC-2.3 - CCI-002112
- The organization assigns account managers for information system accounts.
- AC-2.4 - CCI-000008
- The organization establishes conditions for group membership.
- AC-2.5 - CCI-002113
- The organization establishes conditions for role membership.
- AC-2.6 - CCI-002115
- The organization specifies authorized users of the information system.
- AC-2.7 - CCI-002116
- The organization specifies authorized group membership on the information system.
- AC-2.8 - CCI-002117
- The organization specifies authorized role membership on the information system.
- AC-2.9 - CCI-002118
- The organization specifies access authorizations (i.e., privileges) for each account on the information system.
- AC-2.10 - CCI-002119
- The organization specifies other attributes for each account on the information system.
- AC-2.12 - CCI-002120
- The organization defines the personnel or roles authorized to approve the creation of information system accounts.
- AC-2.11 - CCI-000010
- The organization requires approvals by organization-defined personnel or roles for requests to create information system accounts.
- AC-2.14 - CCI-002121
- The organization defines the procedures or conditions to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
- AC-2.13 - CCI-000011
- The organization creates, enables, modifies, disables, and removes information system accounts in accordance with organization-defined procedures or conditions.
- AC-2.15 - CCI-002122
- The organization monitors the use of information system accounts.
- AC-2.16 - CCI-002123
- The organization notifies account managers when accounts are no longer required.
- AC-2.17 - CCI-002124
- The organization notifies account managers when users are terminated or transferred.
- AC-2.18 - CCI-002125
- The organization notifies account managers when individual information system usage or need-to-know changes.
- AC-2.19 - CCI-002126
- The organization authorizes access to the information system based on a valid access authorization.
- AC-2.20 - CCI-002127
- The organization authorizes access to the information system based on intended system usage.
- AC-2.21 - CCI-002128
- The organization authorizes access to the information system based on other attributes as required by the organization or associated missions/business functions.
- AC-2.22 - CCI-000012
- The organization reviews information system accounts for compliance with account management requirements per organization-defined frequency.
- AC-2.23 - CCI-001547
- The organization defines the frequency on which it will review information system accounts for compliance with account management requirements.
- AC-2.24 - CCI-002129
- The organization establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- AC-10 - Concurrent Session Control
- AC-17 - Remote Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Information Systems
- AU-9 - Protection Of Audit Information
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-11 - User-Installed Software
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- PL-4 - Rules Of Behavior
- SC-13 - Cryptographic Protection
- AC-2 (1) - Automated System Account Management
- The organization employs automated mechanisms to support the management of information system accounts.
- AC-2 (2) - Removal Of Temporary / Emergency Accounts
- The information system automatically [Selection: removes; disables] temporary and emergency accounts after [Assignment: organization-defined time period for each type of account].
- AC-2 (3) - Disable Inactive Accounts
- The information system automatically disables inactive accounts after [Assignment: organization-defined time period].
- AC-2 (4) - Automated Audit Actions
- The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies [Assignment: organization-defined personnel or roles].
- AC-2 (5) - Inactivity Logout
- The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].
- AC-2 (6) - Dynamic Privilege Management
- The information system implements the following dynamic privilege management capabilities: [Assignment: organization-defined list of dynamic privilege management capabilities].
- AC-2 (7) - Role-Based Schemes
- The organization:
- AC-2 (8) - Dynamic Account Creation
- The information system creates [Assignment: organization-defined information system accounts] dynamically.
- AC-2 (9) - Restrictions On Use Of Shared / Group Accounts
- The organization only permits the use of shared/group accounts that meet [Assignment: organization-defined conditions for establishing shared/group accounts].
- AC-2 (10) - Shared / Group Account Credential Termination
- The information system terminates shared/group account credentials when members leave the group.
- AC-2 (11) - Usage Conditions
- The information system enforces [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined information system accounts].
- AC-2 (12) - Account Monitoring / Atypical Usage
- The organization:
- AC-2 (13) - Disable Accounts For High-Risk Individuals
- The organization disables accounts of users posing a significant risk within [Assignment: organization-defined time period] of discovery of the risk.
- RMF Control
- AC-3
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-3.1 - CCI-000213
- The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
- AC-2 - Account Management
- AC-4 - Information Flow Enforcement
- AC-5 - Separation Of Duties
- AC-6 - Least Privilege
- AC-16 - Security Attributes
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Information Systems
- AC-21 - Information Sharing
- AC-22 - Publicly Accessible Content
- AU-9 - Protection Of Audit Information
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-11 - User-Installed Software
- MA-3 - Maintenance Tools
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- PE-3 - Physical Access Control
- AC-3 (1) - Restricted Access To Privileged Functions
- [Withdrawn: Incorporated into AC-6].
- AC-3 (2) - Dual Authorization
- The information system enforces dual authorization for [Assignment: organization-defined privileged commands and/or other organization-defined actions].
- AC-3 (3) - Mandatory Access Control
- The information system enforces [Assignment: organization-defined mandatory access control policy] over all subjects and objects where the policy:
- AC-3 (4) - Discretionary Access Control
- The information system enforces [Assignment: organization-defined discretionary access control policy] over defined subjects and objects where the policy specifies that a subject that has been granted access to information can do one or more of the following:
- AC-3 (5) - Security-Relevant Information
- The information system prevents access to [Assignment: organization-defined security-relevant information] except during secure, non-operable system states.
- AC-3 (6) - Protection Of User And System Information
- [Withdrawn: Incorporated into MP-4 and SC-28].
- AC-3 (7) - Role-Based Access Control
- The information system enforces a role-based access control policy over defined subjects and objects and controls access based upon [Assignment: organization-defined roles and users authorized to assume such roles].
- AC-3 (8) - Revocation Of Access Authorizations
- The information system enforces the revocation of access authorizations resulting from changes to the security attributes of subjects and objects based on [Assignment: organization-defined rules governing the timing of revocations of access authorizations].
- AC-3 (9) - Controlled Release
- The information system does not release information outside of the established system boundary unless:
- AC-3 (10) - Audited Override Of Access Control Mechanisms
- The organization employs an audited override of automated access control mechanisms under [Assignment: organization-defined conditions].
- RMF Control
- AC-4
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-4.1 - CCI-001368
- The information system enforces approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies.
- AC-4.2 - CCI-001414
- The information system enforces approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies.
- AC-4.3 - CCI-001548
- The organization defines the information flow control policies for controlling the flow of information within the system.
- AC-4.4 - CCI-001549
- The organization defines the information flow control policies for controlling the flow of information between interconnected systems.
- AC-4.5 - CCI-001550
- The organization defines approved authorizations for controlling the flow of information within the system.
- AC-4.6 - CCI-001551
- The organization defines approved authorizations for controlling the flow of information between interconnected systems.
- AC-3 - Access Enforcement
- AC-17 - Remote Access
- AC-19 - Access Control For Mobile Devices
- AC-21 - Information Sharing
- CM-6 - Configuration Settings
- CM-7 - Least Functionality
- SA-8 - Security Engineering Principles
- SC-2 - Application Partitioning
- SC-5 - Denial Of Service Protection
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- AC-4 (1) - Object Security Attributes
- The information system uses [Assignment: organization-defined security attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
- AC-4 (2) - Processing Domains
- The information system uses protected processing domains to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
- AC-4 (3) - Dynamic Information Flow Control
- The information system enforces dynamic information flow control based on [Assignment: organization-defined policies].
- AC-4 (4) - Content Check Encrypted Information
- The information system prevents encrypted information from bypassing content-checking mechanisms by [Selection (one or more): decrypting the information; blocking the flow of the encrypted information; terminating communications sessions attempting to pass encrypted information; [Assignment: organization-defined procedure or method]].
- AC-4 (5) - Embedded Data Types
- The information system enforces [Assignment: organization-defined limitations] on embedding data types within other data types.
- AC-4 (6) - Metadata
- The information system enforces information flow control based on [Assignment: organization-defined metadata].
- AC-4 (7) - One-Way Flow Mechanisms
- The information system enforces [Assignment: organization-defined one-way information flows] using hardware mechanisms.
- AC-4 (8) - Security Policy Filters
- The information system enforces information flow control using [Assignment: organization-defined security policy filters] as a basis for flow control decisions for [Assignment: organization-defined information flows].
- AC-4 (9) - Human Reviews
- The information system enforces the use of human reviews for [Assignment: organization-defined information flows] under the following conditions: [Assignment: organization-defined conditions].
- AC-4 (10) - Enable / Disable Security Policy Filters
- The information system provides the capability for privileged administrators to enable/disable [Assignment: organization-defined security policy filters] under the following conditions: [Assignment: organization-defined conditions].
- AC-4 (11) - Configuration Of Security Policy Filters
- The information system provides the capability for privileged administrators to configure [Assignment: organization-defined security policy filters] to support different security policies.
- AC-4 (12) - Data Type Identifiers
- The information system, when transferring information between different security domains, uses [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions.
- AC-4 (13) - Decomposition Into Policy-Relevant Subcomponents
- The information system, when transferring information between different security domains, decomposes information into [Assignment: organization-defined policy-relevant subcomponents] for submission to policy enforcement mechanisms.
- AC-4 (14) - Security Policy Filter Constraints
- The information system, when transferring information between different security domains, implements [Assignment: organization-defined security policy filters] requiring fully enumerated formats that restrict data structure and content.
- AC-4 (15) - Detection Of Unsanctioned Information
- The information system, when transferring information between different security domains, examines the information for the presence of [Assignment: organized-defined unsanctioned information] and prohibits the transfer of such information in accordance with the [Assignment: organization-defined security policy].
- AC-4 (16) - Information Transfers On Interconnected Systems
- [Withdrawn: Incorporated into AC-4].
- AC-4 (17) - Domain Authentication
- The information system uniquely identifies and authenticates source and destination points by [Selection (one or more): organization, system, application, individual] for information transfer.
- AC-4 (18) - Security Attribute Binding
- The information system binds security attributes to information using [Assignment: organization-defined binding techniques] to facilitate information flow policy enforcement.
- AC-4 (19) - Validation Of Metadata
- The information system, when transferring information between different security domains, applies the same security policy filtering to metadata as it applies to data payloads.
- AC-4 (20) - Approved Solutions
- The organization employs [Assignment: organization-defined solutions in approved configurations] to control the flow of [Assignment: organization-defined information] across security domains.
- AC-4 (21) - Physical / Logical Separation Of Information Flows
- The information system separates information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].
- AC-4 (22) - Access Only
- The information system provides access from a single device to computing platforms, applications, or data residing on multiple different security domains, while preventing any information flow between the different security domains.
- RMF Control
- AC-5
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-5a.
- Separates [Assignment: organization-defined duties of individuals];
- AC-5b.
- Documents separation of duties of individuals; and
- AC-5c.
- Defines information system access authorizations to support separation of duties.
- AC-5.2 - CCI-002219
- The organization defines the duties of individuals that are to be separated.
- AC-5.1 - CCI-000036
- The organization separates organization-defined duties of individuals.
- AC-5.3 - CCI-001380
- The organization documents separation of duties of individuals.
- AC-5.4 - CCI-002220
- The organization defines information system access authorizations to support separation of duties.
- RMF Control
- AC-6
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-6.1 - CCI-000225
- The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
- AC-6 (1) - Authorize Access To Security Functions
- The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].
- AC-6 (2) - Non-Privileged Access For Nonsecurity Functions
- The organization requires that users of information system accounts, or roles, with access to [Assignment: organization-defined security functions or security-relevant information], use non-privileged accounts or roles, when accessing nonsecurity functions.
- AC-6 (3) - Network Access To Privileged Commands
- The organization authorizes network access to [Assignment: organization-defined privileged commands] only for [Assignment: organization-defined compelling operational needs] and documents the rationale for such access in the security plan for the information system.
- AC-6 (4) - Separate Processing Domains
- The information system provides separate processing domains to enable finer-grained allocation of user privileges.
- AC-6 (5) - Privileged Accounts
- The organization restricts privileged accounts on the information system to [Assignment: organization-defined personnel or roles].
- AC-6 (6) - Privileged Access By Non-Organizational Users
- The organization prohibits privileged access to the information system by non-organizational users.
- AC-6 (7) - Review Of User Privileges
- The organization:
- AC-6 (8) - Privilege Levels For Code Execution
- The information system prevents [Assignment: organization-defined software] from executing at higher privilege levels than users executing the software.
- AC-6 (9) - Auditing Use Of Privileged Functions
- The information system audits the execution of privileged functions.
- AC-6 (10) - Prohibit Non-Privileged Users From Executing Privileged Functions
- The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
- RMF Control
- AC-7
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-7a.
- Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
- AC-7b.
- Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
- AC-7.1 - CCI-000043
- The organization defines the maximum number of consecutive invalid logon attempts to the information system by a user during an organization-defined time period.
- AC-7.2 - CCI-000044
- The information system enforces the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period.
- AC-7.3 - CCI-001423
- The organization defines the time period in which the organization-defined maximum number of consecutive invalid logon attempts occur.
- AC-7.4 - CCI-002236
- The organization defines the time period the information system will automatically lock the account or node when the maximum number of unsuccessful attempts is exceeded.
- AC-7.5 - CCI-002237
- The organization defines the delay algorithm to be employed by the information system to delay the next login prompt when the maximum number of unsuccessful attempts is exceeded.
- AC-7.6 - CCI-002238
- The information system automatically locks the account or node for either an organization-defined time period, until the locked account or node is released by an administrator, or delays the next login prompt according to the organization-defined delay algorithm when the maximum number of unsuccessful attempts is exceeded.
- AC-7 (1) - Automatic Account Lock
- [Withdrawn: Incorporated into AC-7].
- AC-7 (2) - Purge / Wipe Mobile Device
- The information system purges/wipes information from [Assignment: organization-defined mobile devices] based on [Assignment: organization-defined purging/wiping requirements/techniques] after [Assignment: organization-defined number] consecutive, unsuccessful device logon attempts.
- RMF Control
- AC-8
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-8a.
- Displays to users [Assignment: organization-defined system use notification message or banner] before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:
- AC-8b.
- Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and
- AC-8c.
- For publicly accessible systems:
- AC-8.2 - CCI-002247
- The organization defines the use notification message or banner the information system displays to users before granting access to the system.
- AC-8.1 - CCI-000048
- The information system displays an organization-defined system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- AC-8.3 - CCI-002243
- The organization-defined information system use notification message or banner is to state that users are accessing a U.S. Government information system.
- AC-8.4 - CCI-002244
- The organization-defined information system use notification message or banner is to state that information system usage may be monitored, recorded, and subject to audit.
- AC-8.5 - CCI-002245
- The organization-defined information system use notification message or banner is to state that unauthorized use of the information system is prohibited and subject to criminal and civil penalties.
- AC-8.6 - CCI-002246
- The organization-defined information system use notification message or banner is to state that use of the information system indicates consent to monitoring and recording.
- AC-8.7 - CCI-000050
- The information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access.
- AC-8.8 - CCI-001384
- The information system, for publicly accessible systems, displays system use information organization-defined conditions before granting further access.
- AC-8.10 - CCI-001385
- The information system, for publicly accessible systems, displays references, if any, to monitoring that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.11 - CCI-001386
- The information system for publicly accessible systems displays references, if any, to recording that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.12 - CCI-001387
- The information system for publicly accessible systems displays references, if any, to auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities.
- AC-8.13 - CCI-001388
- The information system, for publicly accessible systems, includes a description of the authorized uses of the system.
- AC-8.9 - CCI-002248
- The organization defines the conditions of use which are to be displayed to users of the information system before granting further access.
- RMF Control
- AC-9
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- AC-9.1 - CCI-000052
- The information system notifies the user, upon successful logon (access) to the system, of the date and time of the last logon (access).
- AC-9 (1) - Unsuccessful Logons
- The information system notifies the user, upon successful logon/access, of the number of unsuccessful logon/access attempts since the last successful logon/access.
- AC-9 (2) - Successful / Unsuccessful Logons
- The information system notifies the user of the number of [Selection: successful logons/accesses; unsuccessful logon/access attempts; both] during [Assignment: organization-defined time period].
- AC-9 (3) - Notification Of Account Changes
- The information system notifies the user of changes to [Assignment: organization-defined security-related characteristics/parameters of the user�s account] during [Assignment: organization-defined time period].
- AC-9 (4) - Additional Logon Information
- The information system notifies the user, upon successful logon (access), of the following additional information: [Assignment: organization-defined information to be included in addition to the date and time of the last logon (access)].
- RMF Control
- AC-10
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- HIGH
- AC-10.1 - CCI-000054
- The information system limits the number of concurrent sessions for each organization-defined account and/or account type to an organization-defined number of sessions.
- AC-10.2 - CCI-000055
- The organization defines the maximum number of concurrent sessions to be allowed for each organization-defined account and/or account type.
- AC-10.3 - CCI-002252
- The organization defines the accounts for which the information system will limit the number of concurrent sessions.
- RMF Control
- AC-11
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-11a.
- Prevents further access to the system by initiating a session lock after [Assignment: organization-defined time period] of inactivity or upon receiving a request from a user; and
- AC-11b.
- Retains the session lock until the user reestablishes access using established identification and authentication procedures.
- AC-11.3 - CCI-000059
- The organization defines the time period of inactivity after which the information system initiates a session lock.
- AC-11.2 - CCI-000058
- The information system provides the capability for users to directly initiate session lock mechanisms.
- AC-11.4 - CCI-000056
- The information system retains the session lock until the user reestablishes access using established identification and authentication procedures.
- AC-7 - Unsuccessful Logon Attempts
- OMB Memorandum 06-16, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2006/m06-16.pdf
- AC-11 (1) - Pattern-Hiding Displays
- The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image.
- RMF Control
- AC-12
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-12.1 - CCI-002360
- The organization defines the conditions or trigger events requiring session disconnect to be employed by the information system when automatically terminating a user session.
- AC-12.2 - CCI-002361
- The information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect.
- AC-12 (1) - User-Initiated Logouts / Message Displays
- The information system:
- RMF Control
- AC-13
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- RMF Control
- AC-14
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-14a.
- Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and
- AC-14b.
- Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
- AC-14.1 - CCI-000061
- The organization identifies and defines organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions/business functions.
- AC-14.2 - CCI-000232
- The organization documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification and authentication.
- AC-14 (1) - Necessary Uses
- [Withdrawn: Incorporated into AC-14].
- RMF Control
- AC-15
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- RMF Control
- AC-16
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- AC-16a.
- Provides the means to associate [Assignment: organization-defined types of security attributes] having [Assignment: organization-defined security attribute values] with information in storage, in process, and/or in transmission;
- AC-16b.
- Ensures that the security attribute associations are made and retained with the information;
- AC-16c.
- Establishes the permitted [Assignment: organization-defined security attributes] for [Assignment: organization-defined information systems]; and
- AC-16d.
- Determines the permitted [Assignment: organization-defined values or ranges] for each of the established security attributes.
- AC-16.1 - CCI-002256
- The organization defines security attributes having organization-defined types of security attribute values which are associated with information in storage.
- AC-16.2 - CCI-002257
- The organization defines security attributes having organization-defined types of security attribute values which are associated with information in process.
- AC-16.3 - CCI-002258
- The organization defines security attributes, having organization-defined types of security attribute values, which are associated with information in transmission.
- AC-16.4 - CCI-002259
- The organization defines security attribute values associated with organization-defined types of security attributes for information in storage.
- AC-16.5 - CCI-002260
- The organization defines security attribute values associated with organization-defined types of security attributes for information in process.
- AC-16.6 - CCI-002261
- The organization defines security attribute values associated with organization-defined types of security attributes for information in transmission.
- AC-16.7 - CCI-002262
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in storage.
- AC-16.8 - CCI-002263
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in process.
- AC-16.9 - CCI-002264
- The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
- AC-16.10 - CCI-002265
- The organization ensures that the security attribute associations are made with the information.
- AC-16.11 - CCI-002266
- The organization ensures that the security attribute associations are retained with the information.
- AC-16.12 - CCI-002267
- The organization defines the security attributes that are permitted for organization-defined information systems.
- AC-16.13 - CCI-002268
- The organization defines the information systems for which permitted organization-defined attributes are to be established.
- AC-16.14 - CCI-002269
- The organization establishes the permitted organization-defined security attributes for organization-defined information systems.
- AC-16.15 - CCI-002270
- The organization defines the values or ranges permitted for each of the established security attributes.
- AC-16.16 - CCI-002271
- The organization determines the permitted organization-defined values or ranges for each of the established security attributes.
- AC-16 (1) - Dynamic Attribute Association
- The information system dynamically associates security attributes with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security policies] as information is created and combined.
- AC-16 (2) - Attribute Value Changes By Authorized Individuals
- The information system provides authorized individuals (or processes acting on behalf of individuals) the capability to define or change the value of associated security attributes.
- AC-16 (3) - Maintenance Of Attribute Associations By Information System
- The information system maintains the association and integrity of [Assignment: organization-defined security attributes] to [Assignment: organization-defined subjects and objects].
- AC-16 (4) - Association Of Attributes By Authorized Individuals
- The information system supports the association of [Assignment: organization-defined security attributes] with [Assignment: organization-defined subjects and objects] by authorized individuals (or processes acting on behalf of individuals).
- AC-16 (5) - Attribute Displays For Output Devices
- The information system displays security attributes in human-readable form on each object that the system transmits to output devices to identify [Assignment: organization-identified special dissemination, handling, or distribution instructions] using [Assignment: organization-identified human-readable, standard naming conventions].
- AC-16 (6) - Maintenance Of Attribute Association By Organization
- The organization allows personnel to associate, and maintain the association of [Assignment: organization-defined security attributes] with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security policies].
- AC-16 (7) - Consistent Attribute Interpretation
- The organization provides a consistent interpretation of security attributes transmitted between distributed information system components.
- AC-16 (8) - Association Techniques / Technologies
- The information system implements [Assignment: organization-defined techniques or technologies] with [Assignment: organization-defined level of assurance] in associating security attributes to information.
- AC-16 (9) - Attribute Reassignment
- The organization ensures that security attributes associated with information are reassigned only via re-grading mechanisms validated using [Assignment: organization-defined techniques or procedures].
- AC-16 (10) - Attribute Configuration By Authorized Individuals
- The information system provides authorized individuals the capability to define or change the type and value of security attributes available for association with subjects and objects.
- RMF Control
- AC-17
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-17a.
- Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
- AC-17b.
- Authorizes remote access to the information system prior to allowing such connections.
- AC-17.1 - CCI-000063
- The organization defines allowed methods of remote access to the information system.
- AC-17.2 - CCI-002310
- The organization establishes and documents usage restrictions for each type of remote access allowed.
- AC-17.3 - CCI-002311
- The organization establishes and documents configuration/connection requirements for each type of remote access allowed.
- AC-17.4 - CCI-002312
- The organization establishes and documents implementation guidance for each type of remote access allowed.
- AC-17.5 - CCI-000065
- The organization authorizes remote access to the information system prior to allowing such connections.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Information Systems
- CA-3 - System Interconnections
- CA-7 - Continuous Monitoring
- CM-8 - Information System Component Inventory
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-4 - Nonlocal Maintenance
- PE-17 - Alternate Work Site
- PL-4 - Rules Of Behavior
- SC-10 - Network Disconnect
- SI-4 - Information System Monitoring
- NIST Special Publication 800-46, http://csrc.nist.gov/publications/PubsSPs.html#800-46
- NIST Special Publication 800-77, http://csrc.nist.gov/publications/PubsSPs.html#800-77
- NIST Special Publication 800-113, http://csrc.nist.gov/publications/PubsSPs.html#800-113
- NIST Special Publication 800-114, http://csrc.nist.gov/publications/PubsSPs.html#800-114
- NIST Special Publication 800-121, http://csrc.nist.gov/publications/PubsSPs.html#800-121
- AC-17 (1) - Automated Monitoring / Control
- The information system monitors and controls remote access methods.
- AC-17 (2) - Protection Of Confidentiality / Integrity Using Encryption
- The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
- AC-17 (3) - Managed Access Control Points
- The information system routes all remote accesses through [Assignment: organization-defined number] managed network access control points.
- AC-17 (4) - Privileged Commands / Access
- The organization:
- AC-17 (5) - Monitoring For Unauthorized Connections
- [Withdrawn: Incorporated into SI-4].
- AC-17 (6) - Protection Of Information
- The organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
- AC-17 (7) - Additional Protection For Security Function Access
- [Withdrawn: Incorporated into AC-3 (10)].
- AC-17 (8) - Disable Nonsecure Network Protocols
- [Withdrawn: Incorporated into CM-7].
- AC-17 (9) - Disconnect / Disable Access
- The organization provides the capability to expeditiously disconnect or disable remote access to the information system within [Assignment: organization-defined time period].
- RMF Control
- AC-18
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-18a.
- Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
- AC-18b.
- Authorizes wireless access to the information system prior to allowing such connections.
- AC-18.1 - CCI-001438
- The organization establishes usage restrictions for wireless access.
- AC-18.3 - CCI-002323
- The organization establishes configuration/connection requirements for wireless access.
- AC-18.2 - CCI-001439
- The organization establishes implementation guidance for wireless access.
- AC-18.4 - CCI-001441
- The organization authorizes wireless access to the information system prior to allowing such connections.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-17 - Remote Access
- AC-19 - Access Control For Mobile Devices
- CA-3 - System Interconnections
- CA-7 - Continuous Monitoring
- CM-8 - Information System Component Inventory
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- IA-8 - Identification And Authentication (Non-Organizational Users)
- PL-4 - Rules Of Behavior
- SI-4 - Information System Monitoring
- NIST Special Publication 800-48, http://csrc.nist.gov/publications/PubsSPs.html#800-48
- NIST Special Publication 800-94, http://csrc.nist.gov/publications/PubsSPs.html#800-94
- NIST Special Publication 800-97, http://csrc.nist.gov/publications/PubsSPs.html#800-97
- AC-18 (1) - Authentication And Encryption
- The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
- AC-18 (2) - Monitoring Unauthorized Connections
- [Withdrawn: Incorporated into SI-4].
- AC-18 (3) - Disable Wireless Networking
- The organization disables, when not intended for use, wireless networking capabilities internally embedded within information system components prior to issuance and deployment.
- AC-18 (4) - Restrict Configurations By Users
- The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
- AC-18 (5) - Antennas / Transmission Power Levels
- The organization selects radio antennas and calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries.
- RMF Control
- AC-19
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-19a.
- Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and
- AC-19b.
- Authorizes the connection of mobile devices to organizational information systems.
- AC-19.1 - CCI-000082
- The organization establishes usage restrictions for organization controlled mobile devices.
- AC-19.3 - CCI-002325
- The organization establishes configuration requirements for organization controlled mobile devices.
- AC-19.4 - CCI-002326
- The organization establishes connection requirements for organization controlled mobile devices.
- AC-19.2 - CCI-000083
- The organization establishes implementation guidance for organization controlled mobile devices.
- AC-19.5 - CCI-000084
- The organization authorizes connection of mobile devices to organizational information systems.
- AC-3 - Access Enforcement
- AC-7 - Unsuccessful Logon Attempts
- AC-18 - Wireless Access
- AC-20 - Use Of External Information Systems
- CA-9 - Internal System Connections
- CM-2 - Baseline Configuration
- IA-2 - Identification And Authentication (Organizational Users)
- IA-3 - Device Identification And Authentication
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- PL-4 - Rules Of Behavior
- SC-7 - Boundary Protection
- SC-43 - Usage Restrictions
- SI-3 - Malicious Code Protection
- SI-4 - Information System Monitoring
- OMB Memorandum 06-16, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2006/m06-16.pdf
- NIST Special Publication 800-114, http://csrc.nist.gov/publications/PubsSPs.html#800-114
- NIST Special Publication 800-124, http://csrc.nist.gov/publications/PubsSPs.html#800-124
- NIST Special Publication 800-164, http://csrc.nist.gov/publications/PubsSPs.html#800-164
- AC-19 (1) - Use Of Writable / Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- AC-19 (2) - Use Of Personally Owned Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- AC-19 (3) - Use Of Portable Storage Devices With No Identifiable Owner
- [Withdrawn: Incorporated into MP-7].
- AC-19 (4) - Restrictions For Classified Information
- The organization:
- AC-19 (5) - Full Device / Container-Based Encryption
- The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
- RMF Control
- AC-20
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-20a.
- Access the information system from external information systems; and
- AC-20b.
- Process, store, or transmit organization-controlled information using external information systems.
- AC-20.1 - CCI-000093
- The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to access the information system from the external information systems.
- AC-20.2 - CCI-002332
- The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to process, store or transmit organization-controlled information using the external information systems.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- AC-20 (1) - Limits On Authorized Use
- The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:
- AC-20 (2) - Portable Storage Devices
- The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.
- AC-20 (3) - Non-Organizationally Owned Systems / Components / Devices
- The organization [Selection: restricts; prohibits] the use of non-organizationally owned information systems, system components, or devices to process, store, or transmit organizational information.
- AC-20 (4) - Network Accessible Storage Devices
- The organization prohibits the use of [Assignment: organization-defined network accessible storage devices] in external information systems.
- RMF Control
- AC-21
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- MODERATE, HIGH
- AC-21a.
- Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and
- AC-21b.
- Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.
- AC-21.1 - CCI-000098
- The organization facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information circumstances where user discretion is required.
- AC-21.2 - CCI-001470
- The organization defines information sharing circumstances where user discretion is required.
- AC-21.3 - CCI-001471
- The organization employs organization-defined automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
- AC-21.4 - CCI-001472
- The organization defines the automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
- AC-3 - Access Enforcement
- AC-21 (1) - Automated Decision Support
- The information system enforces information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.
- AC-21 (2) - Information Search And Retrieval
- The information system implements information search and retrieval services that enforce [Assignment: organization-defined information sharing restrictions].
- RMF Control
- AC-22
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- LOW, MODERATE, HIGH
- AC-22a.
- Designates individuals authorized to post information onto a publicly accessible information system;
- AC-22b.
- Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
- AC-22c.
- Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and
- AC-22d.
- Reviews the content on the publicly accessible information system for nonpublic information [Assignment: organization-defined frequency] and removes such information, if discovered.
- AC-22.1 - CCI-001473
- The organization designates individuals authorized to post information onto a publicly accessible information system.
- AC-22.2 - CCI-001474
- The organization trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information.
- AC-22.3 - CCI-001475
- The organization reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included.
- AC-22.4 - CCI-001476
- The organization reviews the content on the publicly accessible information system for nonpublic information on an organization-defined frequency.
- AC-22.5 - CCI-001477
- The organization defines a frequency for reviewing the content on the publicly accessible information system for nonpublic information.
- AC-22.6 - CCI-001478
- The organization removes nonpublic information from the publicly accessible information system, if discovered.
- RMF Control
- AC-23
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- AC-23.1 - CCI-002343
- The organization defines the data mining prevention techniques to be employed to adequately protect organization-defined data storage objects against data mining.
- AC-23.2 - CCI-002344
- The organization defines the data mining detection techniques to be employed to adequately detect data mining attempts against organization-defined data storage objects.
- AC-23.3 - CCI-002345
- The organization defines the data storage objects that are to be protected against data mining attempts.
- AC-23.4 - CCI-002346
- The organization employs organization-defined data mining prevention techniques for organization-defined data storage objects to adequately protect against data mining.
- AC-23.5 - CCI-002347
- The organization employs organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.
- RMF Control
- AC-24
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- AC-24.1 - CCI-002348
- The organization defines the access control decisions that are to be applied to each access request prior to access enforcement.
- AC-24.2 - CCI-002349
- The organization establishes procedures to ensure organization-defined access control decisions are applied to each access request prior to access enforcement.
- AC-24 (1) - Transmit Access Authorization Information
- The information system transmits [Assignment: organization-defined access authorization information] using [Assignment: organization-defined security safeguards] to [Assignment: organization-defined information systems] that enforce access control decisions.
- AC-24 (2) - No User Or Process Identity
- The information system enforces access control decisions based on [Assignment: organization-defined security attributes] that do not include the identity of the user or process acting on behalf of the user.
- RMF Control
- AC-25
- Subject Area
- ACCESS CONTROL
- Baseline Areas
- AC-25.1 - CCI-002356
- The organization defines the access control policies to be implemented by the information system's reference monitor.
- AC-25.2 - CCI-002357
- The information system implements a reference monitor for organization-defined access control policies that is tamperproof.
- AC-25.3 - CCI-002358
- The information system implements a reference monitor for organization-defined access control policies that is always invoked.
- AC-25.4 - CCI-002359
- The information system implements a reference monitor for organization-defined access control policies that is small enough to be subject to analysis and testing, the completeness of which can be assured.
- RMF Control
- AT-1
- Subject Area
- AWARENESS AND TRAINING
- Baseline Areas
- LOW, MODERATE, HIGH
- AT-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- AT-1b.
- Reviews and updates the current:
- AT-1.1 - CCI-002048
- The organization defines the personnel or roles to whom the security awareness and training policy is disseminated.
- AT-1.2 - CCI-002049
- The organization defines the personnel or roles to whom the security awareness and training procedures are disseminated.
- AT-1.3 - CCI-000100
- The organization develops and documents a security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AT-1.4 - CCI-000101
- The organization disseminates a security awareness and training policy to organization-defined personnel or roles.
- AT-1.6 - CCI-000103
- The organization develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls.
- AT-1.7 - CCI-000104
- The organization disseminates security awareness and training procedures to organization-defined personnel or roles.
- AT-1.8 - CCI-000102
- The organization reviews and updates the current security awareness and training policy in accordance with organization-defined frequency.
- AT-1.5 - CCI-001564
- The organization defines the frequency of security awareness and training policy reviews and updates.
- AT-1.9 - CCI-000105
- The organization reviews and updates the current security awareness and training procedures in accordance with organization-defined frequency.
- AT-1.10 - CCI-001565
- The organization defines the frequency of security awareness and training procedure reviews and updates.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-16, http://csrc.nist.gov/publications/PubsSPs.html#800-16
- NIST Special Publication 800-50, http://csrc.nist.gov/publications/PubsSPs.html#800-50
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- AT-2
- Subject Area
- AWARENESS AND TRAINING
- Baseline Areas
- LOW, MODERATE, HIGH
- AT-2a.
- As part of initial training for new users;
- AT-2b.
- When required by information system changes; and
- AT-2c.
- [Assignment: organization-defined frequency] thereafter.
- AT-2.1 - CCI-001480
- The organization defines the frequency for providing refresher security awareness training to all information system users (including managers, senior executives, and contractors).
- AT-2.2 - CCI-000106
- The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users.
- AT-2.3 - CCI-000112
- The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes.
- AT-2.4 - CCI-001479
- The organization provides refresher security awareness training to all information system users (including managers, senior executives, and contractors) in accordance with the organization-defined frequency.
- C.F.R. Part 5 Subpart C (5 C.F.R. 930.301), http://www.gpo.gov/fdsys/granule/CFR-2009-title5-vol2/CFR-2009-title5-vol2-sec930-301/content-detail.html
- Executive Order 13587, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net
- NIST Special Publication 800-50, http://csrc.nist.gov/publications/PubsSPs.html#800-50
- AT-2 (1) - Practical Exercises
- The organization includes practical exercises in security awareness training that simulate actual cyber attacks.
- AT-2 (2) - Insider Threat
- The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.
- RMF Control
- AT-3
- Subject Area
- AWARENESS AND TRAINING
- Baseline Areas
- LOW, MODERATE, HIGH
- AT-3a.
- Before authorizing access to the information system or performing assigned duties;
- AT-3b.
- When required by information system changes; and
- AT-3c.
- [Assignment: organization-defined frequency] thereafter.
- AT-3.1 - CCI-000108
- The organization provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties
- AT-3.2 - CCI-000109
- The organization provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes.
- AT-3.3 - CCI-000110
- The organization provides refresher role-based security training to personnel with assigned security roles and responsibilities in accordance with organization-defined frequency.
- AT-3.4 - CCI-000111
- The organization defines a frequency for providing refresher role-based security training.
- C.F.R. Part 5 Subpart C (5 C.F.R. 930.301), http://www.gpo.gov/fdsys/granule/CFR-2009-title5-vol2/CFR-2009-title5-vol2-sec930-301/content-detail.html
- NIST Special Publication 800-16, http://csrc.nist.gov/publications/PubsSPs.html#800-16
- NIST Special Publication 800-50, http://csrc.nist.gov/publications/PubsSPs.html#800-50
- AT-3 (1) - Environmental Controls
- The organization provides [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of environmental controls.
- AT-3 (2) - Physical Security Controls
- The organization provides [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of physical security controls.
- AT-3 (3) - Practical Exercises
- The organization includes practical exercises in security training that reinforce training objectives.
- AT-3 (4) - Suspicious Communications And Anomalous System Behavior
- The organization provides training to its personnel on [Assignment: organization-defined indicators of malicious code] to recognize suspicious communications and anomalous behavior in organizational information systems.
- RMF Control
- AT-4
- Subject Area
- AWARENESS AND TRAINING
- Baseline Areas
- LOW, MODERATE, HIGH
- AT-4a.
- Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and
- AT-4b.
- Retains individual training records for [Assignment: organization-defined time period].
- AT-4.1 - CCI-000113
- The organization documents individual information system security training activities, including basic security awareness training and specific information system security training.
- AT-4.2 - CCI-000114
- The organization monitors individual information system security training activities, including basic security awareness training and specific information system security training.
- AT-4.3 - CCI-001336
- The organization retains individual training records for an organization-defined time period.
- AT-4.4 - CCI-001337
- The organization defines a time period for retaining individual training records.
- RMF Control
- AT-5
- Subject Area
- AWARENESS AND TRAINING
- Baseline Areas
- RMF Control
- AU-1
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- AU-1b.
- Reviews and updates the current:
- AU-1.1 - CCI-001930
- The organization defines the organizational personnel or roles to whom the audit and accountability policy is to be disseminated.
- AU-1.2 - CCI-001931
- The organization defines the organizational personnel or roles to whom the audit and accountability procedures are to be disseminated.
- AU-1.3 - CCI-000117
- The organization develops and documents an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- AU-1.4 - CCI-001832
- The organization disseminates the audit and accountability policy to organization-defined personnel or roles.
- AU-1.5 - CCI-000120
- The organization develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
- AU-1.6 - CCI-001834
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
- AU-1.7 - CCI-000119
- The organization reviews and updates the audit and accountability policy on an organization-defined frequency.
- AU-1.8 - CCI-001569
- The organization defines the frequency on which it will review and update the audit and accountability policy.
- AU-1.9 - CCI-000122
- The organization reviews and updates the audit and accountability procedures on an organization-defined frequency.
- AU-1.10 - CCI-001570
- The organization defines the frequency on which it will review and update the audit and accountability procedures.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- AU-2
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-2a.
- Determines that the information system is capable of auditing the following events: [Assignment: organization-defined auditable events];
- AU-2b.
- Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;
- AU-2c.
- Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and
- AU-2d.
- Determines that the following events are to be audited within the information system: [Assignment: organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event].
- AU-2.1 - CCI-000123
- The organization determines the information system must be capable of auditing an organization-defined list of auditable events.
- AU-2.2 - CCI-001571
- The organization defines the information system auditable events.
- AU-2.3 - CCI-000124
- The organization coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events.
- AU-2.4 - CCI-000125
- The organization provides a rationale for why the list of auditable events is deemed to be adequate to support after-the-fact investigations of security incidents.
- AU-2.7 - CCI-001485
- The organization defines the events which are to be audited on the information system on an organization-defined frequency of (or situation requiring) auditing for each identified event.
- AU-2.6 - CCI-001484
- The organization defines frequency of (or situation requiring) auditing for each identified event.
- AU-2.5 - CCI-000126
- The organization determines that the organization-defined subset of the auditable events defined in AU-2 are to be audited within the information system.
- NIST Special Publication 800-92, http://csrc.nist.gov/publications/PubsSPs.html#800-92
- http://idmanagement.gov, http://idmanagement.gov
- AU-2 (1) - Compilation Of Audit Records From Multiple Sources
- [Withdrawn: Incorporated into AU-12].
- AU-2 (2) - Selection Of Audit Events By Component
- [Withdrawn: Incorporated into AU-12].
- AU-2 (3) - Reviews And Updates
- The organization reviews and updates the audited events [Assignment: organization-defined frequency].
- AU-2 (4) - Privileged Functions
- [Withdrawn: Incorporated into AC-6 (9)].
- RMF Control
- AU-3
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-3.1 - CCI-000130
- The information system generates audit records containing information that establishes what type of event occurred.
- AU-3.2 - CCI-000131
- The information system generates audit records containing information that establishes when an event occurred.
- AU-3.3 - CCI-000132
- The information system generates audit records containing information that establishes where the event occurred.
- AU-3.4 - CCI-000133
- The information system generates audit records containing information that establishes the source of the event.
- AU-3.5 - CCI-000134
- The information system generates audit records containing information that establishes the outcome of the event.
- AU-3.6 - CCI-001487
- The information system generates audit records containing information that establishes the identity of any individuals or subjects associated with the event.
- AU-3 (1) - Additional Audit Information
- The information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information].
- AU-3 (2) - Centralized Management Of Planned Audit Record Content
- The information system provides centralized management and configuration of the content to be captured in audit records generated by [Assignment: organization-defined information system components].
- RMF Control
- AU-4
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-4.1 - CCI-001848
- The organization defines the audit record storage requirements.
- AU-4.2 - CCI-001849
- The organization allocates audit record storage capacity in accordance with organization-defined audit record storage requirements.
- AU-4 (1) - Transfer To Alternate Storage
- The information system off-loads audit records [Assignment: organization-defined frequency] onto a different system or media than the system being audited.
- RMF Control
- AU-5
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-5a.
- Alerts [Assignment: organization-defined personnel or roles] in the event of an audit processing failure; and
- AU-5b.
- Takes the following additional actions: [Assignment: organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)].
- AU-5.1 - CCI-000139
- The information system alerts designated organization-defined personnel or roles in the event of an audit processing failure.
- AU-5.2 - CCI-001572
- The organization defines the personnel or roles to be alerted in the event of an audit processing failure.
- AU-5.3 - CCI-000140
- The information system takes organization defined actions upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
- AU-5.4 - CCI-001490
- The organization defines actions to be taken by the information system upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
- AU-5 (1) - Audit Storage Capacity
- The information system provides a warning to [Assignment: organization-defined personnel, roles, and/or locations] within [Assignment: organization-defined time period] when allocated audit record storage volume reaches [Assignment: organization-defined percentage] of repository maximum audit record storage capacity.
- AU-5 (2) - Real-Time Alerts
- The information system provides an alert in [Assignment: organization-defined real-time period] to [Assignment: organization-defined personnel, roles, and/or locations] when the following audit failure events occur: [Assignment: organization-defined audit failure events requiring real-time alerts].
- AU-5 (3) - Configurable Traffic Volume Thresholds
- The information system enforces configurable network communications traffic volume thresholds reflecting limits on auditing capacity and [Selection: rejects; delays] network traffic above those thresholds.
- AU-5 (4) - Shutdown On Failure
- The information system invokes a [Selection: full system shutdown; partial system shutdown; degraded operational mode with limited mission/business functionality available] in the event of [Assignment: organization-defined audit failures], unless an alternate audit capability exists.
- RMF Control
- AU-6
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-6a.
- Reviews and analyzes information system audit records [Assignment: organization-defined frequency] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and
- AU-6b.
- Reports findings to [Assignment: organization-defined personnel or roles].
- AU-6.1 - CCI-000148
- The organization reviews and analyzes information system audit records on an organization defined frequency for indications of organization-defined inappropriate or unusual activity.
- AU-6.2 - CCI-000151
- The organization defines the frequency for the review and analysis of information system audit records for organization-defined inappropriate or unusual activity.
- AU-6.3 - CCI-001862
- The organization defines the types of inappropriate or unusual activity to be reviewed and analyzed in the audit records.
- AU-6.4 - CCI-000149
- The organization reports any findings to organization-defined personnel or roles for indications of organization-defined inappropriate or unusual activity.
- AU-6.5 - CCI-001863
- The organization defines the personnel or roles to receive the reports of organization-defined inappropriate or unusual activity.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AT-3 - Role-Based Security Training
- AU-7 - Audit Reduction And Report Generation
- AU-16 - Cross-Organizational Auditing
- CA-7 - Continuous Monitoring
- CM-5 - Access Restrictions For Change
- CM-10 - Software Usage Restrictions
- CM-11 - User-Installed Software
- IA-3 - Device Identification And Authentication
- IA-5 - Authenticator Management
- IR-5 - Incident Monitoring
- IR-6 - Incident Reporting
- MA-4 - Nonlocal Maintenance
- MP-4 - Media Storage
- PE-3 - Physical Access Control
- PE-6 - Monitoring Physical Access
- PE-14 - Temperature And Humidity Controls
- PE-16 - Delivery And Removal
- RA-5 - Vulnerability Scanning
- SC-7 - Boundary Protection
- SC-18 - Mobile Code
- SC-19 - Voice Over Internet Protocol
- SI-3 - Malicious Code Protection
- SI-4 - Information System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- AU-6 (1) - Process Integration
- The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.
- AU-6 (2) - Automated Security Alerts
- [Withdrawn: Incorporated into SI-4].
- AU-6 (3) - Correlate Audit Repositories
- The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.
- AU-6 (4) - Central Review And Analysis
- The information system provides the capability to centrally review and analyze audit records from multiple components within the system.
- AU-6 (5) - Integration / Scanning And Monitoring Capabilities
- The organization integrates analysis of audit records with analysis of [Selection (one or more): vulnerability scanning information; performance data; information system monitoring information; [Assignment: organization-defined data/information collected from other sources]] to further enhance the ability to identify inappropriate or unusual activity.
- AU-6 (6) - Correlation With Physical Monitoring
- The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.
- AU-6 (7) - Permitted Actions
- The organization specifies the permitted actions for each [Selection (one or more): information system process; role; user] associated with the review, analysis, and reporting of audit information.
- AU-6 (8) - Full Text Analysis Of Privileged Commands
- The organization performs a full text analysis of audited privileged commands in a physically distinct component or subsystem of the information system, or other information system that is dedicated to that analysis.
- AU-6 (9) - Correlation With Information From Nontechnical Sources
- The organization correlates information from nontechnical sources with audit information to enhance organization-wide situational awareness.
- AU-6 (10) - Audit Level Adjustment
- The organization adjusts the level of audit review, analysis, and reporting within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
- RMF Control
- AU-7
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- MODERATE, HIGH
- AU-7a.
- Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and
- AU-7b.
- Does not alter the original content or time ordering of audit records.
- AU-7.1 - CCI-001875
- The information system provides an audit reduction capability that supports on-demand audit review and analysis.
- AU-7.2 - CCI-001876
- The information system provides an audit reduction capability that supports on-demand reporting requirements.
- AU-7.3 - CCI-001877
- The information system provides an audit reduction capability that supports after-the-fact investigations of security incidents.
- AU-7.4 - CCI-001878
- The information system provides a report generation capability that supports on-demand audit review and analysis.
- AU-7.5 - CCI-001879
- The information system provides a report generation capability that supports on-demand reporting requirements.
- AU-7.6 - CCI-001880
- The information system provides a report generation capability that supports after-the-fact investigations of security incidents.
- AU-7.7 - CCI-001881
- The information system provides an audit reduction capability that does not alter original content or time ordering of audit records.
- AU-7.8 - CCI-001882
- The information system provides a report generation capability that does not alter original content or time ordering of audit records.
- AU-6 - Audit Review, Analysis, And Reporting
- AU-7 (1) - Automatic Processing
- The information system provides the capability to process audit records for events of interest based on [Assignment: organization-defined audit fields within audit records].
- AU-7 (2) - Automatic Sort And Search
- The information system provides the capability to sort and search audit records for events of interest based on the content of [Assignment: organization-defined audit fields within audit records].
- RMF Control
- AU-8
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-8a.
- Uses internal system clocks to generate time stamps for audit records; and
- AU-8b.
- Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: organization-defined granularity of time measurement].
- AU-8.1 - CCI-000159
- The information system uses internal system clocks to generate time stamps for audit records.
- AU-8.2 - CCI-001888
- The organization defines the granularity of time measurement for time stamps generated for audit records.
- AU-8.3 - CCI-001889
- The information system records time stamps for audit records that meets organization-defined granularity of time measurement.
- AU-8.4 - CCI-001890
- The information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
- AU-8 (1) - Synchronization With Authoritative Time Source
- The information system:
- AU-8 (2) - Secondary Authoritative Time Source
- The information system identifies a secondary authoritative time source that is located in a different geographic region than the primary authoritative time source.
- RMF Control
- AU-9
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-9.1 - CCI-000162
- The information system protects audit information from unauthorized access.
- AU-9.2 - CCI-000163
- The information system protects audit information from unauthorized modification.
- AU-9.3 - CCI-000164
- The information system protects audit information from unauthorized deletion.
- AU-9.4 - CCI-001493
- The information system protects audit tools from unauthorized access.
- AU-9.5 - CCI-001494
- The information system protects audit tools from unauthorized modification.
- AU-9.6 - CCI-001495
- The information system protects audit tools from unauthorized deletion.
- AU-9 (1) - Hardware Write-Once Media
- The information system writes audit trails to hardware-enforced, write-once media.
- AU-9 (2) - Audit Backup On Separate Physical Systems / Components
- The information system backs up audit records [Assignment: organization-defined frequency] onto a physically different system or system component than the system or component being audited.
- AU-9 (3) - Cryptographic Protection
- The information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools.
- AU-9 (4) - Access By Subset Of Privileged Users
- The organization authorizes access to management of audit functionality to only [Assignment: organization-defined subset of privileged users].
- AU-9 (5) - Dual Authorization
- The organization enforces dual authorization for [Selection (one or more): movement; deletion] of [Assignment: organization-defined audit information].
- AU-9 (6) - Read Only Access
- The organization authorizes read-only access to audit information to [Assignment: organization-defined subset of privileged users].
- RMF Control
- AU-10
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- HIGH
- AU-10.1 - CCI-000166
- The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
- AU-10.2 - CCI-001899
- The organization defines the action to be covered by non-repudiation.
- AU-10 (1) - Association Of Identities
- The information system:
- AU-10 (2) - Validate Binding Of Information Producer Identity
- The information system:
- AU-10 (3) - Chain Of Custody
- The information system maintains reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.
- AU-10 (4) - Validate Binding Of Information Reviewer Identity
- The information system:
- AU-10 (5) - Digital Signatures
- [Withdrawn: Incorporated into SI-7].
- RMF Control
- AU-11
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-11.1 - CCI-000167
- The organization retains audit records for an organization defined time period to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
- AU-11.2 - CCI-000168
- The organization defines the time period for retention of audit records which is consistent with its records retention policy, to provide support for after-the-fact investigations of security incidents, and meet regulatory and organizational information retention requirements.
- AU-11 (1) - Long-Term Retrieval Capability
- The organization employs [Assignment: organization-defined measures] to ensure that long-term audit records generated by the information system can be retrieved.
- RMF Control
- AU-12
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- LOW, MODERATE, HIGH
- AU-12a.
- Provides audit record generation capability for the auditable events defined in AU-2 a. at [Assignment: organization-defined information system components];
- AU-12b.
- Allows [Assignment: organization-defined personnel or roles] to select which auditable events are to be audited by specific components of the information system; and
- AU-12c.
- Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.
- AU-12.1 - CCI-000169
- The information system provides audit record generation capability for the auditable events defined in AU-2 a at organization defined information system components.
- AU-12.2 - CCI-001459
- The organization defines information system components that provide audit record generation capability.
- AU-12.3 - CCI-000171
- The information system allows organization-defined personnel or roles to select which auditable events are to be audited by specific components of the information system.
- AU-12.4 - CCI-001910
- The organization defines the personnel or roles allowed select which auditable events are to be audited by specific components of the information system.
- AU-12.5 - CCI-000172
- The information system generates audit records for the events defined in AU-2 d with the content defined in AU-3.
- AU-12 (1) - System-Wide / Time-Correlated Audit Trail
- The information system compiles audit records from [Assignment: organization-defined information system components] into a system-wide (logical or physical) audit trail that is time-correlated to within [Assignment: organization-defined level of tolerance for the relationship between time stamps of individual records in the audit trail].
- AU-12 (2) - Standardized Formats
- The information system produces a system-wide (logical or physical) audit trail composed of audit records in a standardized format.
- AU-12 (3) - Changes By Authorized Individuals
- The information system provides the capability for [Assignment: organization-defined individuals or roles] to change the auditing to be performed on [Assignment: organization-defined information system components] based on [Assignment: organization-defined selectable event criteria] within [Assignment: organization-defined time thresholds].
- RMF Control
- AU-13
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- AU-13.1 - CCI-001460
- The organization monitors organization-defined open source information and/or information sites per organization-defined frequency for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13.2 - CCI-001461
- The organization defines a frequency for monitoring open source information and/or information sites for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13.3 - CCI-001915
- The organization defines the open source information and/or information sites to be monitored for evidence of unauthorized exfiltration or disclosure of organizational information.
- AU-13 (1) - Use Of Automated Tools
- The organization employs automated mechanisms to determine if organizational information has been disclosed in an unauthorized manner.
- AU-13 (2) - Review Of Monitored Sites
- The organization reviews the open source information sites being monitored [Assignment: organization-defined frequency].
- RMF Control
- AU-14
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- AU-14.1 - CCI-001919
- The information system provides the capability for authorized users to select a user session to capture/record or view/hear.
- AU-14 (1) - System Start-Up
- The information system initiates session audits at system start-up.
- AU-14 (2) - Capture/Record And Log Content
- The information system provides the capability for authorized users to capture/record and log content related to a user session.
- AU-14 (3) - Remote Viewing / Listening
- The information system provides the capability for authorized users to remotely view/hear all content related to an established user session in real time.
- RMF Control
- AU-15
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- AU-15.1 - CCI-001921
- The organization defines the alternative audit functionality to be provided in the event of a failure in the primary audit capability.
- AU-15.2 - CCI-001922
- The organization provides an alternative audit capability in the event of a failure in primary audit capability that provides organization-defined alternative audit functionality.
- AU-5 - Response To Audit Processing Failures
- RMF Control
- AU-16
- Subject Area
- AUDIT AND ACCOUNTABILITY
- Baseline Areas
- AU-16.1 - CCI-001923
- The organization defines the audit information to be coordinated among external organizations when audit information is transmitted across organizational boundaries.
- AU-16.2 - CCI-001924
- The organization defines the methods to be employed when coordinating audit information among external organizations when audit information is transmitted across organizational boundaries.
- AU-16.3 - CCI-001925
- The organization employs organization-defined methods for coordinating organization-defined audit information among external organizations when audit information is transmitted across organizational boundaries.
- AU-6 - Audit Review, Analysis, And Reporting
- AU-16 (1) - Identity Preservation
- The organization requires that the identity of individuals be preserved in cross-organizational audit trails.
- AU-16 (2) - Sharing Of Audit Information
- The organization provides cross-organizational audit information to [Assignment: organization-defined organizations] based on [Assignment: organization-defined cross-organizational sharing agreements].
- RMF Control
- CA-1
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- CA-1b.
- Reviews and updates the current:
- CA-1.1 - CCI-002061
- The organization defines the personnel or roles to whom security assessment and authorization policy is to be disseminated.
- CA-1.2 - CCI-002062
- The organization defines the personnel or roles to whom the security assessment and authorization procedures are to be disseminated.
- CA-1.3 - CCI-000239
- The organization develops and documents a security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CA-1.4 - CCI-000240
- The organization disseminates to organization-defined personnel or roles a security assessment and authorization policy.
- CA-1.5 - CCI-000242
- The organization develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
- CA-1.6 - CCI-000243
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
- CA-1.7 - CCI-000238
- The organization defines the frequency to review and update the current security assessment and authorization policy.
- CA-1.8 - CCI-000241
- The organization reviews and updates the current security assessment and authorization policy in accordance with organization-defined frequency.
- CA-1.9 - CCI-000244
- The organization reviews and updates the current security assessment and authorization procedures in accordance with organization-defined frequency.
- CA-1.10 - CCI-001578
- The organization defines the frequency to review and update the current security assessment and authorization procedures.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- CA-2
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-2a.
- Develops a security assessment plan that describes the scope of the assessment including:
- CA-2b.
- Assesses the security controls in the information system and its environment of operation [Assignment: organization-defined frequency] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;
- CA-2c.
- Produces a security assessment report that documents the results of the assessment; and
- CA-2d.
- Provides the results of the security control assessment to [Assignment: organization-defined individuals or roles].
- CA-2.1 - CCI-000245
- The organization develops a security assessment plan for the information system and its environment of operation. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.2 - CCI-000246
- The organization's security assessment plan describes the security controls and control enhancements under assessment. IG&VP WG Note *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.3 - CCI-000247
- The organization's security assessment plan describes assessment procedures to be used to determine security control effectiveness. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.4 - CCI-000248
- The organization's security assessment plan describes assessment environment. *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.5 - CCI-002070
- The organization's security assessment plan describes assessment team, assessment roles and responsibilities.
- CA-2.6 - CCI-000251
- The organization assesses, on an organization-defined frequency, the security controls in the information system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.7 - CCI-000252
- The organization defines the frequency on which the security controls in the information system and its environment of operation are assessed. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.8 - CCI-000253
- The organization produces a security assessment report that documents the results of the assessment against the information system and its environment of operation. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.9 - CCI-000254
- The organization provides the results of the security control assessment against information system and its environment of operation to organization-defined individuals or roles. IG&VP WG Note: *For DoD, the security assessment plan information is included in the Security Plan and the security assessment report and is not a separate document/artifact.*
- CA-2.10 - CCI-002071
- The organization defines the individuals or roles to whom the results of the security control assessment is to be provided.
- Executive Order 13587, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- NIST Special Publication 800-115, http://csrc.nist.gov/publications/PubsSPs.html#800-115
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- CA-2 (1) - Independent Assessors
- The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.
- CA-2 (2) - Specialized Assessments
- The organization includes as part of security control assessments, [Assignment: organization-defined frequency], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].
- CA-2 (3) - External Organizations
- The organization accepts the results of an assessment of [Assignment: organization-defined information system] performed by [Assignment: organization-defined external organization] when the assessment meets [Assignment: organization-defined requirements].
- RMF Control
- CA-3
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-3a.
- Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
- CA-3b.
- Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
- CA-3c.
- Reviews and updates Interconnection Security Agreements [Assignment: organization-defined frequency].
- CA-3.1 - CCI-000257
- The organization authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements.
- CA-3.2 - CCI-000258
- The organization documents, for each interconnection, the interface characteristics.
- CA-3.3 - CCI-000259
- The organization documents, for each interconnection, the security requirements.
- CA-3.4 - CCI-000260
- The organization documents, for each interconnection, the nature of the information communicated.
- CA-3.5 - CCI-002083
- The organization reviews and updates Interconnection Security Agreements on an organization-defined frequency.
- CA-3.6 - CCI-002084
- The organization defines the frequency that reviews and updates to the Interconnection Security Agreements must be conducted.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-20 - Use Of External Information Systems
- AU-2 - Audit Events
- AU-12 - Audit Generation
- AU-16 - Cross-Organizational Auditing
- CA-7 - Continuous Monitoring
- IA-3 - Device Identification And Authentication
- SA-9 - External Information System Services
- SC-7 - Boundary Protection
- SI-4 - Information System Monitoring
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-47, http://csrc.nist.gov/publications/PubsSPs.html#800-47
- CA-3 (1) - Unclassified National Security System Connections
- The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
- CA-3 (2) - Classified National Security System Connections
- The organization prohibits the direct connection of a classified, national security system to an external network without the use of [Assignment: organization-defined boundary protection device].
- CA-3 (3) - Unclassified Non-National Security System Connections
- The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [Assignment; organization-defined boundary protection device].
- CA-3 (4) - Connections To Public Networks
- The organization prohibits the direct connection of an [Assignment: organization-defined information system] to a public network.
- CA-3 (5) - Restrictions On External System Connections
- The organization employs [Selection: allow-all, deny-by-exception; deny-all, permit-by-exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.
- RMF Control
- CA-4
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- RMF Control
- CA-5
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-5a.
- Develops a plan of action and milestones for the information system to document the organization�s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and
- CA-5b.
- Updates existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
- CA-5.1 - CCI-000264
- The organization develops a plan of action and milestones for the information system to document the organizations planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system.
- CA-5.2 - CCI-000265
- The organization defines the frequency to update existing plan of action and milestones for the information system.
- CA-5.3 - CCI-000266
- The organization updates, on an organization-defined frequency, existing plan of action and milestones based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
- OMB Memorandum 02-01, http://www.whitehouse.gov/omb/memoranda_m02-01
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- CA-5 (1) - Automation Support For Accuracy / Currency
- The organization employs automated mechanisms to help ensure that the plan of action and milestones for the information system is accurate, up to date, and readily available.
- RMF Control
- CA-6
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-6a.
- Assigns a senior-level executive or manager as the authorizing official for the information system;
- CA-6b.
- Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
- CA-6c.
- Updates the security authorization [Assignment: organization-defined frequency].
- CA-6.1 - CCI-000270
- The organization assigns a senior-level executive or manager as the authorizing official for the information system.
- CA-6.2 - CCI-000271
- The organization ensures the authorizing official authorizes the information system for processing before commencing operations.
- CA-6.4 - CCI-000273
- The organization defines the frequency of updating the security authorization.
- CA-6.3 - CCI-000272
- The organization updates the security authorization on an organization-defined frequency.
- OMB Circular A-130, http://www.whitehouse.gov/omb/circulars_a130_a130trans4
- OMB Memorandum 11-33, http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- RMF Control
- CA-7
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-7a.
- Establishment of [Assignment: organization-defined metrics] to be monitored;
- CA-7b.
- Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;
- CA-7c.
- Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;
- CA-7d.
- Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;
- CA-7e.
- Correlation and analysis of security-related information generated by assessments and monitoring;
- CA-7f.
- Response actions to address results of the analysis of security-related information; and
- CA-7g.
- Reporting the security status of organization and the information system to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency].
- CA-7.1 - CCI-000274
- The organization develops a continuous monitoring strategy.
- CA-7.2 - CCI-002087
- The organization establishes and defines the metrics to be monitored for the continuous monitoring program.
- CA-7.3 - CCI-002088
- The organization establishes and defines the frequencies for continuous monitoring.
- CA-7.4 - CCI-002089
- The organization establishes and defines the frequencies for assessments supporting continuous monitoring.
- CA-7.5 - CCI-000279
- The organization implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy.
- CA-7.6 - CCI-002090
- The organization implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
- CA-7.7 - CCI-002091
- The organization implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring.
- CA-7.8 - CCI-002092
- The organization implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information.
- CA-7.10 - CCI-000281
- The organization defines the frequency to report the security status of organization and the information system to organization-defined personnel or roles.
- CA-7.11 - CCI-001581
- The organization defines personnel or roles to whom the security status of organization and the information system should be reported.
- CA-7.9 - CCI-000280
- The organization implements a continuous monitoring program that includes reporting the security status of organization and the information system to organization-defined personnel or roles on an organization-defined frequency.
- CA-2 - Security Assessments
- CA-5 - Plan Of Action And Milestones
- CA-6 - Security Authorization
- CM-3 - Configuration Change Control
- CM-4 - Security Impact Analysis
- PM-6 - Information Security Measures Of Performance
- PM-9 - Risk Management Strategy
- RA-5 - Vulnerability Scanning
- SA-11 - Developer Security Testing And Evaluation
- SA-12 - Supply Chain Protection
- SI-2 - Flaw Remediation
- SI-4 - Information System Monitoring
- OMB Memorandum 11-33, http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-33.pdf
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- NIST Special Publication 800-115, http://csrc.nist.gov/publications/PubsSPs.html#800-115
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- US-CERT Technical Cyber Security Alerts, http://www.us-cert.gov/ncas/alerts
- DoD Information Assurance Vulnerability Alerts,
- CA-7 (1) - Independent Assessment
- The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.
- CA-7 (2) - Types Of Assessments
- [Withdrawn: Incorporated into CA-2].
- CA-7 (3) - Trend Analyses
- The organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
- RMF Control
- CA-8
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- HIGH
- CA-8.2 - CCI-002094
- The organization defines the frequency for conducting penetration testing on organization-defined information systems or system components.
- CA-8.3 - CCI-002095
- The organization defines the information systems or system components on which penetration testing will be conducted.
- CA-8.1 - CCI-002093
- The organization conducts penetration testing in accordance with organization-defined frequency on organization-defined information systems or system components.
- SA-12 - Supply Chain Protection
- CA-8 (1) - Independent Penetration Agent Or Team
- The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.
- CA-8 (2) - Red Team Exercises
- The organization employs [Assignment: organization-defined red team exercises] to simulate attempts by adversaries to compromise organizational information systems in accordance with [Assignment: organization-defined rules of engagement].
- RMF Control
- CA-9
- Subject Area
- SECURITY ASSESSMENT AND AUTHORIZATION
- Baseline Areas
- LOW, MODERATE, HIGH
- CA-9a.
- Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and
- CA-9b.
- Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.
- CA-9.1 - CCI-002101
- The organization authorizes internal connections of organization-defined information system components or classes of components to the information system.
- CA-9.2 - CCI-002102
- The organization defines the information system components or classes of components that that are authorized internal connections to the information system.
- CA-9.3 - CCI-002103
- The organization documents, for each internal connection, the interface characteristics.
- CA-9.4 - CCI-002104
- The organization documents, for each internal connection, the security requirements.
- CA-9.5 - CCI-002105
- The organization documents, for each internal connection, the nature of the information communicated.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AU-2 - Audit Events
- AU-12 - Audit Generation
- CA-7 - Continuous Monitoring
- CM-2 - Baseline Configuration
- IA-3 - Device Identification And Authentication
- SC-7 - Boundary Protection
- SI-4 - Information System Monitoring
- CA-9 (1) - Security Compliance Checks
- The information system performs security compliance checks on constituent system components prior to the establishment of the internal connection.
- RMF Control
- CM-1
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- CM-1b.
- Reviews and updates the current:
- CM-1.1 - CCI-001821
- The organization defines the organizational personnel or roles to whom the configuration management policy is to be disseminated.
- CM-1.2 - CCI-001824
- The organization defines the organizational personnel or roles to whom the configuration management procedures are to be disseminated.
- CM-1.3 - CCI-000287
- The organization develops and documents a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CM-1.4 - CCI-001822
- The organization disseminates the configuration management policy to organization defined personnel or roles.
- CM-1.5 - CCI-000290
- The organization develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.6 - CCI-001825
- The organization disseminates to organization defined personnel or roles the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.8 - CCI-000289
- The organization reviews and updates, on an organization defined frequency, the configuration management policy.
- CM-1.7 - CCI-000286
- The organization defines a frequency to review and update the configuration management policies.
- CM-1.9 - CCI-000292
- The organization reviews and updates, on an organization defined frequency, the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
- CM-1.10 - CCI-001584
- The organization defines the frequency to review and update configuration management procedures.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- CM-2
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-2.1 - CCI-000293
- The organization develops and documents a current baseline configuration of the information system.
- CM-2.2 - CCI-000295
- The organization maintains under configuration control, a current baseline configuration of the information system.
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- CM-2 (1) - Reviews And Updates
- The organization reviews and updates the baseline configuration of the information system:
- CM-2 (2) - Automation Support For Accuracy / Currency
- The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system.
- CM-2 (3) - Retention Of Previous Configurations
- The organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback.
- CM-2 (4) - Unauthorized Software
- [Withdrawn: Incorporated into CM-7].
- CM-2 (5) - Authorized Software
- [Withdrawn: Incorporated into CM-7].
- CM-2 (6) - Development And Test Environments
- The organization maintains a baseline configuration for information system development and test environments that is managed separately from the operational baseline configuration.
- CM-2 (7) - Configure Systems, Components, Or Devices For High-Risk Areas
- The organization:
- RMF Control
- CM-3
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- MODERATE, HIGH
- CM-3a.
- Determines the types of changes to the information system that are configuration-controlled;
- CM-3b.
- Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;
- CM-3c.
- Documents configuration change decisions associated with the information system;
- CM-3d.
- Implements approved configuration-controlled changes to the information system;
- CM-3e.
- Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period];
- CM-3f.
- Audits and reviews activities associated with configuration-controlled changes to the information system; and
- CM-3g.
- Coordinates and provides oversight for configuration change control activities through [Assignment: organization-defined configuration change control element (e.g., committee, board)] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]].
- CM-3.1 - CCI-000313
- The organization determines the types of changes to the information system that are configuration controlled.
- CM-3.3 - CCI-001740
- The organization reviews proposed configuration controlled changes to the information system.
- CM-3.2 - CCI-000314
- The organization approves or disapproves configuration controlled changes to the information system with explicit consideration for security impact analysis.
- CM-3.4 - CCI-001741
- The organization documents configuration change decisions associated with the information system.
- CM-3.5 - CCI-001819
- The organization implements approved configuration-controlled changes to the information system.
- CM-3.6 - CCI-000316
- The organization retains records of configuration-controlled changes to the information system for an organization-defined time period.
- CM-3.7 - CCI-002056
- The organization defines the time period the record of configuration-controlled changes are to be retained.
- CM-3.8 - CCI-000318
- The organization audits and reviews activities associated with configuration controlled changes to the system.
- CM-3.9 - CCI-000319
- The organization coordinates and provides oversight for configuration change control activities through an organization defined configuration change control element (e.g., committee, board) that convenes at the organization defined frequency and/or for any organization defined configuration change conditions.
- CM-3.10 - CCI-000320
- The organization defines frequency to convene configuration change control element.
- CM-3.11 - CCI-000321
- The organization defines configuration change conditions that prompt the configuration change control element to convene.
- CM-3.12 - CCI-001586
- The organization defines the configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities.
- CA-7 - Continuous Monitoring
- CM-2 - Baseline Configuration
- CM-4 - Security Impact Analysis
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- CM-9 - Configuration Management Plan
- SA-10 - Developer Configuration Management
- SI-2 - Flaw Remediation
- SI-12 - Information Handling And Retention
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- CM-3 (1) - Automated Document / Notification / Prohibition Of Changes
- The organization employs automated mechanisms to:
- CM-3 (2) - Test / Validate / Document Changes
- The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system.
- CM-3 (3) - Automated Change Implementation
- The organization employs automated mechanisms to implement changes to the current information system baseline and deploys the updated baseline across the installed base.
- CM-3 (4) - Security Representative
- The organization requires an information security representative to be a member of the [Assignment: organization-defined configuration change control element].
- CM-3 (5) - Automated Security Response
- The information system implements [Assignment: organization-defined security responses] automatically if baseline configurations are changed in an unauthorized manner.
- CM-3 (6) - Cryptography Management
- The organization ensures that cryptographic mechanisms used to provide [Assignment: organization-defined security safeguards] are under configuration management.
- RMF Control
- CM-4
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-4.1 - CCI-000333
- The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- CM-4 (1) - Separate Test Environments
- The organization analyzes changes to the information system in a separate test environment before implementation in an operational environment, looking for security impacts due to flaws, weaknesses, incompatibility, or intentional malice.
- CM-4 (2) - Verification Of Security Functions
- The organization, after the information system is changed, checks the security functions to verify that the functions are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security requirements for the system.
- RMF Control
- CM-5
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- MODERATE, HIGH
- CM-5.1 - CCI-000338
- The organization defines physical access restrictions associated with changes to the information system.
- CM-5.2 - CCI-000339
- The organization documents physical access restrictions associated with changes to the information system.
- CM-5.3 - CCI-000340
- The organization approves physical access restrictions associated with changes to the information system.
- CM-5.4 - CCI-000341
- The organization enforces physical access restrictions associated with changes to the information system.
- CM-5.5 - CCI-000342
- The organization defines logical access restrictions associated with changes to the information system.
- CM-5.6 - CCI-000343
- The organization documents logical access restrictions associated with changes to the information system.
- CM-5.7 - CCI-000344
- The organization approves logical access restrictions associated with changes to the information system.
- CM-5.8 - CCI-000345
- The organization enforces logical access restrictions associated with changes to the information system.
- CM-5 (1) - Automated Access Enforcement / Auditing
- The information system enforces access restrictions and supports auditing of the enforcement actions.
- CM-5 (2) - Review System Changes
- The organization reviews information system changes [Assignment: organization-defined frequency] and [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
- CM-5 (3) - Signed Components
- The information system prevents the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
- CM-5 (4) - Dual Authorization
- The organization enforces dual authorization for implementing changes to [Assignment: organization-defined information system components and system-level information].
- CM-5 (5) - Limit Production / Operational Privileges
- The organization:
- CM-5 (6) - Limit Library Privileges
- The organization limits privileges to change software resident within software libraries.
- CM-5 (7) - Automatic Implementation Of Security Safeguards
- [Withdrawn: Incorporated into SI-7].
- RMF Control
- CM-6
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-6a.
- Establishes and documents configuration settings for information technology products employed within the information system using [Assignment: organization-defined security configuration checklists] that reflect the most restrictive mode consistent with operational requirements;
- CM-6b.
- Implements the configuration settings;
- CM-6c.
- Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment: organization-defined operational requirements]; and
- CM-6d.
- Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.
- CM-6.1 - CCI-000363
- The organization defines security configuration checklists to be used to establish and document configuration settings for the information system technology products employed.
- CM-6.2 - CCI-000364
- The organization establishes configuration settings for information technology products employed within the information system using organization-defined security configuration checklists.
- CM-6.3 - CCI-000365
- The organization documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists that reflect the most restrictive mode consistent with operational requirements.
- CM-6.4 - CCI-001588
- The organization-defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
- CM-6.5 - CCI-000366
- The organization implements the security configuration settings.
- CM-6.6 - CCI-000367
- The organization identifies any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.7 - CCI-000368
- The organization documents any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.8 - CCI-000369
- The organization approves any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
- CM-6.9 - CCI-001755
- The organization defines the information system components for which any deviation from the established configuration settings are to be identified, documented and approved.
- CM-6.10 - CCI-001756
- The organization defines the operational requirements on which the configuration settings for the organization-defined information system components are to be based.
- CM-6.11 - CCI-001502
- The organization monitors changes to the configuration settings in accordance with organizational policies and procedures.
- CM-6.12 - CCI-001503
- The organization controls changes to the configuration settings in accordance with organizational policies and procedures.
- OMB Memorandum 07-11, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2007/m07-11.pdf
- OMB Memorandum 07-18, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2007/m07-18.pdf
- OMB Memorandum 08-22, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2008/m08-22.pdf
- NIST Special Publication 800-70, http://csrc.nist.gov/publications/PubsSPs.html#800-70
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- http://nvd.nist.gov, http://nvd.nist.gov
- http://checklists.nist.gov, http://checklists.nist.gov
- http://www.nsa.gov, http://www.nsa.gov
- CM-6 (1) - Automated Central Management / Application / Verification
- The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for [Assignment: organization-defined information system components].
- CM-6 (2) - Respond To Unauthorized Changes
- The organization employs [Assignment: organization-defined security safeguards] to respond to unauthorized changes to [Assignment: organization-defined configuration settings].
- CM-6 (3) - Unauthorized Change Detection
- [Withdrawn: Incorporated into SI-7].
- CM-6 (4) - Conformance Demonstration
- [Withdrawn: Incorporated into CM-4].
- RMF Control
- CM-7
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-7a.
- Configures the information system to provide only essential capabilities; and
- CM-7b.
- Prohibits or restricts the use of the following functions, ports, protocols, and/or services: [Assignment: organization-defined prohibited or restricted functions, ports, protocols, and/or services].
- CM-7.2 - CCI-000380
- The organization defines for the information system prohibited or restricted functions, ports, protocols, and/or services.
- CM-7.1 - CCI-000381
- The organization configures the information system to provide only essential capabilities.
- CM-7.3 - CCI-000382
- The organization configures the information system to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services.
- DoD Instruction 8551.01, http://www.dtic.mil/whs/directives/corres/ins1.html
- CM-7 (1) - Periodic Review
- The organization:
- CM-7 (2) - Prevent Program Execution
- The information system prevents program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
- CM-7 (3) - Registration Compliance
- The organization ensures compliance with [Assignment: organization-defined registration requirements for functions, ports, protocols, and services].
- CM-7 (4) - Unauthorized Software / Blacklisting
- The organization:
- CM-7 (5) - Authorized Software / Whitelisting
- The organization:
- RMF Control
- CM-8
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-8a.
- Develops and documents an inventory of information system components that:
- CM-8b.
- Reviews and updates the information system component inventory [Assignment: organization-defined frequency].
- CM-8.1 - CCI-000389
- The organization develops and documents an inventory of information system components that accurately reflects the current information system.
- CM-8.2 - CCI-000392
- The organization develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system.
- CM-8.3 - CCI-000395
- The organization develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting.
- CM-8.4 - CCI-000398
- The organization defines information deemed necessary to achieve effective information system component accountability.
- CM-8.5 - CCI-000399
- The organization develops and documents an inventory of information system components that includes organization defined information deemed necessary to achieve effective information system component accountability.
- CM-8.6 - CCI-001779
- The organization defines the frequency on which the information system component inventory is to be reviewed and updated
- CM-8.7 - CCI-001780
- The organization reviews and updates the information system component inventory per organization-defined frequency.
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- CM-8 (1) - Updates During Installations / Removals
- The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.
- CM-8 (2) - Automated Maintenance
- The organization employs automated mechanisms to help maintain an up-to-date, complete, accurate, and readily available inventory of information system components.
- CM-8 (3) - Automated Unauthorized Component Detection
- The organization:
- CM-8 (4) - Accountability Information
- The organization includes in the information system component inventory information, a means for identifying by [Selection (one or more): name; position; role], individuals responsible/accountable for administering those components.
- CM-8 (5) - No Duplicate Accounting Of Components
- The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories.
- CM-8 (6) - Assessed Configurations / Approved Deviations
- The organization includes assessed component configurations and any approved deviations to current deployed configurations in the information system component inventory.
- CM-8 (7) - Centralized Repository
- The organization provides a centralized repository for the inventory of information system components.
- CM-8 (8) - Automated Location Tracking
- The organization employs automated mechanisms to support tracking of information system components by geographic location.
- CM-8 (9) - Assignment Of Components To Systems
- The organization:
- RMF Control
- CM-9
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- MODERATE, HIGH
- CM-9a.
- Addresses roles, responsibilities, and configuration management processes and procedures;
- CM-9b.
- Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;
- CM-9c.
- Defines the configuration items for the information system and places the configuration items under configuration management; and
- CM-9d.
- Protects the configuration management plan from unauthorized disclosure and modification.
- CM-9.1 - CCI-000421
- The organization develops and documents a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
- CM-9.2 - CCI-000423
- The organization implements a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
- CM-9.7 - CCI-000424
- The organization develops and documents a configuration management plan for the information system that defines the configuration items for the information system.
- CM-9.8 - CCI-000426
- The organization implements a configuration management plan for the information system that defines the configuration items for the information system.
- CM-9.3 - CCI-001790
- The organization develops and documents a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
- CM-9.4 - CCI-001792
- The organization implements a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
- CM-9.5 - CCI-001793
- The organization develops and documents a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
- CM-9.6 - CCI-001795
- The organization implements a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
- CM-9.9 - CCI-001796
- The organization develops and documents a configuration management plan for the information system that places the configuration items under configuration management.
- CM-9.10 - CCI-001798
- The organization implements a configuration management plan for the information system that places the configuration items under configuration management.
- CM-9.11 - CCI-001799
- The organization develops a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
- CM-9.12 - CCI-001801
- The organization implements a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- CM-9 (1) - Assignment Of Responsibility
- The organization assigns responsibility for developing the configuration management process to organizational personnel that are not directly involved in information system development.
- RMF Control
- CM-10
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-10a.
- Uses software and associated documentation in accordance with contract agreements and copyright laws;
- CM-10b.
- Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and
- CM-10c.
- Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10.1 - CCI-001726
- The organization uses software in accordance with contract agreements.
- CM-10.2 - CCI-001727
- The organization uses software documentation in accordance with contract agreements.
- CM-10.3 - CCI-001728
- The organization uses software in accordance with copyright laws.
- CM-10.4 - CCI-001729
- The organization uses software documentation in accordance with copyright laws.
- CM-10.5 - CCI-001730
- The organization tracks the use of software protected by quantity licenses to control copying of the software.
- CM-10.7 - CCI-001802
- The organization tracks the use of software documentation protected by quantity licenses to control copying of the software documentation.
- CM-10.8 - CCI-001803
- The organization tracks the use of software protected by quantity licenses to control distribution of the software.
- CM-10.6 - CCI-001731
- The organization tracks the use of software documentation protected by quantity licenses to control distribution of the software documentation.
- CM-10.9 - CCI-001732
- The organization controls the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10.10 - CCI-001733
- The organization documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
- CM-10 (1) - Open Source Software
- The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].
- RMF Control
- CM-11
- Subject Area
- CONFIGURATION MANAGEMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- CM-11a.
- Establishes [Assignment: organization-defined policies] governing the installation of software by users;
- CM-11b.
- Enforces software installation policies through [Assignment: organization-defined methods]; and
- CM-11c.
- Monitors policy compliance at [Assignment: organization-defined frequency].
- CM-11.1 - CCI-001804
- The organization defines the policies for governing the installation of software by users.
- CM-11.2 - CCI-001805
- The organization establishes organization-defined policies governing the installation of software by users.
- CM-11.3 - CCI-001806
- The organization defines methods to be employed to enforce the software installation policies.
- CM-11.4 - CCI-001807
- The organization enforces software installation policies through organization-defined methods.
- CM-11.5 - CCI-001808
- The organization defines the frequency on which it will monitor software installation policy compliance.
- CM-11.6 - CCI-001809
- The organization monitors software installation policy compliance per organization-defined frequency.
- CM-11 (1) - Alerts For Unauthorized Installations
- The information system alerts [Assignment: organization-defined personnel or roles] when the unauthorized installation of software is detected.
- CM-11 (2) - Prohibit Installation Without Privileged Status
- The information system prohibits user installation of software without explicit privileged status.
- RMF Control
- CP-1
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- CP-1b.
- Reviews and updates the current:
- CP-1.3 - CCI-002825
- The organization defines personnel or roles to whom the contingency planning policy is to be disseminated.
- CP-1.1 - CCI-000438
- The organization develops and documents a contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- CP-1.2 - CCI-000439
- The organization disseminates a contingency planning policy to organization-defined personnel or roles.
- CP-1.6 - CCI-002826
- The organization defines personnel or roles to whom the contingency planning procedures are disseminated.
- CP-1.4 - CCI-000441
- The organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls.
- CP-1.5 - CCI-001597
- The organization disseminates contingency planning procedures to organization-defined personnel or roles.
- CP-1.7 - CCI-000437
- The organization defines the frequency to review and update the current contingency planning policy.
- CP-1.8 - CCI-000440
- The organization reviews and updates the current contingency planning policy in accordance with organization-defined frequency.
- CP-1.9 - CCI-001596
- The organization defines the frequency to review and update the current contingency planning procedures.
- CP-1.10 - CCI-001598
- The organization reviews and updates the current contingency planning procedures in accordance with the organization-defined frequency.
- PM-9 - Risk Management Strategy
- Federal Continuity Directive 1, http://www.fema.gov/pdf/about/offices/fcd1.pdf
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- CP-2
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-2a.
- Develops a contingency plan for the information system that:
- CP-2b.
- Distributes copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
- CP-2c.
- Coordinates contingency planning activities with incident handling activities;
- CP-2d.
- Reviews the contingency plan for the information system [Assignment: organization-defined frequency];
- CP-2e.
- Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
- CP-2f.
- Communicates contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements]; and
- CP-2g.
- Protects the contingency plan from unauthorized disclosure and modification.
- CP-2.1 - CCI-000443
- The organization develops a contingency plan for the information system that identifies essential missions.
- CP-2.2 - CCI-000444
- The organization develops a contingency plan for the information system that identifies essential business functions.
- CP-2.3 - CCI-000445
- The organization develops a contingency plan for the information system that identifies associated contingency requirements.
- CP-2.4 - CCI-000446
- The organization develops a contingency plan for the information system that provides recovery objectives.
- CP-2.5 - CCI-000447
- The organization develops a contingency plan for the information system that provides restoration priorities.
- CP-2.6 - CCI-000448
- The organization develops a contingency plan for the information system that provides metrics.
- CP-2.7 - CCI-000449
- The organization develops a contingency plan for the information system that addresses contingency roles, responsibilities, assigned individuals with contact information.
- CP-2.8 - CCI-000450
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system disruption.
- CP-2.9 - CCI-000451
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system disruption.
- CP-2.10 - CCI-000452
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system compromise.
- CP-2.11 - CCI-000453
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system compromise.
- CP-2.12 - CCI-000454
- The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system failure.
- CP-2.13 - CCI-000455
- The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system failure.
- CP-2.14 - CCI-000456
- The organization develops a contingency plan for the information system that addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented.
- CP-2.15 - CCI-000457
- The organization develops a contingency plan for the information system that is reviewed and approved by organization-defined personnel or roles.
- CP-2.17 - CCI-000458
- The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements designated to receive copies of the contingency plan.
- CP-2.18 - CCI-000459
- The organization distributes copies of the contingency plan to an organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
- CP-2.19 - CCI-000460
- The organization coordinates contingency planning activities with incident handling activities.
- CP-2.20 - CCI-000461
- The organization defines the frequency to review the contingency plan for the information system.
- CP-2.21 - CCI-000462
- The organization reviews the contingency plan for the information system in accordance with organization-defined frequency.
- CP-2.22 - CCI-000463
- The organization updates the contingency plan to address changes to the organization.
- CP-2.23 - CCI-000464
- The organization updates the contingency plan to address changes to the information system.
- CP-2.24 - CCI-000465
- The organization updates the contingency plan to address changes to the environment of operation.
- CP-2.25 - CCI-000466
- The organization updates the contingency plan to address problems encountered during contingency plan implementation, execution, or testing.
- CP-2.26 - CCI-000468
- The organization communicates contingency plan changes to organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
- CP-2.16 - CCI-002830
- The organization defines the personnel or roles who review and approve the contingency plan for the information system.
- CP-2.27 - CCI-002831
- The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements to whom contingency plan changes are to be communicated.
- CP-2.28 - CCI-002832
- The organization protects the contingency plan from unauthorized disclosure and modification.
- AC-14 - Permitted Actions Without Identification Or Authentication
- CP-6 - Alternate Storage Site
- CP-7 - Alternate Processing Site
- CP-8 - Telecommunications Services
- CP-9 - Information System Backup
- CP-10 - Information System Recovery And Reconstitution
- IR-4 - Incident Handling
- IR-8 - Incident Response Plan
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- PM-8 - Critical Infrastructure Plan
- PM-11 - Mission/Business Process Definition
- Federal Continuity Directive 1, http://www.fema.gov/pdf/about/offices/fcd1.pdf
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- CP-2 (1) - Coordinate With Related Plans
- The organization coordinates contingency plan development with organizational elements responsible for related plans.
- CP-2 (2) - Capacity Planning
- The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.
- CP-2 (3) - Resume Essential Missions / Business Functions
- The organization plans for the resumption of essential missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.
- CP-2 (4) - Resume All Missions / Business Functions
- The organization plans for the resumption of all missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.
- CP-2 (5) - Continue Essential Missions / Business Functions
- The organization plans for the continuance of essential missions and business functions with little or no loss of operational continuity and sustains that continuity until full information system restoration at primary processing and/or storage sites.
- CP-2 (6) - Alternate Processing / Storage Site
- The organization plans for the transfer of essential missions and business functions to alternate processing and/or storage sites with little or no loss of operational continuity and sustains that continuity through information system restoration to primary processing and/or storage sites.
- CP-2 (7) - Coordinate With External Service Providers
- The organization coordinates its contingency plan with the contingency plans of external service providers to ensure that contingency requirements can be satisfied.
- CP-2 (8) - Identify Critical Assets
- The organization identifies critical information system assets supporting essential missions and business functions.
- RMF Control
- CP-3
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-3a.
- Within [Assignment: organization-defined time period] of assuming a contingency role or responsibility;
- CP-3b.
- When required by information system changes; and
- CP-3c.
- [Assignment: organization-defined frequency] thereafter.
- CP-3.2 - CCI-002833
- The organization defines the time period that contingency training is to be provided to information system users consistent with assigned roles and responsibilities within assuming a contingency role or responsibility.
- CP-3.1 - CCI-000486
- The organization provides contingency training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming a contingency role or responsibility.
- CP-3.3 - CCI-002834
- The organization provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes.
- CP-3.4 - CCI-000485
- The organization defines the frequency of refresher contingency training to information system users.
- CP-3.5 - CCI-000487
- The organization provides refresher contingency training to information system users consistent with assigned roles and responsibilities in accordance with organization-defined frequency.
- Federal Continuity Directive 1, http://www.fema.gov/pdf/about/offices/fcd1.pdf
- NIST Special Publication 800-16, http://csrc.nist.gov/publications/PubsSPs.html#800-16
- NIST Special Publication 800-50, http://csrc.nist.gov/publications/PubsSPs.html#800-50
- CP-3 (1) - Simulated Events
- The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations.
- CP-3 (2) - Automated Training Environments
- The organization employs automated mechanisms to provide a more thorough and realistic contingency training environment.
- RMF Control
- CP-4
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-4a.
- Tests the contingency plan for the information system [Assignment: organization-defined frequency] using [Assignment: organization-defined tests] to determine the effectiveness of the plan and the organizational readiness to execute the plan;
- CP-4b.
- Reviews the contingency plan test results; and
- CP-4c.
- Initiates corrective actions, if needed.
- CP-4.1 - CCI-000490
- The organization defines the frequency to test the contingency plan for the information system.
- CP-4.2 - CCI-000492
- The organization defines contingency plan tests to be conducted for the information system.
- CP-4.3 - CCI-000494
- The organization tests the contingency plan for the information system in accordance with organization-defined frequency using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan.
- CP-4.4 - CCI-000496
- The organization reviews the contingency plan test results.
- CP-4.5 - CCI-000497
- The organization initiates corrective actions, if needed, after reviewing the contingency plan test results.
- Federal Continuity Directive 1, http://www.fema.gov/pdf/about/offices/fcd1.pdf
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- NIST Special Publication 800-84, http://csrc.nist.gov/publications/PubsSPs.html#800-84
- CP-4 (1) - Coordinate With Related Plans
- The organization coordinates contingency plan testing with organizational elements responsible for related plans.
- CP-4 (2) - Alternate Processing Site
- The organization tests the contingency plan at the alternate processing site:
- CP-4 (3) - Automated Testing
- The organization employs automated mechanisms to more thoroughly and effectively test the contingency plan.
- CP-4 (4) - Full Recovery / Reconstitution
- The organization includes a full recovery and reconstitution of the information system to a known state as part of contingency plan testing.
- RMF Control
- CP-5
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- RMF Control
- CP-6
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- MODERATE, HIGH
- CP-6a.
- Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and
- CP-6b.
- Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
- CP-6.1 - CCI-000505
- The organization establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information.
- CP-6.2 - CCI-002836
- The organization ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- CP-6 (1) - Separation From Primary Site
- The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.
- CP-6 (2) - Recovery Time / Point Objectives
- The organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.
- CP-6 (3) - Accessibility
- The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
- RMF Control
- CP-7
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- MODERATE, HIGH
- CP-7a.
- Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined information system operations] for essential missions/business functions within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] when the primary processing capabilities are unavailable;
- CP-7b.
- Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption; and
- CP-7c.
- Ensures that the alternate processing site provides information security safeguards equivalent to those of the primary site.
- CP-7.1 - CCI-000510
- The organization defines the time period consistent with recovery time and recovery point objectives for essential missions/business functions to permit the transfer and resumption of organization-defined information system operations at an alternate processing site when the primary processing capabilities are unavailable.
- CP-7.2 - CCI-000513
- The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions within organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
- CP-7.3 - CCI-000514
- The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential business functions within organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
- CP-7.5 - CCI-000515
- The organization ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption.
- CP-7.6 - CCI-000521
- The organization ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
- CP-7.4 - CCI-002839
- The organization defines information system operations that are permitted to transfer and resume at an alternate processing sites for essential missions/business functions when the primary processing capabilities are unavailable.
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- CP-7 (1) - Separation From Primary Site
- The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
- CP-7 (2) - Accessibility
- The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
- CP-7 (3) - Priority Of Service
- The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
- CP-7 (4) - Preparation For Use
- The organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions.
- CP-7 (5) - Equivalent Information Security Safeguards
- [Withdrawn: Incorporated into CP-7].
- CP-7 (6) - Inability To Return To Primary Site
- The organization plans and prepares for circumstances that preclude returning to the primary processing site.
- RMF Control
- CP-8
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- MODERATE, HIGH
- CP-8.1 - CCI-000522
- The organization defines the time period to permit the resumption of organization-defined information system operations for essential missions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.2 - CCI-000523
- The organization defines the time period to permit the resumption of organization-defined information system operations for essential business functions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.3 - CCI-000524
- The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions within organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.4 - CCI-000525
- The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential business functions within organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.5 - CCI-002840
- The organization defines the information system operations to be resumed for essential missions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- CP-8.6 - CCI-002841
- The organization defines the information system operations to be resumed for essential business functions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- National Communications Systems Directive 3-10,
- http://www.dhs.gov/telecommunications-service-priority-tsp, http://www.dhs.gov/telecommunications-service-priority-tsp
- CP-8 (1) - Priority Of Service Provisions
- The organization:
- CP-8 (2) - Single Points Of Failure
- The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
- CP-8 (3) - Separation Of Primary / Alternate Providers
- The organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
- CP-8 (4) - Provider Contingency Plan
- The organization:
- CP-8 (5) - Alternate Telecommunication Service Testing
- The organization tests alternate telecommunication services [Assignment: organization-defined frequency].
- RMF Control
- CP-9
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-9a.
- Conducts backups of user-level information contained in the information system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
- CP-9b.
- Conducts backups of system-level information contained in the information system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
- CP-9c.
- Conducts backups of information system documentation including security-related documentation [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; and
- CP-9d.
- Protects the confidentiality, integrity, and availability of backup information at storage locations.
- CP-9.1 - CCI-000534
- The organization defines frequency of conducting user-level information backups to support recovery time objectives and recovery point objectives.
- CP-9.2 - CCI-000535
- The organization conducts backups of user-level information contained in the information system per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.3 - CCI-000536
- The organization defines frequency of conducting system-level information backups to support recovery time objectives and recovery point objectives.
- CP-9.4 - CCI-000537
- The organization conducts backups of system-level information contained in the information system per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.5 - CCI-000538
- The organization defines the frequency of conducting information system documentation backups including security-related documentation to support recovery time objectives and recovery point objectives.
- CP-9.6 - CCI-000539
- The organization conducts backups of information system documentation including security-related documentation per organization-defined frequency that is consistent with recovery time and recovery point objectives.
- CP-9.7 - CCI-000540
- The organization protects the confidentiality, integrity, and availability of backup information at storage locations.
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- CP-9 (1) - Testing For Reliability / Integrity
- The organization tests backup information [Assignment: organization-defined frequency] to verify media reliability and information integrity.
- CP-9 (2) - Test Restoration Using Sampling
- The organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing.
- CP-9 (3) - Separate Storage For Critical Information
- The organization stores backup copies of [Assignment: organization-defined critical information system software and other security-related information] in a separate facility or in a fire-rated container that is not collocated with the operational system.
- CP-9 (4) - Protection From Unauthorized Modification
- [Withdrawn: Incorporated into CP-9].
- CP-9 (5) - Transfer To Alternate Storage Site
- The organization transfers information system backup information to the alternate storage site [Assignment: organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives].
- CP-9 (6) - Redundant Secondary System
- The organization accomplishes information system backup by maintaining a redundant secondary system that is not collocated with the primary system and that can be activated without loss of information or disruption to operations.
- CP-9 (7) - Dual Authorization
- The organization enforces dual authorization for the deletion or destruction of [Assignment: organization-defined backup information].
- RMF Control
- CP-10
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- CP-10.1 - CCI-000550
- The organization provides for the recovery and reconstitution of the information system to a known state after a disruption.
- CP-10.2 - CCI-000551
- The organization provides for the recovery and reconstitution of the information system to a known state after a compromise.
- CP-10.3 - CCI-000552
- The organization provides for the recovery and reconstitution of the information system to a known state after a failure.
- Federal Continuity Directive 1, http://www.fema.gov/pdf/about/offices/fcd1.pdf
- NIST Special Publication 800-34, http://csrc.nist.gov/publications/PubsSPs.html#800-34
- CP-10 (1) - Contingency Plan Testing
- [Withdrawn: Incorporated into CP-4].
- CP-10 (2) - Transaction Recovery
- The information system implements transaction recovery for systems that are transaction-based.
- CP-10 (3) - Compensating Security Controls
- [Withdrawn: Addressed through tailoring procedures].
- CP-10 (4) - Restore Within Time Period
- The organization provides the capability to restore information system components within [Assignment: organization-defined restoration time-periods] from configuration-controlled and integrity-protected information representing a known, operational state for the components.
- CP-10 (5) - Failover Capability
- [Withdrawn: Incorporated into SI-13].
- CP-10 (6) - Component Protection
- The organization protects backup and restoration hardware, firmware, and software.
- RMF Control
- CP-11
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- CP-11.1 - CCI-002853
- The information system provides the capability to employ organization-defined alternative communications protocols in support of maintaining continuity of operations.
- CP-11.2 - CCI-002854
- The organization defines the alternative communications protocols the information systems must be capable of providing in support of maintaining continuity of operations.
- RMF Control
- CP-12
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- CP-12.1 - CCI-002855
- The information system, when organization-defined conditions are detected, enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
- CP-12.2 - CCI-002856
- The organization defines the conditions, that when detected, the information system enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
- CP-12.3 - CCI-002857
- The organization defines the restrictions of safe mode of operation that the information system will enter when organization-defined conditions are detected.
- RMF Control
- CP-13
- Subject Area
- CONTINGENCY PLANNING
- Baseline Areas
- CP-13.1 - CCI-002858
- The organization employs organization-defined alternative or supplemental security mechanisms for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
- CP-13.2 - CCI-002859
- The organization defines the alternative or supplemental security mechanisms that will be employed for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
- CP-13.3 - CCI-002860
- The organization defines the security functions that must be satisfied when the primary means of implementing the security function is unavailable or compromised.
- CP-2 - Contingency Plan
- RMF Control
- IA-1
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- IA-1b.
- Reviews and updates the current:
- IA-1.1 - CCI-001933
- The organization defines the personnel or roles to be recipients of the identification and authentication policy and the procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.2 - CCI-000756
- The organization develops and documents an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IA-1.3 - CCI-000757
- The organization disseminates to organization defined personnel or roles an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IA-1.4 - CCI-000760
- The organization develops and documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.5 - CCI-000761
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
- IA-1.6 - CCI-000758
- The organization reviews and updates identification and authentication policy in accordance with the organization defined frequency.
- IA-1.7 - CCI-000759
- The organization defines a frequency for reviewing and updating the identification and authentication policy.
- IA-1.8 - CCI-000762
- The organization reviews and updates identification and authentication procedures in accordance with the organization defined frequency.
- IA-1.9 - CCI-000763
- The organization defines a frequency for reviewing and updating the identification and authentication procedures.
- PM-9 - Risk Management Strategy
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- IA-2
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-2.1 - CCI-000764
- The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
- HSPD-12, http://www.dhs.gov/homeland-security-presidential-directive-12
- OMB Memorandum 04-04, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy04/m04-04.pdf
- OMB Memorandum 06-16, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2006/m06-16.pdf
- OMB Memorandum 11-11, http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-11.pdf
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- FICAM Roadmap and Implementation Guidance, http://www.idmanagement.gov/documents/ficam-roadmap-and-implementation-guidance
- http://idmanagement.gov, http://idmanagement.gov
- IA-2 (1) - Network Access To Privileged Accounts
- The information system implements multifactor authentication for network access to privileged accounts.
- IA-2 (2) - Network Access To Non-Privileged Accounts
- The information system implements multifactor authentication for network access to non-privileged accounts.
- IA-2 (3) - Local Access To Privileged Accounts
- The information system implements multifactor authentication for local access to privileged accounts.
- IA-2 (4) - Local Access To Non-Privileged Accounts
- The information system implements multifactor authentication for local access to non-privileged accounts.
- IA-2 (5) - Group Authentication
- The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
- IA-2 (6) - Network Access To Privileged Accounts - Separate Device
- The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
- IA-2 (7) - Network Access To Non-Privileged Accounts - Separate Device
- The information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
- IA-2 (8) - Network Access To Privileged Accounts - Replay Resistant
- The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
- IA-2 (9) - Network Access To Non-Privileged Accounts - Replay Resistant
- The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
- IA-2 (10) - Single Sign-On
- The information system provides a single sign-on capability for [Assignment: organization-defined information system accounts and services].
- IA-2 (11) - Remote Access - Separate Device
- The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
- IA-2 (12) - Acceptance Of Piv Credentials
- The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials.
- IA-2 (13) - Out-Of-Band Authentication
- The information system implements [Assignment: organization-defined out-of-band authentication] under [Assignment: organization-defined conditions].
- RMF Control
- IA-3
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- MODERATE, HIGH
- IA-3.1 - CCI-000777
- The organization defines a list of specific and/or types of devices for which identification and authentication is required before establishing a connection to the information system.
- IA-3.2 - CCI-000778
- The information system uniquely identifies an organization defined list of specific and/or types of devices before establishing a local, remote, or network connection.
- IA-3.3 - CCI-001958
- The information system authenticates an organization defined list of specific and/or types of devices before establishing a local, remote, or network connection.
- IA-3 (1) - Cryptographic Bidirectional Authentication
- The information system authenticates [Assignment: organization-defined specific devices and/or types of devices] before establishing [Selection (one or more): local; remote; network] connection using bidirectional authentication that is cryptographically based.
- IA-3 (2) - Cryptographic Bidirectional Network Authentication
- [Withdrawn: Incorporated into IA-3 (1)].
- IA-3 (3) - Dynamic Address Allocation
- The organization:
- IA-3 (4) - Device Attestation
- The organization ensures that device identification and authentication based on attestation is handled by [Assignment: organization-defined configuration management process].
- RMF Control
- IA-4
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-4a.
- Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, or device identifier;
- IA-4b.
- Selecting an identifier that identifies an individual, group, role, or device;
- IA-4c.
- Assigning the identifier to the intended individual, group, role, or device;
- IA-4d.
- Preventing reuse of identifiers for [Assignment: organization-defined time period]; and
- IA-4e.
- Disabling the identifier after [Assignment: organization-defined time period of inactivity].
- IA-4.1 - CCI-001970
- The organization defines the personnel or roles that authorize the assignment of individual, group, role, and device identifiers.
- IA-4.2 - CCI-001971
- The organization manages information system identifiers by receiving authorization from organization-defined personnel or roles to assign an individual, group, role or device identifier.
- IA-4.3 - CCI-001972
- The organization manages information system identifiers by selecting an identifier that identifies an individual, group, role, or device.
- IA-4.4 - CCI-001973
- The organization manages information system identifiers by assigning the identifier to the intended individual, group, role, or device.
- IA-4.5 - CCI-001974
- The organization defines the time period for which the reuse of identifiers is prohibited.
- IA-4.6 - CCI-001975
- The organization manages information system identifiers by preventing reuse of identifiers for an organization-defined time period.
- IA-4.7 - CCI-000794
- The organization defines a time period of inactivity after which the identifier is disabled.
- IA-4.8 - CCI-000795
- The organization manages information system identifiers by disabling the identifier after an organization defined time period of inactivity.
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- IA-4 (1) - Prohibit Account Identifiers As Public Identifiers
- The organization prohibits the use of information system account identifiers that are the same as public identifiers for individual electronic mail accounts.
- IA-4 (2) - Supervisor Authorization
- The organization requires that the registration process to receive an individual identifier includes supervisor authorization.
- IA-4 (3) - Multiple Forms Of Certification
- The organization requires multiple forms of certification of individual identification be presented to the registration authority.
- IA-4 (4) - Identify User Status
- The organization manages individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status].
- IA-4 (5) - Dynamic Management
- The information system dynamically manages identifiers.
- IA-4 (6) - Cross-Organization Management
- The organization coordinates with [Assignment: organization-defined external organizations] for cross-organization management of identifiers.
- IA-4 (7) - In-Person Registration
- The organization requires that the registration process to receive an individual identifier be conducted in person before a designated registration authority.
- RMF Control
- IA-5
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-5a.
- Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;
- IA-5b.
- Establishing initial authenticator content for authenticators defined by the organization;
- IA-5c.
- Ensuring that authenticators have sufficient strength of mechanism for their intended use;
- IA-5d.
- Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;
- IA-5e.
- Changing default content of authenticators prior to information system installation;
- IA-5f.
- Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;
- IA-5g.
- Changing/refreshing authenticators [Assignment: organization-defined time period by authenticator type];
- IA-5h.
- Protecting authenticator content from unauthorized disclosure and modification;
- IA-5i.
- Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and
- IA-5j.
- Changing authenticators for group/role accounts when membership to those accounts changes.
- IA-5.14 - CCI-000180
- The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.
- IA-5.2 - CCI-000176
- The organization manages information system authenticators by establishing initial authenticator content for authenticators defined by the organization.
- IA-5.3 - CCI-001544
- The organization manages information system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
- IA-5.7 - CCI-001984
- The organization manages information system authenticators by establishing administrative procedures for revoking authenticators.
- IA-5.15 - CCI-000181
- The organization manages information system authenticators by establishing reuse conditions for authenticators.
- IA-5.19 - CCI-000183
- The organization manages information system authenticators by protecting authenticator content from unauthorized disclosure.
- IA-5.8 - CCI-001985
- The organization manages information system authenticators by implementing administrative procedures for initial authenticator distribution.
- IA-5.9 - CCI-001986
- The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
- IA-5.10 - CCI-001987
- The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
- IA-5(5).1 - CCI-001998
- The organization manages information system authenticators by implementing administrative procedures for revoking authenticators.
- IA-5.5 - CCI-001982
- The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
- IA-5.12 - CCI-001989
- The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
- IA-5.13 - CCI-000179
- The organization manages information system authenticators by establishing minimum lifetime restrictions for authenticators.
- IA-5.1 - CCI-001980
- The organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
- IA-5.4 - CCI-001981
- The organization manages information system authenticators by establishing administrative procedures for initial authenticator distribution.
- IA-5.16 - CCI-000182
- The organization manages information system authenticators by changing/refreshing authenticators in accordance with the organization defined time period by authenticator type.
- IA-5.17 - CCI-001610
- The organization defines the time period (by authenticator type) for changing/refreshing authenticators.
- IA-5.6 - CCI-001983
- The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
- IA-5.18 - CCI-002042
- The organization manages information system authenticators by protecting authenticator content from unauthorized modification.
- IA-5.21 - CCI-002366
- The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.
- IA-5.20 - CCI-002365
- The organization manages information system authenticators by requiring individuals to take specific security safeguards to protect authenticators.
- IA-5.22 - CCI-001990
- The organization manages information system authenticators by changing authenticators for group/role accounts when membership to those accounts changes.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- CM-6 - Configuration Settings
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- PL-4 - Rules Of Behavior
- PS-5 - Personnel Transfer
- PS-6 - Access Agreements
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-17 - Public Key Infrastructure Certificates
- SC-28 - Protection Of Information At Rest
- OMB Memorandum 04-04, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy04/m04-04.pdf
- OMB Memorandum 11-11, http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-11.pdf
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- FICAM Roadmap and Implementation Guidance, http://www.idmanagement.gov/documents/ficam-roadmap-and-implementation-guidance
- http://idmanagement.gov, http://idmanagement.gov
- IA-5 (1) - Password-Based Authentication
- The information system, for password-based authentication:
- IA-5 (2) - Pki-Based Authentication
- The information system, for PKI-based authentication:
- IA-5 (3) - In-Person Or Trusted Third-Party Registration
- The organization requires that the registration process to receive [Assignment: organization-defined types of and/or specific authenticators] be conducted [Selection: in person; by a trusted third party] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].
- IA-5 (4) - Automated Support For Password Strength Determination
- The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy [Assignment: organization-defined requirements].
- IA-5 (5) - Change Authenticators Prior To Delivery
- The organization requires developers/installers of information system components to provide unique authenticators or change default authenticators prior to delivery/installation.
- IA-5 (6) - Protection Of Authenticators
- The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
- IA-5 (7) - No Embedded Unencrypted Static Authenticators
- The organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.
- IA-5 (8) - Multiple Information System Accounts
- The organization implements [Assignment: organization-defined security safeguards] to manage the risk of compromise due to individuals having accounts on multiple information systems.
- IA-5 (9) - Cross-Organization Credential Management
- The organization coordinates with [Assignment: organization-defined external organizations] for cross-organization management of credentials.
- IA-5 (10) - Dynamic Credential Association
- The information system dynamically provisions identities.
- IA-5 (11) - Hardware Token-Based Authentication
- The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].
- IA-5 (12) - Biometric-Based Authentication
- The information system, for biometric-based authentication, employs mechanisms that satisfy [Assignment: organization-defined biometric quality requirements].
- IA-5 (13) - Expiration Of Cached Authenticators
- The information system prohibits the use of cached authenticators after [Assignment: organization-defined time period].
- IA-5 (14) - Managing Content Of Pki Trust Stores
- The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
- IA-5 (15) - Ficam-Approved Products And Services
- The organization uses only FICAM-approved path discovery and validation products and services.
- RMF Control
- IA-6
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-6.1 - CCI-000206
- The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
- PE-18 - Location Of Information System Components
- RMF Control
- IA-7
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-7.1 - CCI-000803
- The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
- FIPS Publication 140, http://csrc.nist.gov/publications/PubsFIPS.html
- http://csrc.nist.gov/groups/STM/cmvp/index.html, http://csrc.nist.gov/groups/STM/cmvp/index.html
- RMF Control
- IA-8
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- LOW, MODERATE, HIGH
- IA-8.1 - CCI-000804
- The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).
- AC-2 - Account Management
- AC-14 - Permitted Actions Without Identification Or Authentication
- AC-17 - Remote Access
- AC-18 - Wireless Access
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- MA-4 - Nonlocal Maintenance
- RA-3 - Risk Assessment
- SA-12 - Supply Chain Protection
- SC-8 - Transmission Confidentiality And Integrity
- OMB Memorandum 04-04, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy04/m04-04.pdf
- OMB Memorandum 11-11, http://www.whitehouse.gov/sites/default/files/omb/memoranda/2011/m11-11.pdf
- OMB Memorandum 10-06-2011,
- FICAM Roadmap and Implementation Guidance, http://www.idmanagement.gov/documents/ficam-roadmap-and-implementation-guidance
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- NIST Special Publication 800-116, http://csrc.nist.gov/publications/PubsSPs.html#800-116
- National Strategy for Trusted Identities in Cyberspace, http://www.nist.gov/nstic
- http://idmanagement.gov, http://idmanagement.gov
- IA-8 (1) - Acceptance Of Piv Credentials From Other Agencies
- The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies.
- IA-8 (2) - Acceptance Of Third-Party Credentials
- The information system accepts only FICAM-approved third-party credentials.
- IA-8 (3) - Use Of Ficam-Approved Products
- The organization employs only FICAM-approved information system components in [Assignment: organization-defined information systems] to accept third-party credentials.
- IA-8 (4) - Use Of Ficam-Issued Profiles
- The information system conforms to FICAM-issued profiles.
- IA-8 (5) - Acceptance Of Piv-I Credentials
- The information system accepts and electronically verifies Personal Identity Verification-I (PIV-I) credentials.
- RMF Control
- IA-9
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- IA-9.1 - CCI-002017
- The organization defines the information system services requiring identification.
- IA-9.2 - CCI-002018
- The organization defines the information system services requiring authentication.
- IA-9.3 - CCI-002019
- The organization defines the security safeguards to be used when identifying information system services.
- IA-9.4 - CCI-002020
- The organization defines the security safeguards to be used when authenticating information system services.
- IA-9.5 - CCI-002021
- The organization identifies organization-defined information system services using organization-defined security safeguards.
- IA-9.6 - CCI-002022
- The organization authenticates organization-defined information system services using organization-defined security safeguards.
- IA-9 (1) - Information Exchange
- The organization ensures that service providers receive, validate, and transmit identification and authentication information.
- IA-9 (2) - Transmission Of Decisions
- The organization ensures that identification and authentication decisions are transmitted between [Assignment: organization-defined services] consistent with organizational policies.
- RMF Control
- IA-10
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- IA-10.1 - CCI-002033
- The organization defines the specific circumstances or situations when individuals accessing an information system employ organization-defined supplemental authentication techniques or mechanisms.
- IA-10.2 - CCI-002034
- The organization defines the supplemental authentication techniques or mechanisms to be employed in specific organization-defined circumstances or situations by individuals accessing the information system.
- IA-10.3 - CCI-002035
- The organization requires that individuals accessing the information system employ organization-defined supplemental authentication techniques or mechanisms under specific organization-defined circumstances or situations.
- RMF Control
- IA-11
- Subject Area
- IDENTIFICATION AND AUTHENTICATION
- Baseline Areas
- IA-11.1 - CCI-002036
- The organization defines the circumstances or situations when users will be required to reauthenticate.
- IA-11.2 - CCI-002037
- The organization defines the circumstances or situations when devices will be required to reauthenticate.
- IA-11.3 - CCI-002038
- The organization requires users to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
- IA-11.4 - CCI-002039
- The organization requires devices to reauthenticate when organization-defined circumstances or situations requiring reauthentication.
- AC-11 - Session Lock
- RMF Control
- IR-1
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- IR-1b.
- Reviews and updates the current:
- IR-1.1 - CCI-002776
- The organization defines the personnel or roles to whom the incident response policy is disseminated.
- IR-1.2 - CCI-002777
- The organization defines the personnel or roles to whom the incident response procedures are disseminated.
- IR-1.3 - CCI-000805
- The organization develops and documents an incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- IR-1.4 - CCI-000806
- The organization disseminates an incident response policy to organization-defined personnel or roles.
- IR-1.6 - CCI-000809
- The organization develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls.
- IR-1.5 - CCI-000810
- The organization disseminates incident response procedures to organization-defined personnel or roles.
- IR-1.8 - CCI-000808
- The organization defines the frequency to review and update the current incident response policy.
- IR-1.7 - CCI-000807
- The organization reviews and updates the current incident response policy in accordance with organization-defined frequency.
- IR-1.10 - CCI-000812
- The organization defines the frequency to review and update the current incident response procedures.
- IR-1.9 - CCI-000811
- The organization reviews and updates the current incident response procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- NIST Special Publication 800-83, http://csrc.nist.gov/publications/PubsSPs.html#800-83
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- IR-2
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-2a.
- Within [Assignment: organization-defined time period] of assuming an incident response role or responsibility;
- IR-2b.
- When required by information system changes; and
- IR-2c.
- [Assignment: organization-defined frequency] thereafter.
- IR-2.2 - CCI-002778
- The organization defines the time period in which information system users whom assume an incident response role or responsibility receive incident response training.
- IR-2.1 - CCI-000813
- The organization provides incident response training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming an incident response role or responsibility.
- IR-2.5 - CCI-002779
- The organization provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes.
- IR-2.3 - CCI-000814
- The organization provides refresher incident response training in accordance with organization-defined frequency.
- IR-2.4 - CCI-000815
- The organization defines a frequency for refresher incident response training.
- NIST Special Publication 800-16, http://csrc.nist.gov/publications/PubsSPs.html#800-16
- NIST Special Publication 800-50, http://csrc.nist.gov/publications/PubsSPs.html#800-50
- IR-2 (1) - Simulated Events
- The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations.
- IR-2 (2) - Automated Training Environments
- The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment.
- RMF Control
- IR-3
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- MODERATE, HIGH
- IR-3.1 - CCI-000818
- The organization tests the incident response capability for the information system on an organization-defined frequency using organization-defined tests to determine the incident response effectiveness.
- IR-3.2 - CCI-000819
- The organization defines a frequency for incident response tests.
- IR-3.3 - CCI-000820
- The organization defines tests for incident response.
- IR-3.4 - CCI-001624
- The organization documents the results of incident response tests.
- NIST Special Publication 800-84, http://csrc.nist.gov/publications/PubsSPs.html#800-84
- NIST Special Publication 800-115, http://csrc.nist.gov/publications/PubsSPs.html#800-115
- IR-3 (1) - Automated Testing
- The organization employs automated mechanisms to more thoroughly and effectively test the incident response capability.
- IR-3 (2) - Coordination With Related Plans
- The organization coordinates incident response testing with organizational elements responsible for related plans.
- RMF Control
- IR-4
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-4a.
- Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;
- IR-4b.
- Coordinates incident handling activities with contingency planning activities; and
- IR-4c.
- Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implements the resulting changes accordingly.
- IR-4.1 - CCI-000822
- The organization implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
- IR-4.2 - CCI-000823
- The organization coordinates incident handling activities with contingency planning activities.
- IR-4.3 - CCI-000824
- The organization incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises.
- IR-4.4 - CCI-001625
- The organization implements the resulting incident handling activity changes to incident response procedures, training and testing/exercise accordingly.
- AU-6 - Audit Review, Analysis, And Reporting
- CM-6 - Configuration Settings
- CP-2 - Contingency Plan
- CP-4 - Contingency Plan Testing
- IR-2 - Incident Response Training
- IR-3 - Incident Response Testing
- IR-8 - Incident Response Plan
- PE-6 - Monitoring Physical Access
- SC-5 - Denial Of Service Protection
- SC-7 - Boundary Protection
- SI-3 - Malicious Code Protection
- SI-4 - Information System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- Executive Order 13587, http://www.whitehouse.gov/the-press-office/2011/10/07/executive-order-13587-structural-reforms-improve-security-classified-net
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- IR-4 (1) - Automated Incident Handling Processes
- The organization employs automated mechanisms to support the incident handling process.
- IR-4 (2) - Dynamic Reconfiguration
- The organization includes dynamic reconfiguration of [Assignment: organization-defined information system components] as part of the incident response capability.
- IR-4 (3) - Continuity Of Operations
- The organization identifies [Assignment: organization-defined classes of incidents] and [Assignment: organization-defined actions to take in response to classes of incidents] to ensure continuation of organizational missions and business functions.
- IR-4 (4) - Information Correlation
- The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.
- IR-4 (5) - Automatic Disabling Of Information System
- The organization implements a configurable capability to automatically disable the information system if [Assignment: organization-defined security violations] are detected.
- IR-4 (6) - Insider Threats - Specific Capabilities
- The organization implements incident handling capability for insider threats.
- IR-4 (7) - Insider Threats - Intra-Organization Coordination
- The organization coordinates incident handling capability for insider threats across [Assignment: organization-defined components or elements of the organization].
- IR-4 (8) - Correlation With External Organizations
- The organization coordinates with [Assignment: organization-defined external organizations] to correlate and share [Assignment: organization-defined incident information] to achieve a cross-organization perspective on incident awareness and more effective incident responses.
- IR-4 (9) - Dynamic Response Capability
- The organization employs [Assignment: organization-defined dynamic response capabilities] to effectively respond to security incidents.
- IR-4 (10) - Supply Chain Coordination
- The organization coordinates incident handling activities involving supply chain events with other organizations involved in the supply chain.
- RMF Control
- IR-5
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-5.1 - CCI-000832
- The organization tracks and documents information system security incidents.
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- IR-5 (1) - Automated Tracking / Data Collection / Analysis
- The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
- RMF Control
- IR-6
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-6a.
- Requires personnel to report suspected security incidents to the organizational incident response capability within [Assignment: organization-defined time period]; and
- IR-6b.
- Reports security incident information to [Assignment: organization-defined authorities].
- IR-6.1 - CCI-000834
- The organization defines a time period for personnel to report suspected security incidents to the organizational incident response capability.
- IR-6.2 - CCI-000835
- The organization requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period.
- IR-6.3 - CCI-000836
- The organization reports security incident information to organization-defined authorities.
- IR-6.4 - CCI-002791
- The organization defines authorities to whom security incident information is reported.
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- http://www.us-cert.gov, http://www.us-cert.gov
- IR-6 (1) - Automated Reporting
- The organization employs automated mechanisms to assist in the reporting of security incidents.
- IR-6 (2) - Vulnerabilities Related To Incidents
- The organization reports information system vulnerabilities associated with reported security incidents to [Assignment: organization-defined personnel or roles].
- IR-6 (3) - Coordination With Supply Chain
- The organization provides security incident information to other organizations involved in the supply chain for information systems or information system components related to the incident.
- RMF Control
- IR-7
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-7.1 - CCI-000839
- The organization provides an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the information system for the handling and reporting of security incidents.
- IR-7 (1) - Automation Support For Availability Of Information / Support
- The organization employs automated mechanisms to increase the availability of incident response-related information and support.
- IR-7 (2) - Coordination With External Providers
- The organization:
- RMF Control
- IR-8
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- LOW, MODERATE, HIGH
- IR-8a.
- Develops an incident response plan that:
- IR-8b.
- Distributes copies of the incident response plan to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements];
- IR-8c.
- Reviews the incident response plan [Assignment: organization-defined frequency];
- IR-8d.
- Updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing;
- IR-8e.
- Communicates incident response plan changes to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements]; and
- IR-8f.
- Protects the incident response plan from unauthorized disclosure and modification.
- IR-8.1 - CCI-002794
- The organization develops an incident response plan.
- IR-8.2 - CCI-002795
- The organization's incident response plan provides the organization with a roadmap for implementing its incident response capability.
- IR-8.3 - CCI-002796
- The organization's incident response plan describes the structure and organization of the incident response capability.
- IR-8.4 - CCI-002797
- The organization's incident response plan provides a high-level approach for how the incident response capability fits into the overall organization.
- IR-8.5 - CCI-002798
- The organization's incident response plan meets the unique requirements of the organization, which relate to mission, size, structure, and functions.
- IR-8.6 - CCI-002799
- The organization's incident response plan defines reportable incidents.
- IR-8.7 - CCI-002800
- The organization's incident response plan provides metrics for measuring the incident response capability within the organization.
- IR-8.8 - CCI-002801
- The organization's incident response plan defines the resources and management support needed to effectively maintain and mature an incident response capability.
- IR-8.9 - CCI-002802
- The organization defines personnel or roles to review and approve the incident response plan.
- IR-8.10 - CCI-000844
- The organization develops an incident response plan that is reviewed and approved by organization-defined personnel or roles.
- IR-8.11 - CCI-000845
- The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom copies of the incident response plan is distributed.
- IR-8.12 - CCI-000846
- The organization distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
- IR-8.13 - CCI-000847
- The organization defines the frequency for reviewing the incident response plan.
- IR-8.14 - CCI-000848
- The organization reviews the incident response plan on an organization-defined frequency.
- IR-8.15 - CCI-000849
- The organization updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing.
- IR-8.17 - CCI-002803
- The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom the incident response plan changes will be communicated.
- IR-8.16 - CCI-000850
- The organization communicates incident response plan changes to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
- IR-8.18 - CCI-002804
- The organization protects the incident response plan from unauthorized disclosure and modification.
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- RMF Control
- IR-9
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- IR-9a.
- Identifying the specific information involved in the information system contamination;
- IR-9b.
- Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill;
- IR-9c.
- Isolating the contaminated information system or system component;
- IR-9d.
- Eradicating the information from the contaminated information system or component;
- IR-9e.
- Identifying other information systems or system components that may have been subsequently contaminated; and
- IR-9f.
- Performing other [Assignment: organization-defined actions].
- IR-9.1 - CCI-002805
- The organization responds to information spills by identifying the specific information involved in the information system contamination.
- IR-9.2 - CCI-002806
- The organization responds to information spills by alerting organization-defined personnel or roles of the information spill using a method of communication not associated with the spill.
- IR-9.3 - CCI-002807
- The organization defines personnel or roles to be alerted of the information spill using a method of communication not associated with the spill.
- IR-9.4 - CCI-002808
- The organization responds to information spills by isolating the contaminated information system or system component.
- IR-9.5 - CCI-002809
- The organization responds to information spills by eradicating the information from the contaminated information system or component.
- IR-9.6 - CCI-002810
- The organization responds to information spills by identifying other information systems or system components that may have been subsequently contaminated.
- IR-9.7 - CCI-002811
- The organization responds to information spills by performing other organization-defined actions.
- IR-9.8 - CCI-002812
- The organization defines other actions required to respond to information spills.
- IR-9 (1) - Responsible Personnel
- The organization assigns [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills.
- IR-9 (2) - Training
- The organization provides information spillage response training [Assignment: organization-defined frequency].
- IR-9 (3) - Post-Spill Operations
- The organization implements [Assignment: organization-defined procedures] to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.
- IR-9 (4) - Exposure To Unauthorized Personnel
- The organization employs [Assignment: organization-defined security safeguards] for personnel exposed to information not within assigned access authorizations.
- RMF Control
- IR-10
- Subject Area
- INCIDENT RESPONSE
- Baseline Areas
- IR-10.1 - CCI-002822
- The organization establishes an integrated team of forensic/malicious code analysts, tool developers, and real-time operations personnel.
- RMF Control
- MA-1
- Subject Area
- MAINTENANCE
- Baseline Areas
- LOW, MODERATE, HIGH
- MA-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- MA-1b.
- Reviews and updates the current:
- MA-1.1 - CCI-002861
- The organization defines the personnel or roles to whom a system maintenance policy is disseminated.
- MA-1.2 - CCI-002862
- The organization defines the personnel or roles to whom system maintenance procedures are to be disseminated.
- MA-1.3 - CCI-000852
- The organization develops and documents a system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- MA-1.4 - CCI-000853
- The organization disseminates to organization-defined personnel or roles a system maintenance policy.
- MA-1.5 - CCI-000855
- The organization develops and documents procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
- MA-1.6 - CCI-000856
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
- MA-1.7 - CCI-000851
- The organization defines the frequency to review and update the current system maintenance policy.
- MA-1.8 - CCI-000854
- The organization reviews and updates the current system maintenance policy in accordance with organization-defined frequency.
- MA-1.10 - CCI-001628
- The organization defines a frequency to review and update the current system maintenance procedures.
- MA-1.9 - CCI-000857
- The organization reviews and updates the current system maintenance procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- MA-2
- Subject Area
- MAINTENANCE
- Baseline Areas
- LOW, MODERATE, HIGH
- MA-2a.
- Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
- MA-2b.
- Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;
- MA-2c.
- Requires that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
- MA-2d.
- Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
- MA-2e.
- Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and
- MA-2f.
- Includes [Assignment: organization-defined maintenance-related information] in organizational maintenance records.
- MA-2.5 - CCI-002870
- The organization schedules repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements
- MA-2.1 - CCI-002866
- The organization schedules maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.7 - CCI-002872
- The organization documents repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.3 - CCI-002868
- The organization documents maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.8 - CCI-002873
- The organization reviews records of repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.4 - CCI-002869
- The organization reviews records of maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.6 - CCI-002871
- The organization performs repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.2 - CCI-002867
- The organization performs maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
- MA-2.9 - CCI-000859
- The organization approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location.
- MA-2.11 - CCI-002874
- The organization defines the personnel or roles who can explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
- MA-2.10 - CCI-000860
- The organization requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
- MA-2.12 - CCI-000861
- The organization sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs.
- MA-2.13 - CCI-000862
- The organization checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions.
- MA-2.15 - CCI-002876
- The organization defines the maintenance-related information to include in organizational maintenance records.
- MA-2.14 - CCI-002875
- The organization includes organization-defined maintenance-related information in organizational maintenance records.
- MA-2 (1) - Record Content
- [Withdrawn: Incorporated into MA-2].
- MA-2 (2) - Automated Maintenance Activities
- The organization:
- RMF Control
- MA-3
- Subject Area
- MAINTENANCE
- Baseline Areas
- MODERATE, HIGH
- MA-3.1 - CCI-000865
- The organization approves information system maintenance tools.
- MA-3.2 - CCI-000866
- The organization controls information system maintenance tools.
- MA-3.3 - CCI-000867
- The organization monitors information system maintenance tools.
- NIST Special Publication 800-88, http://csrc.nist.gov/publications/PubsSPs.html#800-88
- MA-3 (1) - Inspect Tools
- The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.
- MA-3 (2) - Inspect Media
- The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.
- MA-3 (3) - Prevent Unauthorized Removal
- The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:
- MA-3 (4) - Restricted Tool Use
- The information system restricts the use of maintenance tools to authorized personnel only.
- RMF Control
- MA-4
- Subject Area
- MAINTENANCE
- Baseline Areas
- LOW, MODERATE, HIGH
- MA-4a.
- Approves and monitors nonlocal maintenance and diagnostic activities;
- MA-4b.
- Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;
- MA-4c.
- Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;
- MA-4d.
- Maintains records for nonlocal maintenance and diagnostic activities; and
- MA-4e.
- Terminates session and network connections when nonlocal maintenance is completed.
- MA-4.1 - CCI-000873
- The organization approves nonlocal maintenance and diagnostic activities.
- MA-4.2 - CCI-000874
- The organization monitors nonlocal maintenance and diagnostic activities.
- MA-4.3 - CCI-000876
- The organization allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system.
- MA-4.4 - CCI-000877
- The organization employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
- MA-4.5 - CCI-000878
- The organization maintains records for nonlocal maintenance and diagnostic activities.
- MA-4.6 - CCI-000879
- The organization terminates sessions and network connections when nonlocal maintenance is completed.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- AC-17 - Remote Access
- AU-2 - Audit Events
- AU-3 - Content Of Audit Records
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- IA-8 - Identification And Authentication (Non-Organizational Users)
- MA-2 - Controlled Maintenance
- MA-5 - Maintenance Personnel
- MP-6 - Media Sanitization
- PL-2 - System Security Plan
- SC-7 - Boundary Protection
- SC-10 - Network Disconnect
- SC-17 - Public Key Infrastructure Certificates
- FIPS Publication 140-2, http://csrc.nist.gov/publications/PubsFIPS.html#140-2
- FIPS Publication 197, http://csrc.nist.gov/publications/PubsFIPS.html#197
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- NIST Special Publication 800-88, http://csrc.nist.gov/publications/PubsSPs.html#800-88
- CNSS Policy 15, https://www.cnss.gov/policies.html
- MA-4 (1) - Auditing And Review
- The organization:
- MA-4 (2) - Document Nonlocal Maintenance
- The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.
- MA-4 (3) - Comparable Security / Sanitization
- The organization:
- MA-4 (4) - Authentication / Separation Of Maintenance Sessions
- The organization protects nonlocal maintenance sessions by:
- MA-4 (5) - Approvals And Notifications
- The organization:
- MA-4 (6) - Cryptographic Protection
- The information system implements cryptographic mechanisms to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications.
- MA-4 (7) - Remote Disconnect Verification
- The information system implements remote disconnect verification at the termination of nonlocal maintenance and diagnostic sessions.
- RMF Control
- MA-5
- Subject Area
- MAINTENANCE
- Baseline Areas
- LOW, MODERATE, HIGH
- MA-5a.
- Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
- MA-5b.
- Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
- MA-5c.
- Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
- MA-5.1 - CCI-000890
- The organization establishes a process for maintenance personnel authorization.
- MA-5.2 - CCI-000891
- The organization maintains a list of authorized maintenance organizations or personnel.
- MA-5.3 - CCI-002894
- The organization ensures that non-escorted personnel performing maintenance on the information system have required access authorizations.
- MA-5.4 - CCI-002895
- The organization designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
- MA-5 (1) - Individuals Without Appropriate Access
- The organization:
- MA-5 (2) - Security Clearances For Classified Systems
- The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information possess security clearances and formal access approvals for at least the highest classification level and for all compartments of information on the system.
- MA-5 (3) - Citizenship Requirements For Classified Systems
- The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information are U.S. citizens.
- MA-5 (4) - Foreign Nationals
- The organization ensures that:
- MA-5 (5) - Nonsystem-Related Maintenance
- The organization ensures that non-escorted personnel performing maintenance activities not directly associated with the information system but in the physical proximity of the system, have required access authorizations.
- RMF Control
- MA-6
- Subject Area
- MAINTENANCE
- Baseline Areas
- MODERATE, HIGH
- MA-6.1 - CCI-000903
- The organization obtains maintenance support and/or spare parts for organization-defined information system components within an organization-defined time period of failure.
- MA-6.2 - CCI-002896
- The organization defines the information system components for which it obtains maintenance support and/or spare parts.
- MA-6.3 - CCI-002897
- The organization defines a time period for obtaining maintenance support and/or spare parts for organization-defined information system components after a failure.
- MA-6 (1) - Preventive Maintenance
- The organization performs preventive maintenance on [Assignment: organization-defined information system components] at [Assignment: organization-defined time intervals].
- MA-6 (2) - Predictive Maintenance
- The organization performs predictive maintenance on [Assignment: organization-defined information system components] at [Assignment: organization-defined time intervals].
- MA-6 (3) - Automated Support For Predictive Maintenance
- The organization employs automated mechanisms to transfer predictive maintenance data to a computerized maintenance management system.
- RMF Control
- MP-1
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- MP-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- MP-1b.
- Reviews and updates the current:
- MP-1.3 - CCI-002566
- The organization defines personnel or roles to whom a documented media protection policy and procedures will be disseminated.
- MP-1.1 - CCI-000995
- The organization develops and documents a media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- MP-1.2 - CCI-000996
- The organization disseminates to organization-defined personnel or roles a media protection policy.
- MP-1.4 - CCI-000999
- The organization develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls.
- MP-1.5 - CCI-001000
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the media protection policy and associated media protection controls.
- MP-1.7 - CCI-000998
- The organization defines a frequency for reviewing and updating the current media protection policy.
- MP-1.6 - CCI-000997
- The organization reviews and updates the current media protection policy in accordance with organization-defined frequency.
- MP-1.9 - CCI-001002
- The organization defines a frequency for reviewing and updating the current media protection procedures.
- MP-1.8 - CCI-001001
- The organization reviews and updates the current media protection procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- MP-2
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- MP-2.1 - CCI-001003
- The organization restricts access to organization-defined types of digital and/or non-digital media to organization-defined personnel or roles.
- MP-2.2 - CCI-001004
- The organization defines types of digital and/or non-digital media for which the organization restricts access.
- MP-2.3 - CCI-001005
- The organization defines personnel or roles to restrict access to organization-defined types of digital and/or non-digital media.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-111, http://csrc.nist.gov/publications/PubsSPs.html#800-111
- MP-2 (1) - Automated Restricted Access
- [Withdrawn: Incorporated into MP-4 (2)].
- MP-2 (2) - Cryptographic Protection
- [Withdrawn: Incorporated into SC-28 (1)].
- RMF Control
- MP-3
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- MODERATE, HIGH
- MP-3a.
- Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and
- MP-3b.
- Exempts [Assignment: organization-defined types of information system media] from marking as long as the media remain within [Assignment: organization-defined controlled areas].
- MP-3.1 - CCI-001010
- The organization marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.
- MP-3.2 - CCI-001011
- The organization exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas.
- MP-3.3 - CCI-001012
- The organization defines types of information system media to exempt from marking as long as the media remain within organization-defined controlled areas.
- MP-3.4 - CCI-001013
- The organization defines controlled areas where organization-defined types of information system media are exempt from being marked.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- RMF Control
- MP-4
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- MODERATE, HIGH
- MP-4a.
- Physically controls and securely stores [Assignment: organization-defined types of digital and/or non-digital media] within [Assignment: organization-defined controlled areas]; and
- MP-4b.
- Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
- MP-4.1 - CCI-001014
- The organization physically controls and securely stores organization-defined types of digital and/or non-digital media within organization-defined controlled areas.
- MP-4.2 - CCI-001015
- The organization defines types of digital and/or non-digital media to physically control and securely store within organization-defined controlled areas.
- MP-4.3 - CCI-001016
- The organization defines controlled areas where organization-defined types of digital and/or non-digital media are physically controlled and securely stored.
- MP-4.4 - CCI-001018
- The organization protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-56, http://csrc.nist.gov/publications/PubsSPs.html#800-56
- NIST Special Publication 800-57, http://csrc.nist.gov/publications/PubsSPs.html#800-57
- NIST Special Publication 800-111, http://csrc.nist.gov/publications/PubsSPs.html#800-111
- MP-4 (1) - Cryptographic Protection
- [Withdrawn: Incorporated into SC-28 (1)].
- MP-4 (2) - Automated Restricted Access
- The organization employs automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted.
- RMF Control
- MP-5
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- MODERATE, HIGH
- MP-5a.
- Protects and controls [Assignment: organization-defined types of information system media] during transport outside of controlled areas using [Assignment: organization-defined security safeguards];
- MP-5b.
- Maintains accountability for information system media during transport outside of controlled areas;
- MP-5c.
- Documents activities associated with the transport of information system media; and
- MP-5d.
- Restricts the activities associated with the transport of information system media to authorized personnel.
- MP-5.1 - CCI-001020
- The organization protects and controls organization-defined types of information system media during transport outside of controlled areas using organization-defined security safeguards.
- MP-5.2 - CCI-001021
- The organization defines types of information system media protected and controlled during transport outside of controlled areas.
- MP-5.3 - CCI-001022
- The organization defines security safeguards to be used to protect and control organization-defined types of information system media during transport outside of controlled areas.
- MP-5.4 - CCI-001023
- The organization maintains accountability for information system media during transport outside of controlled areas.
- MP-5.6 - CCI-001024
- The organization restricts the activities associated with the transport of information system media to authorized personnel.
- MP-5.5 - CCI-001025
- The organization documents activities associated with the transport of information system media.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- MP-5 (1) - Protection Outside Of Controlled Areas
- [Withdrawn: Incorporated into MP-5].
- MP-5 (2) - Documentation Of Activities
- [Withdrawn: Incorporated into MP-5].
- MP-5 (3) - Custodians
- The organization employs an identified custodian during transport of information system media outside of controlled areas.
- MP-5 (4) - Cryptographic Protection
- The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.
- RMF Control
- MP-6
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- MP-6a.
- Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and
- MP-6b.
- Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
- MP-6.1 - CCI-001028
- The organization sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
- MP-6.2 - CCI-002578
- The organization defines information system media to sanitize prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
- MP-6.3 - CCI-002579
- The organization defines the sanitization techniques and procedures in accordance with applicable federal and organization standards and policies to be used to sanitize organization-defined information system media prior to disposal, release out of organizational control, or release for reuse.
- MP-6.4 - CCI-002580
- The organization employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- NIST Special Publication 800-88, http://csrc.nist.gov/publications/PubsSPs.html#800-88
- http://www.nsa.gov/ia/mitigation_guidance/media_destruction_guidance/index.shtml, http://www.nsa.gov/ia/mitigation_guidance/media_destruction_guidance/index.shtml
- MP-6 (1) - Review / Approve / Track / Document / Verify
- The organization reviews, approves, tracks, documents, and verifies media sanitization and disposal actions.
- MP-6 (2) - Equipment Testing
- The organization tests sanitization equipment and procedures [Assignment: organization-defined frequency] to verify that the intended sanitization is being achieved.
- MP-6 (3) - Nondestructive Techniques
- The organization applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under the following circumstances: [Assignment: organization-defined circumstances requiring sanitization of portable storage devices].
- MP-6 (4) - Controlled Unclassified Information
- [Withdrawn: Incorporated into MP-6].
- MP-6 (5) - Classified Information
- [Withdrawn: Incorporated into MP-6].
- MP-6 (6) - Media Destruction
- [Withdrawn: Incorporated into MP-6].
- MP-6 (7) - Dual Authorization
- The organization enforces dual authorization for the sanitization of [Assignment: organization-defined information system media].
- MP-6 (8) - Remote Purging / Wiping Of Information
- The organization provides the capability to purge/wipe information from [Assignment: organization-defined information systems, system components, or devices] either remotely or under the following conditions: [Assignment: organization-defined conditions].
- RMF Control
- MP-7
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- MP-7.1 - CCI-002581
- The organization defines the types of information system media to restrict or prohibit on organization-defined information systems or system components using organization-defined security safeguards.
- MP-7.2 - CCI-002582
- The organization defines the information systems or system components to restrict or prohibit the use of organization-defined types of information system media using organization-defined security safeguards.
- MP-7.3 - CCI-002583
- The organization defines the security safeguards to use for restricting or prohibiting the use of organization-defined types of information system media on organization-defined information systems or system components.
- MP-7.4 - CCI-002584
- The organization restricts or prohibits the use of organization-defined types of information system media on organization-defined information systems or system components using organization-defined security safeguards.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-111, http://csrc.nist.gov/publications/PubsSPs.html#800-111
- MP-7 (1) - Prohibit Use Without Owner
- The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.
- MP-7 (2) - Prohibit Use Of Sanitization-Resistant Media
- The organization prohibits the use of sanitization-resistant media in organizational information systems.
- RMF Control
- MP-8
- Subject Area
- MEDIA PROTECTION
- Baseline Areas
- MP-8a.
- Establishes [Assignment: organization-defined information system media downgrading process] that includes employing downgrading mechanisms with [Assignment: organization-defined strength and integrity];
- MP-8b.
- Ensures that the information system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information;
- MP-8c.
- Identifies [Assignment: organization-defined information system media requiring downgrading]; and
- MP-8d.
- Downgrades the identified information system media using the established process.
- MP-8.5 - CCI-002600
- The organization downgrades the identified information system media using the established process.
- MP-8.1 - CCI-002596
- The organization establishes and defines an information system media downgrading process that includes employing downgrading mechanisms with organization-defined strength and integrity.
- MP-8.2 - CCI-002597
- The organization defines strength and integrity for downgrading mechanisms to establish an organization-defined information system media downgrading process.
- MP-8.3 - CCI-002598
- The organization ensures that the information system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information
- MP-8.4 - CCI-002599
- The organization defines and identifies the information system media requiring downgrading.
- MP-8 (1) - Documentation Of Process
- The organization documents information system media downgrading actions.
- MP-8 (2) - Equipment Testing
- The organization employs [Assignment: organization-defined tests] of downgrading equipment and procedures to verify correct performance [Assignment: organization-defined frequency].
- MP-8 (3) - Controlled Unclassified Information
- The organization downgrades information system media containing [Assignment: organization-defined Controlled Unclassified Information (CUI)] prior to public release in accordance with applicable federal and organizational standards and policies.
- MP-8 (4) - Classified Information
- The organization downgrades information system media containing classified information prior to release to individuals without required access authorizations in accordance with NSA standards and policies.
- RMF Control
- PE-1
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- PE-1b.
- Reviews and updates the current:
- PE-1.1 - CCI-002908
- The organization defines the personnel or roles to whom a physical and environmental protection policy is disseminated.
- PE-1.2 - CCI-002909
- The organization defines the personnel or roles to whom the physical and environmental protection procedures are disseminated.
- PE-1.3 - CCI-000904
- The organization develops and documents a physical and environment protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PE-1.4 - CCI-000905
- The organization disseminates a physical and environmental protection policy to organization-defined personnel or roles.
- PE-1.5 - CCI-000908
- The organization develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls.
- PE-1.6 - CCI-000909
- The organization disseminates physical and environmental protection procedures to organization-defined personnel or roles.
- PE-1.8 - CCI-000907
- The organization defines the frequency to review and update the physical and environmental protection policy.
- PE-1.7 - CCI-000906
- The organization reviews and updates the current physical and environmental protection policy in accordance with organization-defined frequency.
- PE-1.10 - CCI-000911
- The organization defines the frequency to review and update the physical and environmental protection procedures.
- PE-1.9 - CCI-000910
- The organization reviews and updates the current physical and environmental protection procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- PE-2
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-2a.
- Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
- PE-2b.
- Issues authorization credentials for facility access;
- PE-2c.
- Reviews the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
- PE-2d.
- Removes individuals from the facility access list when access is no longer required.
- PE-2.1 - CCI-000912
- The organization develops a list of individuals with authorized access to the facility where the information system resides.
- PE-2.2 - CCI-002910
- The organization approves a list of individuals with authorized access to the facility where the information system resides.
- PE-2.3 - CCI-002911
- The organization maintains a list of individuals with authorized access to the facility where the information system resides.
- PE-2.4 - CCI-000913
- The organization issues authorization credentials for facility access.
- PE-2.5 - CCI-000914
- The organization reviews the access list detailing authorized facility access by individuals in accordance with organization-defined frequency.
- PE-2.6 - CCI-000915
- The organization defines the frequency to review the access list detailing authorized facility access by individuals.
- PE-2.7 - CCI-001635
- The organization removes individuals from the facility access list when access is no longer required.
- PE-2 (1) - Access By Position / Role
- The organization authorizes physical access to the facility where the information system resides based on position or role.
- PE-2 (2) - Two Forms Of Identification
- The organization requires two forms of identification from [Assignment: organization-defined list of acceptable forms of identification] for visitor access to the facility where the information system resides.
- PE-2 (3) - Restrict Unescorted Access
- The organization restricts unescorted access to the facility where the information system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined credentials]].
- RMF Control
- PE-3
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-3a.
- Enforces physical access authorizations at [Assignment: organization-defined entry/exit points to the facility where the information system resides] by;
- PE-3b.
- Maintains physical access audit logs for [Assignment: organization-defined entry/exit points];
- PE-3c.
- Provides [Assignment: organization-defined security safeguards] to control access to areas within the facility officially designated as publicly accessible;
- PE-3d.
- Escorts visitors and monitors visitor activity [Assignment: organization-defined circumstances requiring visitor escorts and monitoring];
- PE-3e.
- Secures keys, combinations, and other physical access devices;
- PE-3f.
- Inventories [Assignment: organization-defined physical access devices] every [Assignment: organization-defined frequency]; and
- PE-3g.
- Changes combinations and keys [Assignment: organization-defined frequency] and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
- PE-3.2 - CCI-002915
- The organization defines the entry/exit points to the facility where the information system resides.
- PE-3.1 - CCI-000919
- The organization enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides.
- PE-3.3 - CCI-000920
- The organization verifies individual access authorizations before granting access to the facility.
- PE-3.5 - CCI-002916
- The organization defines the physical access control systems/devices or guards that control ingress/egress to the facility.
- PE-3.4 - CCI-000921
- The organization controls ingress/egress to the facility using one or more organization-defined physical access control systems/devices or guards.
- PE-3.7 - CCI-002918
- The organization defines entry/exit points that require physical access audit logs be maintained.
- PE-3.6 - CCI-002917
- The organization maintains physical access audit logs for organization-defined entry/exit points.
- PE-3.9 - CCI-002920
- The organization defines security safeguards to control access to areas within the facility officially designated as publicly accessible.
- PE-3.8 - CCI-002919
- The organization provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible.
- PE-3.11 - CCI-002922
- The organization defines circumstances requiring visitor escorts.
- PE-3.10 - CCI-002921
- The organization escorts visitors during organization-defined circumstances requiring visitor escorts.
- PE-3.13 - CCI-002924
- The organization defines circumstances requiring visitor monitoring.
- PE-3.12 - CCI-002923
- The organization monitors visitor activity during organization-defined circumstances requiring visitor monitoring.
- PE-3.14 - CCI-000923
- The organization secures keys, combinations, and other physical access devices.
- PE-3.17 - CCI-002925
- The organization defines the physical access devices to inventory.
- PE-3.16 - CCI-000925
- The organization defines the frequency for conducting inventories of organization-defined physical access devices.
- PE-3.15 - CCI-000924
- The organization inventories organization-defined physical access devices every organization-defined frequency.
- PE-3.19 - CCI-000927
- The organization defines a frequency for changing combinations and keys.
- PE-3.18 - CCI-000926
- The organization changes combinations and keys in accordance with organization-defined frequency and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- NIST Special Publication 800-116, http://csrc.nist.gov/publications/PubsSPs.html#800-116
- ICD 704, http://www.dni.gov/index.php/intelligence-community/ic-policies-reports/intelligence-community-directives
- ICD 705, http://www.dni.gov/index.php/intelligence-community/ic-policies-reports/intelligence-community-directives
- DoD Instruction 5200.39, http://www.dtic.mil/whs/directives/corres/ins1.html
- Personal Identity Verification (PIV) in Enterprise Physical Access Control System (E-PACS),
- http://idmanagement.gov, http://idmanagement.gov
- http://fips201ep.cio.gov, http://fips201ep.cio.gov
- PE-3 (1) - Information System Access
- The organization enforces physical access authorizations to the information system in addition to the physical access controls for the facility at [Assignment: organization-defined physical spaces containing one or more components of the information system].
- PE-3 (2) - Facility / Information System Boundaries
- The organization performs security checks [Assignment: organization-defined frequency] at the physical boundary of the facility or information system for unauthorized exfiltration of information or removal of information system components.
- PE-3 (3) - Continuous Guards / Alarms / Monitoring
- The organization employs guards and/or alarms to monitor every physical access point to the facility where the information system resides 24 hours per day, 7 days per week.
- PE-3 (4) - Lockable Casings
- The organization uses lockable physical casings to protect [Assignment: organization-defined information system components] from unauthorized physical access.
- PE-3 (5) - Tamper Protection
- The organization employs [Assignment: organization-defined security safeguards] to [Selection (one or more): detect; prevent] physical tampering or alteration of [Assignment: organization-defined hardware components] within the information system.
- PE-3 (6) - Facility Penetration Testing
- The organization employs a penetration testing process that includes [Assignment: organization-defined frequency], unannounced attempts to bypass or circumvent security controls associated with physical access points to the facility.
- RMF Control
- PE-4
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-4.1 - CCI-000936
- The organization controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards.
- PE-4.2 - CCI-002930
- The organization defines information system distribution and transmission lines within organizational facilities to control physical access using organization-defined security safeguards.
- PE-4.3 - CCI-002931
- The organization defines security safeguards to control physical access to organization-defined information system distribution and transmission lines within organizational facilities.
- NSTISSI No. 7003, http://www.cnss.gov/Assets/pdf/nstissi_7003.pdf
- RMF Control
- PE-5
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-5.1 - CCI-000937
- The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
- PE-5 (1) - Access To Output By Authorized Individuals
- The organization:
- PE-5 (2) - Access To Output By Individual Identity
- The information system:
- PE-5 (3) - Marking Output Devices
- The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.
- RMF Control
- PE-6
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-6a.
- Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;
- PE-6b.
- Reviews physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and
- PE-6c.
- Coordinates results of reviews and investigations with the organizational incident response capability.
- PE-6.1 - CCI-002939
- The organization monitors physical access to the facility where the information system resides to detect and respond to physical security incidents.
- PE-6.5 - CCI-000940
- The organization defines a frequency for reviewing physical access logs.
- PE-6.4 - CCI-000939
- The organization reviews physical access logs in accordance with organization-defined frequency.
- PE-6.3 - CCI-002941
- The organization defines events or potential indications of events requiring review of physical access logs.
- PE-6.2 - CCI-002940
- The organization reviews physical access logs upon occurrence of organization-defined events or potential indications of events
- PE-6.6 - CCI-000941
- The organization coordinates results of reviews and investigations with the organizations incident response capability.
- PE-6 (1) - Intrusion Alarms / Surveillance Equipment
- The organization monitors physical intrusion alarms and surveillance equipment.
- PE-6 (2) - Automated Intrusion Recognition / Responses
- The organization employs automated mechanisms to recognize [Assignment: organization-defined classes/types of intrusions] and initiate [Assignment: organization-defined response actions].
- PE-6 (3) - Video Surveillance
- The organization employs video surveillance of [Assignment: organization-defined operational areas] and retains video recordings for [Assignment: organization-defined time period].
- PE-6 (4) - Monitoring Physical Access To Information Systems
- The organization monitors physical access to the information system in addition to the physical access monitoring of the facility as [Assignment: organization-defined physical spaces containing one or more components of the information system].
- RMF Control
- PE-7
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- RMF Control
- PE-8
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-8a.
- Maintains visitor access records to the facility where the information system resides for [Assignment: organization-defined time period]; and
- PE-8b.
- Reviews visitor access records [Assignment: organization-defined frequency].
- PE-8.2 - CCI-002952
- The organization defines the time period to maintain visitor access records to the facility where the information system resides.
- PE-8.1 - CCI-000947
- The organization maintains visitor access records to the facility where the information system resides for organization-defined time period.
- PE-8.4 - CCI-000949
- The organization defines the frequency to review the visitor access records for the facility where the information system resides.
- PE-8.3 - CCI-000948
- The organization reviews visitor access records in accordance with organization-defined frequency.
- PE-8 (1) - Automated Records Maintenance / Review
- The organization employs automated mechanisms to facilitate the maintenance and review of visitor access records.
- PE-8 (2) - Physical Access Records
- [Withdrawn: Incorporated into PE-2].
- RMF Control
- PE-9
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-9.1 - CCI-000952
- The organization protects power equipment and power cabling for the information system from damage and destruction.
- PE-4 - Access Control For Transmission Medium
- PE-9 (1) - Redundant Cabling
- The organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance].
- PE-9 (2) - Automatic Voltage Controls
- The organization employs automatic voltage controls for [Assignment: organization-defined critical information system components].
- RMF Control
- PE-10
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-10a.
- Provides the capability of shutting off power to the information system or individual system components in emergency situations;
- PE-10b.
- Places emergency shutoff switches or devices in [Assignment: organization-defined location by information system or system component] to facilitate safe and easy access for personnel; and
- PE-10c.
- Protects emergency power shutoff capability from unauthorized activation.
- PE-10.1 - CCI-000956
- The organization provides the capability of shutting off power to the information system or individual system components in emergency situations.
- PE-10.2 - CCI-000957
- The organization places emergency shutoff switches or devices in an organization-defined location by information system or system component to facilitate safe and easy access for personnel.
- PE-10.3 - CCI-000958
- The organization defines a location for emergency shutoff switches or devices by information system or system component.
- PE-10.4 - CCI-000959
- The organization protects emergency power shutoff capability from unauthorized activation.
- PE-15 - Water Damage Protection
- PE-10 (1) - Accidental / Unauthorized Activation
- [Withdrawn: Incorporated into PE-10].
- RMF Control
- PE-11
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-11.1 - CCI-002955
- The organization provides a short-term uninterruptible power supply to facilitate an orderly shutdown of the information system and/or transition of the information system to long-term alternate power in the event of a primary power source loss.
- PE-11 (1) - Long-Term Alternate Power Supply - Minimal Operational Capability
- The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.
- PE-11 (2) - Long-Term Alternate Power Supply - Self-Contained
- The organization provides a long-term alternate power supply for the information system that is:
- RMF Control
- PE-12
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-12.1 - CCI-000963
- The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
- PE-12 (1) - Essential Missions / Business Functions
- The organization provides emergency lighting for all areas within the facility supporting essential missions and business functions.
- RMF Control
- PE-13
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-13.1 - CCI-000965
- The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
- PE-13 (1) - Detection Devices / Systems
- The organization employs fire detection devices/systems for the information system that activate automatically and notify [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders] in the event of a fire.
- PE-13 (2) - Suppression Devices / Systems
- The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation to Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].
- PE-13 (3) - Automatic Fire Suppression
- The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.
- PE-13 (4) - Inspections
- The organization ensures that the facility undergoes [Assignment: organization-defined frequency] inspections by authorized and qualified inspectors and resolves identified deficiencies within [Assignment: organization-defined time period].
- RMF Control
- PE-14
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-14a.
- Maintains temperature and humidity levels within the facility where the information system resides at [Assignment: organization-defined acceptable levels]; and
- PE-14b.
- Monitors temperature and humidity levels [Assignment: organization-defined frequency].
- PE-14.1 - CCI-000971
- The organization maintains temperature and humidity levels within the facility where the information system resides at organization-defined acceptable levels.
- PE-14.2 - CCI-000972
- The organization defines acceptable temperature and humidity levels to be maintained within the facility where the information system resides.
- PE-14.3 - CCI-000973
- The organization monitors temperature and humidity levels in accordance with organization-defined frequency.
- PE-14.4 - CCI-000974
- The organization defines a frequency for monitoring temperature and humidity levels.
- AT-3 - Role-Based Security Training
- PE-14 (1) - Automatic Controls
- The organization employs automatic temperature and humidity controls in the facility to prevent fluctuations potentially harmful to the information system.
- PE-14 (2) - Monitoring With Alarms / Notifications
- The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.
- RMF Control
- PE-15
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-15.1 - CCI-000977
- The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible.
- PE-15.2 - CCI-000978
- The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are working properly.
- PE-15.3 - CCI-000979
- Key personnel have knowledge of the master water shutoff or isolation valves.
- AT-3 - Role-Based Security Training
- PE-15 (1) - Automation Support
- The organization employs automated mechanisms to detect the presence of water in the vicinity of the information system and alerts [Assignment: organization-defined personnel or roles].
- RMF Control
- PE-16
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- PE-16.1 - CCI-000981
- The organization authorizes organization-defined types of information system components entering and exiting the facility.
- PE-16.2 - CCI-000982
- The organization monitors organization-defined types of information system components entering and exiting the facility.
- PE-16.3 - CCI-000983
- The organization controls organization-defined types of information system components entering and exiting the facility.
- PE-16.4 - CCI-000984
- The organization maintains records of information system components entering and exiting the facility.
- PE-16.5 - CCI-002974
- The organization defines types of information system components to authorize, monitor, and control entering and exiting the facility and to maintain records.
- RMF Control
- PE-17
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- MODERATE, HIGH
- PE-17a.
- Employs [Assignment: organization-defined security controls] at alternate work sites;
- PE-17b.
- Assesses as feasible, the effectiveness of security controls at alternate work sites; and
- PE-17c.
- Provides a means for employees to communicate with information security personnel in case of security incidents or problems.
- PE-17.1 - CCI-000985
- The organization employs organization-defined security controls at alternate work sites.
- PE-17.3 - CCI-000987
- The organization assesses as feasible, the effectiveness of security controls at alternate work sites.
- PE-17.4 - CCI-000988
- The organization provides a means for employees to communicate with information security personnel in case of security incidents or problems.
- PE-17.2 - CCI-002975
- The organization defines security controls to employ at alternate work sites.
- NIST Special Publication 800-46, http://csrc.nist.gov/publications/PubsSPs.html#800-46
- RMF Control
- PE-18
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- HIGH
- PE-18.1 - CCI-000989
- The organization positions information system components within the facility to minimize potential damage from organization-defined physical and environmental hazards.
- PE-18.2 - CCI-000991
- The organization positions information system components within the facility to minimize the opportunity for unauthorized access.
- PE-18.3 - CCI-002976
- The organization defines physical and environmental hazards that could cause potential damage to information system components within the facility.
- PE-18 (1) - Facility Site
- The organization plans the location or site of the facility where the information system resides with regard to physical and environmental hazards and for existing facilities, considers the physical and environmental hazards in its risk mitigation strategy.
- RMF Control
- PE-19
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- PE-19.1 - CCI-000993
- The organization protects the information system from information leakage due to electromagnetic signals emanations.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- PE-19 (1) - National Emissions / Tempest Policies And Procedures
- The organization ensures that information system components, associated data communications, and networks are protected in accordance with national emissions and TEMPEST policies and procedures based on the security category or classification of the information.
- RMF Control
- PE-20
- Subject Area
- PHYSICAL AND ENVIRONMENTAL PROTECTION
- Baseline Areas
- PE-20a.
- Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and
- PE-20b.
- Ensures that asset location technologies are employed in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance.
- PE-20.1 - CCI-002979
- The organization employs organization-defined asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
- PE-20.2 - CCI-002980
- The organization defines asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
- PE-20.3 - CCI-002981
- The organization defines the assets within the organization-defined controlled areas which are to be tracked and monitored for their location and movement.
- PE-20.4 - CCI-002982
- The organization defines controlled areas that the location and movement of organization-defined assets are tracked and monitored.
- PE-20.5 - CCI-002983
- The organization ensures that asset location technologies are employed in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance.
- CM-8 - Information System Component Inventory
- RMF Control
- PL-1
- Subject Area
- PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- PL-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- PL-1b.
- Reviews and updates the current:
- PL-1.1 - CCI-003047
- The organization defines the personnel or roles to whom a security planning policy is disseminated.
- PL-1.2 - CCI-003048
- The organization defines the personnel or roles to whom the security planning procedures are disseminated.
- PL-1.3 - CCI-000563
- The organization develops and documents a security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PL-1.4 - CCI-000564
- The organization disseminates a security planning policy to organization-defined personnel or roles.
- PL-1.5 - CCI-000566
- The organization develops and documents procedures to facilitate the implementation of the security planning policy and associated security planning controls.
- PL-1.6 - CCI-001636
- The organization defines the frequency to review and update the current security planning policy.
- PL-1.7 - CCI-001637
- The organization reviews and updates the current security planning policy in accordance with organization-defined frequency.
- PL-1.10 - CCI-001638
- The organization defines the frequency to review and update the current security planning procedures.
- PL-1.9 - CCI-000568
- The organization reviews and updates the current security planning procedures in accordance with organization-defined frequency.
- PL-1.8 - CCI-000567
- The organization disseminates security planning procedures to organization-defined personnel or roles.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-18, http://csrc.nist.gov/publications/PubsSPs.html#800-18
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- PL-2
- Subject Area
- PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- PL-2a.
- Develops a security plan for the information system that:
- PL-2b.
- Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles];
- PL-2c.
- Reviews the security plan for the information system [Assignment: organization-defined frequency];
- PL-2d.
- Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and
- PL-2e.
- Protects the security plan from unauthorized disclosure and modification.
- PL-2.1 - CCI-003049
- The organization develops a security plan for the information system.
- PL-2.2 - CCI-003050
- The organization's security plan for the information system is consistent with the organization's enterprise architecture.
- PL-2.3 - CCI-003051
- The organization's security plan for the information system explicitly defines the authorization boundary for the system.
- PL-2.4 - CCI-003052
- The organization's security plan for the information system describes the operational context of the information system in terms of missions and business processes.
- PL-2.5 - CCI-003053
- The organization's security plan for the information system provides the security categorization of the information system including supporting rationale.
- PL-2.6 - CCI-003054
- The organization's security plan for the information system describes the operational environment for the information system and relationships with or connections to other information systems.
- PL-2.7 - CCI-003055
- The organization's security plan for the information system provides an overview of the security requirements for the system
- PL-2.8 - CCI-003056
- The organization's security plan for the information system identifies any relevant overlays, if applicable.
- PL-2.9 - CCI-003057
- The organization's security plan for the information system describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions.
- PL-2.10 - CCI-000571
- The organization's security plan for the information system is reviewed and approved by the authorizing official or designated representative prior to plan implementation.
- PL-2.11 - CCI-003059
- The organization distributes copies of the security plan to organization-defined personnel or roles.
- PL-2.12 - CCI-003060
- The organization defines the personnel or roles to whom copies of the security plan is distributed.
- PL-2.13 - CCI-003061
- The organization communicates subsequent changes to the security plan to organization-defined personnel or roles.
- PL-2.14 - CCI-003062
- The organization defines the personnel or roles to whom changes to the security plan are communicated.
- PL-2.15 - CCI-000572
- The organization defines the frequency for reviewing the security plan for the information system.
- PL-2.16 - CCI-000573
- The organization reviews the security plan for the information system in accordance with organization-defined frequency.
- PL-2.17 - CCI-000574
- The organization updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments.
- PL-2.18 - CCI-003063
- The organization protects the security plan from unauthorized disclosure.
- PL-2.19 - CCI-003064
- The organization protects the security plan from unauthorized modification.
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-14 - Permitted Actions Without Identification Or Authentication
- AC-17 - Remote Access
- AC-20 - Use Of External Information Systems
- CA-2 - Security Assessments
- CA-3 - System Interconnections
- CA-7 - Continuous Monitoring
- CM-9 - Configuration Management Plan
- CP-2 - Contingency Plan
- IR-8 - Incident Response Plan
- MA-4 - Nonlocal Maintenance
- MA-5 - Maintenance Personnel
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- PL-7 - Security Concept Of Operations
- PM-1 - Information Security Program Plan
- PM-7 - Enterprise Architecture
- PM-8 - Critical Infrastructure Plan
- PM-9 - Risk Management Strategy
- PM-11 - Mission/Business Process Definition
- SA-5 - Information System Documentation
- SA-17 - Developer Security Architecture And Design
- NIST Special Publication 800-18, http://csrc.nist.gov/publications/PubsSPs.html#800-18
- PL-2 (1) - Concept Of Operations
- [Withdrawn: Incorporated into PL-7].
- PL-2 (2) - Functional Architecture
- [Withdrawn: Incorporated into PL-8].
- PL-2 (3) - Plan / Coordinate With Other Organizational Entities
- The organization plans and coordinates security-related activities affecting the information system with [Assignment: organization-defined individuals or groups] before conducting such activities in order to reduce the impact on other organizational entities.
- RMF Control
- PL-3
- Subject Area
- PLANNING
- Baseline Areas
- RMF Control
- PL-4
- Subject Area
- PLANNING
- Baseline Areas
- LOW, MODERATE, HIGH
- PL-4a.
- Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;
- PL-4b.
- Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;
- PL-4c.
- Reviews and updates the rules of behavior [Assignment: organization-defined frequency]; and
- PL-4d.
- Requires individuals who have signed a previous version of the rules of behavior to read and re-sign when the rules of behavior are revised/updated.
- PL-4.1 - CCI-000592
- The organization establishes the rules describing the responsibilities and expected behavior, with regard to information and information system usage, for individuals requiring access to the information system.
- PL-4.2 - CCI-001639
- The organization makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage.
- PL-4.3 - CCI-000593
- The organization receives a signed acknowledgment from individuals requiring access the system, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system.
- PL-4.5 - CCI-003069
- The organization defines the frequency to review and update the rules of behavior.
- PL-4.4 - CCI-003068
- The organization reviews and updates the rules of behavior in accordance with organization-defined frequency.
- PL-4.6 - CCI-003070
- The organization requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
- AC-2 - Account Management
- AC-6 - Least Privilege
- AC-8 - System Use Notification
- AC-9 - Previous Logon (Access) Notification
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AC-19 - Access Control For Mobile Devices
- AC-20 - Use Of External Information Systems
- AT-2 - Security Awareness Training
- AT-3 - Role-Based Security Training
- CM-11 - User-Installed Software
- IA-2 - Identification And Authentication (Organizational Users)
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- MP-7 - Media Use
- PS-6 - Access Agreements
- PS-8 - Personnel Sanctions
- SA-5 - Information System Documentation
- NIST Special Publication 800-18, http://csrc.nist.gov/publications/PubsSPs.html#800-18
- PL-4 (1) - Social Media And Networking Restrictions
- The organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites.
- RMF Control
- PL-5
- Subject Area
- PLANNING
- Baseline Areas
- RMF Control
- PL-6
- Subject Area
- PLANNING
- Baseline Areas
- RMF Control
- PL-7
- Subject Area
- PLANNING
- Baseline Areas
- PL-7a.
- Develops a security Concept of Operations (CONOPS) for the information system containing at a minimum, how the organization intends to operate the system from the perspective of information security; and
- PL-7b.
- Reviews and updates the CONOPS [Assignment: organization-defined frequency].
- PL-7.1 - CCI-003071
- The organization develops a security Concept of Operations (CONOPS) for the information system containing at a minimum, how the organization intends to operate the system from the perspective of information security.
- PL-7.2 - CCI-000577
- The organization defines the frequency to review and update the security CONOPS.
- PL-7.3 - CCI-000578
- The organization reviews and updates the security CONOPS in accordance with organization-defined frequency.
- PL-2 - System Security Plan
- RMF Control
- PL-8
- Subject Area
- PLANNING
- Baseline Areas
- MODERATE, HIGH
- PL-8a.
- Develops an information security architecture for the information system that:
- PL-8b.
- Reviews and updates the information security architecture [Assignment: organization-defined frequency] to reflect updates in the enterprise architecture; and
- PL-8c.
- Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements/acquisitions.
- PL-8.1 - CCI-003072
- The organization develops an information security architecture for the information system.
- PL-8.2 - CCI-003073
- The organization's information security architecture for the information system describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information.
- PL-8.3 - CCI-003074
- The organization's information security architecture for the information system describes how the information security architecture is integrated into and supports the enterprise architecture.
- PL-8.4 - CCI-003075
- The organization's information security architecture for the information system describes any information security assumptions about, and dependencies on, external services.
- PL-8.5 - CCI-003076
- The organization reviews and updates the information security architecture in accordance with organization-defined frequency to reflect updates in the enterprise architecture.
- PL-8.6 - CCI-003077
- The organization defines the frequency to review and update the information system architecture.
- PL-8.7 - CCI-003078
- The organization ensures that planned information security architecture changes are reflected in the security plan.
- PL-8.8 - CCI-003079
- The organization ensures that planned information security architecture changes are reflected in the security Concept of Operations (CONOPS).
- PL-8.9 - CCI-003080
- The organization ensures that planned information security architecture changes are reflected in organizational procurements/acquisitions.
- PL-8 (1) - Defense-In-Depth
- The organization designs its security architecture using a defense-in-depth approach that:
- PL-8 (2) - Supplier Diversity
- The organization requires that [Assignment: organization-defined security safeguards] allocated to [Assignment: organization-defined locations and architectural layers] are obtained from different suppliers.
- RMF Control
- PL-9
- Subject Area
- PLANNING
- Baseline Areas
- PL-9.1 - CCI-003117
- The organization centrally manages organization-defined security controls and related processes.
- PL-9.2 - CCI-003118
- The organization defines security controls and related processes to be centrally managed.
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- RMF Control
- PS-1
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- PS-1b.
- Reviews and updates the current:
- PS-1.1 - CCI-003017
- The organization defines the personnel or roles to whom a personnel security policy is disseminated.
- PS-1.2 - CCI-003018
- The organization defines the personnel or roles to whom the personnel security procedures are disseminated.
- PS-1.3 - CCI-001504
- The organization develops and documents a personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PS-1.4 - CCI-001505
- The organization disseminates a personnel security policy to organization-defined personnel or roles.
- PS-1.6 - CCI-001509
- The organization develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls.
- PS-1.5 - CCI-001510
- The organization disseminates personnel security procedures to organization-defined personnel or roles.
- PS-1.8 - CCI-001507
- The organization defines the frequency to review and update the current personnel security policy.
- PS-1.7 - CCI-001506
- The organization reviews and updates the current personnel security policy in accordance with organization-defined frequency.
- PS-1.10 - CCI-001508
- The organization defines the frequency to review and update the current personnel security procedures.
- PS-1.9 - CCI-001511
- The organization reviews and updates the current personnel security procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- PS-2
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-2a.
- Assigns a risk designation to all organizational positions;
- PS-2b.
- Establishes screening criteria for individuals filling those positions; and
- PS-2c.
- Reviews and updates position risk designations [Assignment: organization-defined frequency].
- PS-2.1 - CCI-001512
- The organization assigns a risk designation to all organizational positions.
- PS-2.2 - CCI-001513
- The organization establishes screening criteria for individuals filling organizational positions.
- PS-2.3 - CCI-001514
- The organization reviews and updates position risk designations in accordance with organization-defined frequency.
- PS-2.4 - CCI-001515
- The organization defines the frequency to review and update position risk designations.
- RMF Control
- PS-3
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-3a.
- Screens individuals prior to authorizing access to the information system; and
- PS-3b.
- Rescreens individuals according to [Assignment: organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening].
- PS-3.1 - CCI-001516
- The organization screens individuals prior to authorizing access to the information system.
- PS-3.2 - CCI-001517
- The organization rescreens individuals with authorized access to the information system according to organization-defined conditions requiring rescreening, and where rescreening is so indicated, the organization-defined frequency of such rescreening.
- PS-3.3 - CCI-001518
- The organization defines the conditions requiring rescreening of individuals with authorized access to the information system.
- PS-3.4 - CCI-001519
- The organization defines the frequency for rescreening individuals with authorized access to the information system when organization-defined conditions requiring rescreening are met.
- 5 C.F.R. 731.106, http://www.gpo.gov/fdsys/granule/CFR-2012-title5-vol2/CFR-2012-title5-vol2-sec731-106/content-detail.html
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- NIST Special Publication 800-73, http://csrc.nist.gov/publications/PubsSPs.html#800-73
- NIST Special Publication 800-76, http://csrc.nist.gov/publications/PubsSPs.html#800-76
- NIST Special Publication 800-78, http://csrc.nist.gov/publications/PubsSPs.html#800-78
- ICD 704, http://www.dni.gov/index.php/intelligence-community/ic-policies-reports/intelligence-community-directives
- PS-3 (1) - Classified Information
- The organization ensures that individuals accessing an information system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.
- PS-3 (2) - Formal Indoctrination
- The organization ensures that individuals accessing an information system processing, storing, or transmitting types of classified information which require formal indoctrination, are formally indoctrinated for all of the relevant types of information to which they have access on the system.
- PS-3 (3) - Information With Special Protection Measures
- The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection:
- RMF Control
- PS-4
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-4a.
- Disables information system access within [Assignment: organization-defined time period];
- PS-4b.
- Terminates/revokes any authenticators/credentials associated with the individual;
- PS-4c.
- Conducts exit interviews that include a discussion of [Assignment: organization-defined information security topics];
- PS-4d.
- Retrieves all security-related organizational information system-related property;
- PS-4e.
- Retains access to organizational information and information systems formerly controlled by terminated individual; and
- PS-4f.
- Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
- PS-4.2 - CCI-003022
- The organization defines the time period to disable information system access upon termination of individual employment.
- PS-4.1 - CCI-001522
- The organization, upon termination of individual employment, disables information system access within organization-defined time period.
- PS-4.3 - CCI-003023
- The organization, upon termination of individual employment, terminates/revokes any authenticators/credentials associated with the individual.
- PS-4.5 - CCI-003024
- The organization defines information security topics to be discussed while conducting exit interviews.
- PS-4.4 - CCI-001523
- The organization, upon termination of individual employment, conducts exit interviews that include a discussion of organization-defined information security topics.
- PS-4.6 - CCI-001524
- The organization, upon termination of individual employment, retrieves all security-related organizational information systems-related property.
- PS-4.7 - CCI-001525
- The organization, upon termination of individual employment, retains access to organizational information formerly controlled by terminated individual.
- PS-4.8 - CCI-001526
- The organization, upon termination of individual employment, retains access to organizational information systems formerly controlled by terminated individual.
- PS-4.10 - CCI-003025
- The organization defines personnel or roles to notify upon termination of individual employment.
- PS-4.11 - CCI-003026
- The organization defines the time period in which to notify organization-defined personnel or roles upon termination of individual employment.
- PS-4.9 - CCI-003016
- The organization, upon termination of individual employment, notifies organization-defined personnel or roles within an organization-defined time period.
- PS-4 (1) - Post-Employment Requirements
- The organization:
- PS-4 (2) - Automated Notification
- The organization employs automated mechanisms to notify [Assignment: organization-defined personnel or roles] upon termination of an individual.
- RMF Control
- PS-5
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-5a.
- Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization;
- PS-5b.
- Initiates [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];
- PS-5c.
- Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and
- PS-5d.
- Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
- PS-5.1 - CCI-001527
- The organization reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization.
- PS-5.2 - CCI-001528
- The organization initiates organization-defined transfer or reassignment actions within an organization-defined time period following the formal personnel transfer action.
- PS-5.3 - CCI-001529
- The organization defines transfer or reassignment actions to initiate within an organization-defined time period following the formal personnel transfer action.
- PS-5.4 - CCI-001530
- The organization defines the time period within which the organization initiates organization-defined transfer or reassignment actions, following the formal personnel transfer action.
- PS-5.5 - CCI-003031
- The organization modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer.
- PS-5.6 - CCI-003032
- The organization notifies organization-defined personnel or roles within an organization-defined time period when individuals are transferred or reassigned to other positions within the organization.
- PS-5.7 - CCI-003033
- The organization defines personnel or roles to be notified when individuals are transferred or reassigned to other positions within the organization.
- PS-5.8 - CCI-003034
- The organization defines the time period within which organization-defined personnel or roles are to be notified when individuals are transferred or reassigned to other positions within the organization.
- RMF Control
- PS-6
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-6a.
- Develops and documents access agreements for organizational information systems;
- PS-6b.
- Reviews and updates the access agreements [Assignment: organization-defined frequency]; and
- PS-6c.
- Ensures that individuals requiring access to organizational information and information systems:
- PS-6.1 - CCI-003035
- The organization develops and documents access agreements for organizational information systems.
- PS-6.3 - CCI-001533
- The organization defines the frequency to review and update the access agreements.
- PS-6.2 - CCI-001532
- The organization reviews and updates the access agreements in accordance with organization-defined frequency.
- PS-6.4 - CCI-001531
- The organization ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access.
- PS-6.6 - CCI-003037
- The organization defines the frequency for individuals requiring access to organization information and information systems to re-sign access agreements.
- PS-6.5 - CCI-003036
- The organization ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or in accordance with organization-defined frequency.
- PS-6 (1) - Information Requiring Special Protection
- [Withdrawn: Incorporated into PS-3].
- PS-6 (2) - Classified Information Requiring Special Protection
- The organization ensures that access to classified information requiring special protection is granted only to individuals who:
- PS-6 (3) - Post-Employment Requirements
- The organization:
- RMF Control
- PS-7
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-7a.
- Establishes personnel security requirements including security roles and responsibilities for third-party providers;
- PS-7b.
- Requires third-party providers to comply with personnel security policies and procedures established by the organization;
- PS-7c.
- Documents personnel security requirements;
- PS-7d.
- Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [Assignment: organization-defined time period]; and
- PS-7e.
- Monitors provider compliance.
- PS-7.1 - CCI-001539
- The organization establishes personnel security requirements including security roles and responsibilities for third-party providers.
- PS-7.2 - CCI-003040
- The organization requires third-party providers to comply with personnel security policies and procedures established by the organization.
- PS-7.3 - CCI-001540
- The organization documents personnel security requirements for third-party providers.
- PS-7.5 - CCI-003042
- The organization defines personnel or roles whom third-party providers are to notify when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
- PS-7.6 - CCI-003043
- The organization defines the time period for third-party providers to notify organization-defined personnel or roles when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
- PS-7.4 - CCI-003041
- The organization requires third-party providers to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within an organization-defined time period.
- PS-7.7 - CCI-001541
- The organization monitors third-party provider compliance with personnel security requirements.
- NIST Special Publication 800-35, http://csrc.nist.gov/publications/PubsSPs.html#800-35
- RMF Control
- PS-8
- Subject Area
- PERSONNEL SECURITY
- Baseline Areas
- LOW, MODERATE, HIGH
- PS-8a.
- Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and
- PS-8b.
- Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
- PS-8.1 - CCI-001542
- The organization employs a formal sanctions process for individuals failing to comply with established information security policies and procedures.
- PS-8.2 - CCI-003046
- The organization defines the time period to notify organization-defined personnel or roles when a formal employee sanctions process is initiated.
- PS-8.3 - CCI-003044
- The organization notifies organization-defined personnel or roles within an organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
- PS-8.4 - CCI-003045
- The organization defines personnel or roles whom are to be notified when a formal employee sanctions process is initiated.
- RMF Control
- RA-1
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- RA-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- RA-1b.
- Reviews and updates the current:
- RA-1.1 - CCI-002368
- The organization defines the personnel or roles to whom the risk assessment policy is disseminated.
- RA-1.2 - CCI-002369
- The organization defines the personnel or roles to whom the risk assessment procedures are disseminated.
- RA-1.3 - CCI-001037
- The organization develops and documents a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- RA-1.4 - CCI-001038
- The organization disseminates a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance to organization-defined personnel or roles.
- RA-1.5 - CCI-001041
- The organization develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.
- RA-1.6 - CCI-001042
- The organization disseminates risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls to organization-defined personnel or roles.
- RA-1.7 - CCI-001039
- The organization reviews and updates the current risk assessment policy in accordance with organization-defined frequency.
- RA-1.8 - CCI-001040
- The organization defines the frequency to review and update the current risk assessment policy.
- RA-1.9 - CCI-001043
- The organization reviews and updates the current risk assessment procedures in accordance with organization-defined frequency.
- RA-1.10 - CCI-001044
- The organization defines the frequency to review and update the current risk assessment procedures.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-30, http://csrc.nist.gov/publications/PubsSPs.html#800-30
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- RA-2
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- RA-2a.
- Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
- RA-2b.
- Documents the security categorization results (including supporting rationale) in the security plan for the information system; and
- RA-2c.
- Ensures that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
- RA-2.1 - CCI-001045
- The organization categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- RA-2.2 - CCI-001046
- The organization documents the security categorization results (including supporting rationale) in the security plan for the information system.
- RA-2.3 - CCI-001047
- The organization ensures the security categorization decision is reviewed and approved by the authorizing official or authorizing official designated representative.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-30, http://csrc.nist.gov/publications/PubsSPs.html#800-30
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- RMF Control
- RA-3
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- RA-3a.
- Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;
- RA-3b.
- Documents risk assessment results in [Selection: security plan; risk assessment report; [Assignment: organization-defined document]];
- RA-3c.
- Reviews risk assessment results [Assignment: organization-defined frequency];
- RA-3d.
- Disseminates risk assessment results to [Assignment: organization-defined personnel or roles]; and
- RA-3e.
- Updates the risk assessment [Assignment: organization-defined frequency] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
- RA-3.1 - CCI-001048
- The organization conducts an assessment of risk of the information system and the information it processes, stores, or transmits that includes the likelihood and magnitude of harm from the unauthorized access, use, disclosure, disruption, modification, or destruction.
- RA-3.3 - CCI-001642
- The organization defines the organizational document in which risk assessment results are documented (e.g., security plan, risk assessment report).
- RA-3.2 - CCI-001049
- The organization documents risk assessment results in the organization-defined document.
- RA-3.4 - CCI-001050
- The organization reviews risk assessment results on an organization-defined frequency.
- RA-3.5 - CCI-001051
- The organization defines a frequency for reviewing risk assessment results.
- RA-3.7 - CCI-002371
- The organization defines the personnel or roles whom the risk assessment results will be disseminated.
- RA-3.6 - CCI-002370
- The organization disseminates risk assessment results to organization-defined personnel or roles.
- RA-3.8 - CCI-001052
- The organization updates the risk assessment on an organization-defined frequency or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
- RA-3.9 - CCI-001053
- The organization defines a frequency for updating the risk assessment.
- OMB Memorandum 04-04, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy04/m04-04.pdf
- NIST Special Publication 800-30, http://csrc.nist.gov/publications/PubsSPs.html#800-30
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- http://idmanagement.gov, http://idmanagement.gov
- RMF Control
- RA-4
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- RMF Control
- RA-5
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- LOW, MODERATE, HIGH
- RA-5a.
- Scans for vulnerabilities in the information system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system/applications are identified and reported;
- RA-5b.
- Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
- RA-5c.
- Analyzes vulnerability scan reports and results from security control assessments;
- RA-5d.
- Remediates legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an organizational assessment of risk; and
- RA-5e.
- Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
- RA-5.2 - CCI-001055
- The organization defines a frequency for scanning for vulnerabilities in the information system and hosted applications.
- RA-5.1 - CCI-001054
- The organization scans for vulnerabilities in the information system and hosted applications on an organization-defined frequency.
- RA-5.3 - CCI-001056
- The organization scans for vulnerabilities in the information system and hosted applications when new vulnerabilities potentially affecting the system/applications are identified and reported.
- RA-5.4 - CCI-001641
- The organization defines the process for conducting random vulnerability scans on the information system and hosted applications.
- RA-5.5 - CCI-001643
- The organization scans for vulnerabilities in the information system and hosted applications in accordance with the organization-defined process for random scans.
- RA-5.6 - CCI-001057
- The organization employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: enumerating platforms, software flaws, and improper configurations; formatting checklists and test procedures; and measuring vulnerability impact.
- RA-5.7 - CCI-001058
- The organization analyzes vulnerability scan reports and results from security control assessments.
- RA-5.8 - CCI-001059
- The organization remediates legitimate vulnerabilities in organization-defined response times in accordance with an organizational assessment risk.
- RA-5.9 - CCI-001060
- The organization defines response times for remediating legitimate vulnerabilities in accordance with an organization assessment of risk.
- RA-5.11 - CCI-002376
- The organization defines the personnel or roles whom the information obtained from the vulnerability scanning process and security control assessments will be shared.
- RA-5.10 - CCI-001061
- The organization shares information obtained from the vulnerability scanning process and security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
- NIST Special Publication 800-40, http://csrc.nist.gov/publications/PubsSPs.html#800-40
- NIST Special Publication 800-70, http://csrc.nist.gov/publications/PubsSPs.html#800-70
- NIST Special Publication 800-115, http://csrc.nist.gov/publications/PubsSPs.html#800-115
- http://cwe.mitre.org, http://cwe.mitre.org
- http://nvd.nist.gov, http://nvd.nist.gov
- RA-5 (1) - Update Tool Capability
- The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned.
- RA-5 (2) - Update By Frequency / Prior To New Scan / When Identified
- The organization updates the information system vulnerabilities scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].
- RA-5 (3) - Breadth / Depth Of Coverage
- The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).
- RA-5 (4) - Discoverable Information
- The organization determines what information about the information system is discoverable by adversaries and subsequently takes [Assignment: organization-defined corrective actions].
- RA-5 (5) - Privileged Access
- The information system implements privileged access authorization to [Assignment: organization-identified information system components] for selected [Assignment: organization-defined vulnerability scanning activities].
- RA-5 (6) - Automated Trend Analyses
- The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
- RA-5 (7) - Automated Detection And Notification Of Unauthorized Components
- [Withdrawn: Incorporated into CM-8].
- RA-5 (8) - Review Historic Audit Logs
- The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
- RA-5 (9) - Penetration Testing And Analyses
- [Withdrawn: Incorporated into CA-8].
- RA-5 (10) - Correlate Scanning Information
- The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
- RMF Control
- RA-6
- Subject Area
- RISK ASSESSMENT
- Baseline Areas
- RA-6.1 - CCI-003119
- The organization employs a technical surveillance countermeasures survey at organization-defined locations on an organization-defined frequency or when organization-defined events or indicators occur.
- RA-6.2 - CCI-003120
- The organization defines the locations where technical surveillance countermeasures surveys are to be employed.
- RA-6.3 - CCI-003121
- The organization defines the frequency on which to employ technical surveillance countermeasures surveys.
- RA-6.4 - CCI-003122
- The organization defines the events or indicators upon which technical surveillance countermeasures surveys are to be employed.
- RMF Control
- SA-1
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- SA-1b.
- Reviews and updates the current:
- SA-1.1 - CCI-003089
- The organization defines the personnel or roles to whom the system and services acquisition policy is disseminated.
- SA-1.2 - CCI-003090
- The organization defines the personnel or roles to whom procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are disseminated.
- SA-1.4 - CCI-000602
- The organization develops and documents a system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- SA-1.3 - CCI-000603
- The organization disseminates to organization-defined personnel or roles a system and services acquisition policy.
- SA-1.5 - CCI-000605
- The organization develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
- SA-1.6 - CCI-000606
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
- SA-1.7 - CCI-000601
- The organization defines the frequency to review and update the current system and services acquisition policy.
- SA-1.8 - CCI-000604
- The organization reviews and updates the current system and services acquisition policy in accordance with organization-defined frequency.
- SA-1.10 - CCI-001646
- The organization defines the frequency to review and update the current system and services acquisition procedures.
- SA-1.9 - CCI-000607
- The organization reviews and updates the current system and services acquisition procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- SA-2
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-2a.
- Determines information security requirements for the information system or information system service in mission/business process planning;
- SA-2b.
- Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and
- SA-2c.
- Establishes a discrete line item for information security in organizational programming and budgeting documentation.
- SA-2.1 - CCI-003091
- The organization determines information security requirements for the information system or information system service in mission/business process planning.
- SA-2.2 - CCI-000610
- The organization determines the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.3 - CCI-000611
- The organization documents the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.4 - CCI-000612
- The organization allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process.
- SA-2.5 - CCI-000613
- The organization establishes a discrete line item for information security in organizational programming documentation.
- SA-2.6 - CCI-000614
- The organization establishes a discrete line item for information security in organizational budgeting documentation.
- NIST Special Publication 800-65, http://csrc.nist.gov/publications/PubsSPs.html#800-65
- RMF Control
- SA-3
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-3a.
- Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations;
- SA-3b.
- Defines and documents information security roles and responsibilities throughout the system development life cycle;
- SA-3c.
- Identifies individuals having information security roles and responsibilities; and
- SA-3d.
- Integrates the organizational information security risk management process into system development life cycle activities.
- SA-3.2 - CCI-003092
- The organization defines a system development life cycle that is used to manage the information system.
- SA-3.1 - CCI-000615
- The organization manages the information system using organization-defined system development life cycle that incorporates information security considerations.
- SA-3.3 - CCI-000616
- The organization defines and documents information system security roles and responsibilities throughout the system development life cycle.
- SA-3.4 - CCI-000618
- The organization identifies individuals having information system security roles and responsibilities.
- SA-3.5 - CCI-003093
- The organization integrates the organizational information security risk management process into system development life cycle activities.
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-64, http://csrc.nist.gov/publications/PubsSPs.html#800-64
- RMF Control
- SA-4
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-4a.
- Security functional requirements;
- SA-4b.
- Security strength requirements;
- SA-4c.
- Security assurance requirements;
- SA-4d.
- Security-related documentation requirements;
- SA-4e.
- Requirements for protecting security-related documentation;
- SA-4f.
- Description of the information system development environment and environment in which the system is intended to operate; and
- SA-4g.
- Acceptance criteria.
- SA-4.1 - CCI-003094
- The organization includes the security functional requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.2 - CCI-003095
- The organization includes the security strength requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.3 - CCI-003096
- The organization includes the security assurance requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.4 - CCI-003097
- The organization includes the security-related documentation requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.5 - CCI-003098
- The organization includes requirements for protecting security-related documentation, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.6 - CCI-003099
- The organization includes description of the information system development environment and environment in which the system is intended to operate, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- SA-4.7 - CCI-003100
- The organization includes acceptance criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
- HSPD-12, http://www.dhs.gov/homeland-security-presidential-directive-12
- ISO/IEC 15408, http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50341
- FIPS Publication 140-2, http://csrc.nist.gov/publications/PubsFIPS.html#140-2
- FIPS Publication 201, http://csrc.nist.gov/publications/PubsFIPS.html#201
- NIST Special Publication 800-23, http://csrc.nist.gov/publications/PubsSPs.html#800-23
- NIST Special Publication 800-35, http://csrc.nist.gov/publications/PubsSPs.html#800-35
- NIST Special Publication 800-36, http://csrc.nist.gov/publications/PubsSPs.html#800-36
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-64, http://csrc.nist.gov/publications/PubsSPs.html#800-64
- NIST Special Publication 800-70, http://csrc.nist.gov/publications/PubsSPs.html#800-70
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- Federal Acquisition Regulation, https://acquisition.gov/far
- http://www.niap-ccevs.org, http://www.niap-ccevs.org
- http://fips201ep.cio.gov, http://fips201ep.cio.gov
- http://www.acquisition.gov/far, http://www.acquisition.gov/far
- SA-4 (1) - Functional Properties Of Security Controls
- The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.
- SA-4 (2) - Design / Implementation Information For Security Controls
- The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: [Selection (one or more): security-relevant external system interfaces; high-level design; low-level design; source code or hardware schematics; [Assignment: organization-defined design/implementation information]] at [Assignment: organization-defined level of detail].
- SA-4 (3) - Development Methods / Techniques / Practices
- The organization requires the developer of the information system, system component, or information system service to demonstrate the use of a system development life cycle that includes [Assignment: organization-defined state-of-the-practice system/security engineering methods, software development methods, testing/evaluation/validation techniques, and quality control processes].
- SA-4 (4) - Assignment Of Components To Systems
- [Withdrawn: Incorporated into CM-8 (9)].
- SA-4 (5) - System / Component / Service Configurations
- The organization requires the developer of the information system, system component, or information system service to:
- SA-4 (6) - Use Of Information Assurance Products
- The organization:
- SA-4 (7) - Niap-Approved Protection Profiles
- The organization:
- SA-4 (8) - Continuous Monitoring Plan
- The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains [Assignment: organization-defined level of detail].
- SA-4 (9) - Functions / Ports / Protocols / Services In Use
- The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
- SA-4 (10) - Use Of Approved Piv Products
- The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.
- RMF Control
- SA-5
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-5a.
- Obtains administrator documentation for the information system, system component, or information system service that describes:
- SA-5b.
- Obtains user documentation for the information system, system component, or information system service that describes:
- SA-5c.
- Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and takes [Assignment: organization-defined actions] in response;
- SA-5d.
- Protects documentation as required, in accordance with the risk management strategy; and
- SA-5e.
- Distributes documentation to [Assignment: organization-defined personnel or roles].
- SA-5.1 - CCI-003124
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure configuration of the system, component, or service.
- SA-5.2 - CCI-003125
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure installation of the system, component, or service.
- SA-5.3 - CCI-003126
- The organization obtains administrator documentation for the information system, system component, or information system services that describes secure operation of the system, component, or service.
- SA-5.4 - CCI-003127
- The organization obtains administrator documentation for the information system, system component, or information system services that describes effective use and maintenance of security functions/mechanisms.
- SA-5.5 - CCI-003128
- The organization obtains administrator documentation for the information system, system component, or information system services that describes known vulnerabilities regarding configuration and use of administrative (i.e. privileged) functions.
- SA-5.6 - CCI-003129
- The organization obtains user documentation for the information system, system component, or information system service that describes user-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms.
- SA-5.7 - CCI-003130
- The organization obtains user documentation for the information system, system component or information system service that describes methods for user interaction which enables individuals to use the system, component, or service in a more secure manner.
- SA-5.8 - CCI-003131
- The organization obtains user documentation for the information system, system component or information system service that describes user responsibilities in maintaining the security of the system, component, or service.
- SA-5.11 - CCI-000642
- The organization documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent.
- SA-5.9 - CCI-003132
- The organization takes organization-defined actions in response to attempts to obtain either unavailable or nonexistent documentation for information system, system component, or information system service.
- SA-5.10 - CCI-003133
- The organization defines actions to be taken in response to attempts to obtain either unavailable or nonexistent documentation for information system, system component, or information system service.
- SA-5.12 - CCI-003134
- The organization protects information system, system component, or information system service documentation as required, in accordance with the risk management strategy.
- SA-5.13 - CCI-003135
- The organization distributes information system, system component, or information system service documentation to organization-defined personnel or roles.
- SA-5.14 - CCI-003136
- The organization defines the personnel or roles the information system, system component, or information system service documentation is to be distributed.
- SA-5 (1) - Functional Properties Of Security Controls
- [Withdrawn: Incorporated into SA-4 (1)].
- SA-5 (2) - Security-Relevant External System Interfaces
- [Withdrawn: Incorporated into SA-4 (2)].
- SA-5 (3) - High-Level Design
- [Withdrawn: Incorporated into SA-4 (2)].
- SA-5 (4) - Low-Level Design
- [Withdrawn: Incorporated into SA-4 (2)].
- SA-5 (5) - Source Code
- [Withdrawn: Incorporated into SA-4 (2)].
- RMF Control
- SA-6
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- RMF Control
- SA-7
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- RMF Control
- SA-8
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- MODERATE, HIGH
- SA-8.1 - CCI-000664
- The organization applies information system security engineering principles in the specification of the information system.
- SA-8.2 - CCI-000665
- The organization applies information system security engineering principles in the design of the information system.
- SA-8.3 - CCI-000666
- The organization applies information system security engineering principles in the development of the information system.
- SA-8.4 - CCI-000667
- The organization applies information system security engineering principles in the implementation of the information system.
- SA-8.5 - CCI-000668
- The organization applies information system security engineering principles in the modification of the information system.
- NIST Special Publication 800-27, http://csrc.nist.gov/publications/PubsSPs.html#800-27
- RMF Control
- SA-9
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- LOW, MODERATE, HIGH
- SA-9a.
- Requires that providers of external information system services comply with organizational information security requirements and employ [Assignment: organization-defined security controls] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
- SA-9b.
- Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and
- SA-9c.
- Employs [Assignment: organization-defined processes, methods, and techniques] to monitor security control compliance by external service providers on an ongoing basis.
- SA-9.3 - CCI-003137
- The organization defines security controls that providers of external information system services employ in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- SA-9.1 - CCI-000669
- The organization requires that providers of external information system services comply with organizational information security requirements.
- SA-9.2 - CCI-000670
- The organization requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
- SA-9.4 - CCI-000671
- The organization defines government oversight with regard to external information system services.
- SA-9.5 - CCI-000672
- The organization documents government oversight with regard to external information system services.
- SA-9.6 - CCI-000673
- The organization defines user roles and responsibilities with regard to external information system services.
- SA-9.7 - CCI-000674
- The organization documents user roles and responsibilities with regard to external information system services.
- SA-9.8 - CCI-003138
- The organization employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis.
- SA-9.9 - CCI-003139
- The organization defines processes, methods, and techniques to employ to monitor security control compliance by external service providers on an ongoing basis.
- NIST Special Publication 800-35, http://csrc.nist.gov/publications/PubsSPs.html#800-35
- SA-9 (1) - Risk Assessments / Organizational Approvals
- The organization:
- SA-9 (2) - Identification Of Functions / Ports / Protocols / Services
- The organization requires providers of [Assignment: organization-defined external information system services] to identify the functions, ports, protocols, and other services required for the use of such services.
- SA-9 (3) - Establish / Maintain Trust Relationship With Providers
- The organization establishes, documents, and maintains trust relationships with external service providers based on [Assignment: organization-defined security requirements, properties, factors, or conditions defining acceptable trust relationships].
- SA-9 (4) - Consistent Interests Of Consumers And Providers
- The organization employs [Assignment: organization-defined security safeguards] to ensure that the interests of [Assignment: organization-defined external service providers] are consistent with and reflect organizational interests.
- SA-9 (5) - Processing, Storage, And Service Location
- The organization restricts the location of [Selection (one or more): information processing; information/data; information system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].
- RMF Control
- SA-10
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- MODERATE, HIGH
- SA-10a.
- Perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation];
- SA-10b.
- Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
- SA-10c.
- Implement only organization-approved changes to the system, component, or service;
- SA-10d.
- Document approved changes to the system, component, or service and the potential security impacts of such changes; and
- SA-10e.
- Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
- SA-10.1 - CCI-003155
- The organization requires the developer of the information system, system component, or information system service to perform configuration management during system, component or service design, development, implementation and/or operation.
- SA-10.2 - CCI-003156
- The organization requires the developer of the information system, system component, or information system service to document the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.3 - CCI-003157
- The organization requires the developer of the information system, system component, or information system service to manage the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.4 - CCI-003158
- The organization requires the developer of the information system, system component, or information system service to control the integrity of changes to organization-defined configuration items under configuration management.
- SA-10.5 - CCI-003159
- The organization defines the configuration items under configuration management that require the integrity of changes to be documented, managed and controlled.
- SA-10.6 - CCI-000692
- The organization requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service.
- SA-10.7 - CCI-000694
- The organization requires the developer of the information system, system component, or information system service to document approved changes to the system, component, or service.
- SA-10.8 - CCI-003160
- The organization requires the developer of the information system, system component, or information system service to document the potential security impacts of approved changes to the system, component, or service.
- SA-10.9 - CCI-003161
- The organization requires the developer of the information system, system component, or information system service to track security flaws within the system, component, or service.
- SA-10.10 - CCI-003162
- The organization requires the developer of the information system, system component, or information system service to track flaw resolution within the system, component, or service.
- SA-10.11 - CCI-003163
- The organization requires the developer of the information system, system component, or information system service to report security flaws and flaw resolution within the system, component, or service findings to organization-defined personnel.
- SA-10.12 - CCI-003164
- The organization defines the personnel to whom security flaw findings and flaw resolution within the system, component, or service are reported.
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- SA-10 (1) - Software / Firmware Integrity Verification
- The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.
- SA-10 (2) - Alternative Configuration Management Processes
- The organization provides an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
- SA-10 (3) - Hardware Integrity Verification
- The organization requires the developer of the information system, system component, or information system service to enable integrity verification of hardware components.
- SA-10 (4) - Trusted Generation
- The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions and software/firmware source and object code with previous versions.
- SA-10 (5) - Mapping Integrity For Version Control
- The organization requires the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.
- SA-10 (6) - Trusted Distribution
- The organization requires the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.
- RMF Control
- SA-11
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- MODERATE, HIGH
- SA-11a.
- Create and implement a security assessment plan;
- SA-11b.
- Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation at [Assignment: organization-defined depth and coverage];
- SA-11c.
- Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation;
- SA-11d.
- Implement a verifiable flaw remediation process; and
- SA-11e.
- Correct flaws identified during security testing/evaluation.
- SA-11.1 - CCI-003171
- The organization requires the developer of the information system, system component, or information system service to create a security assessment plan.
- SA-11.2 - CCI-003172
- The organization requires the developer of the information system, system component, or information system service to implement a security assessment plan.
- SA-11.3 - CCI-003173
- The organization requires the developer of the information system, system component, or information system service to perform unit, integration, system, and/or regression testing/evaluation at organization-defined depth and coverage.
- SA-11.4 - CCI-003174
- The organization defines the depth and coverage to perform unit, integration, system, and/or regression testing/evaluation.
- SA-11.5 - CCI-003175
- The organization requires the developer of the information system, system component, or information system service to produce evidence of the execution of the security assessment plan.
- SA-11.6 - CCI-003176
- The organization requires the developer of the information system, system component, or information system service to produce the results of the security testing/evaluation.
- SA-11.7 - CCI-003177
- The organization requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process.
- SA-11.8 - CCI-003178
- The organization requires the developer of the information system, system component, or information system service to correct flaws identified during security testing/evaluation.
- ISO/IEC 15408, http://www.iso.org/iso/iso_catalogue/catalogue_tc/catalogue_detail.htm?csnumber=50341
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- http://nvd.nist.gov, http://nvd.nist.gov
- http://cwe.mitre.org, http://cwe.mitre.org
- http://cve.mitre.org, http://cve.mitre.org
- http://capec.mitre.org, http://capec.mitre.org
- SA-11 (1) - Static Code Analysis
- The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
- SA-11 (2) - Threat And Vulnerability Analyses
- The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.
- SA-11 (3) - Independent Verification Of Assessment Plans / Evidence
- The organization:
- SA-11 (4) - Manual Code Reviews
- The organization requires the developer of the information system, system component, or information system service to perform a manual code review of [Assignment: organization-defined specific code] using [Assignment: organization-defined processes, procedures, and/or techniques].
- SA-11 (5) - Penetration Testing
- The organization requires the developer of the information system, system component, or information system service to perform penetration testing at [Assignment: organization-defined breadth/depth] and with [Assignment: organization-defined constraints].
- SA-11 (6) - Attack Surface Reviews
- The organization requires the developer of the information system, system component, or information system service to perform attack surface reviews.
- SA-11 (7) - Verify Scope Of Testing / Evaluation
- The organization requires the developer of the information system, system component, or information system service to verify that the scope of security testing/evaluation provides complete coverage of required security controls at [Assignment: organization-defined depth of testing/evaluation].
- SA-11 (8) - Dynamic Code Analysis
- The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
- RMF Control
- SA-12
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- HIGH
- SA-12.1 - CCI-000722
- The organization defines the security safeguards to employ to protect against supply chain threats to the information system, system component, or information system service.
- SA-12.2 - CCI-000723
- The organization protects against supply chain threats to the information system, system component, or information system service by employing organization-defined security safeguards as part of a comprehensive, defense-in-breadth information security strategy.
- AT-3 - Role-Based Security Training
- CM-8 - Information System Component Inventory
- IR-4 - Incident Handling
- PE-16 - Delivery And Removal
- PL-8 - Information Security Architecture
- SA-3 - System Development Life Cycle
- SA-4 - Acquisition Process
- SA-8 - Security Engineering Principles
- SA-10 - Developer Configuration Management
- SA-14 - Criticality Analysis
- SA-15 - Development Process, Standards, And Tools
- SA-18 - Tamper Resistance And Detection
- SA-19 - Component Authenticity
- SC-29 - Heterogeneity
- SC-30 - Concealment And Misdirection
- SC-38 - Operations Security
- SI-7 - Software, Firmware, And Information Integrity
- NIST Special Publication 800-161, http://csrc.nist.gov/publications/PubsSPs.html#800-161
- NIST Interagency Report 7622, http://csrc.nist.gov/publications/PubsNISTIRs.html#NIST-IR-7622
- SA-12 (1) - Acquisition Strategies / Tools / Methods
- The organization employs [Assignment: organization-defined tailored acquisition strategies, contract tools, and procurement methods] for the purchase of the information system, system component, or information system service from suppliers.
- SA-12 (2) - Supplier Reviews
- The organization conducts a supplier review prior to entering into a contractual agreement to acquire the information system, system component, or information system service.
- SA-12 (3) - Trusted Shipping And Warehousing
- [Withdrawn: Incorporated into SA-12 (1)].
- SA-12 (4) - Diversity Of Suppliers
- [Withdrawn: Incorporated into SA-12 (13)].
- SA-12 (5) - Limitation Of Harm
- The organization employs [Assignment: organization-defined security safeguards] to limit harm from potential adversaries identifying and targeting the organizational supply chain.
- SA-12 (6) - Minimizing Procurement Time
- [Withdrawn: Incorporated into SA-12 (1)].
- SA-12 (7) - Assessments Prior To Selection / Acceptance / Update
- The organization conducts an assessment of the information system, system component, or information system service prior to selection, acceptance, or update.
- SA-12 (8) - Use Of All-Source Intelligence
- The organization uses all-source intelligence analysis of suppliers and potential suppliers of the information system, system component, or information system service.
- SA-12 (9) - Operations Security
- The organization employs [Assignment: organization-defined Operations Security (OPSEC) safeguards] in accordance with classification guides to protect supply chain-related information for the information system, system component, or information system service.
- SA-12 (10) - Validate As Genuine And Not Altered
- The organization employs [Assignment: organization-defined security safeguards] to validate that the information system or system component received is genuine and has not been altered.
- SA-12 (11) - Penetration Testing / Analysis Of Elements, Processes, And Actors
- The organization employs [Selection (one or more): organizational analysis, independent third-party analysis, organizational penetration testing, independent third-party penetration testing] of [Assignment: organization-defined supply chain elements, processes, and actors] associated with the information system, system component, or information system service.
- SA-12 (12) - Inter-Organizational Agreements
- The organization establishes inter-organizational agreements and procedures with entities involved in the supply chain for the information system, system component, or information system service.
- SA-12 (13) - Critical Information System Components
- The organization employs [Assignment: organization-defined security safeguards] to ensure an adequate supply of [Assignment: organization-defined critical information system components].
- SA-12 (14) - Identity And Traceability
- The organization establishes and retains unique identification of [Assignment: organization-defined supply chain elements, processes, and actors] for the information system, system component, or information system service.
- SA-12 (15) - Processes To Address Weaknesses Or Deficiencies
- The organization establishes a process to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
- RMF Control
- SA-13
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-13a.
- Describes the trustworthiness required in the [Assignment: organization-defined information system, information system component, or information system service] supporting its critical missions/business functions; and
- SA-13b.
- Implements [Assignment: organization-defined assurance overlay] to achieve such trustworthiness.
- SA-13.1 - CCI-003225
- The organization describes the trustworthiness required in the organization-defined information system, information system component, or information system service supporting its critical missions/business functions.
- SA-13.2 - CCI-003226
- The organization defines the information system, information system component, or information system service supporting its critical missions/business functions in which the trustworthiness must be described.
- SA-13.3 - CCI-003227
- The organization implements an organization-defined assurance overlay to achieve trustworthiness required to support its critical missions/business functions.
- SA-13.4 - CCI-003228
- The organization defines an assurance overlay to be implemented to achieve trustworthiness required to support its critical missions/business functions.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- FIPS Publication 200, http://csrc.nist.gov/publications/PubsFIPS.html#200
- NIST Special Publication 800-53, http://csrc.nist.gov/publications/PubsSPs.html#800-53
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- NIST Special Publication 800-64, http://csrc.nist.gov/publications/PubsSPs.html#800-64
- RMF Control
- SA-14
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-14.1 - CCI-003229
- The organization identifies critical information system components by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
- SA-14.2 - CCI-003230
- The organization identifies critical information system functions by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
- SA-14.3 - CCI-003231
- The organization defines the information systems, information system components, or information system services for which the organization identifies critical information system components and functions for criticality analysis.
- SA-14.4 - CCI-003232
- The organization defines the decision points in the system development life cycle at which to perform a criticality analysis to identify critical information system components and functions for organization-defined information systems, information system components , or information system services.
- CP-2 - Contingency Plan
- PL-2 - System Security Plan
- PL-8 - Information Security Architecture
- PM-1 - Information Security Program Plan
- SA-8 - Security Engineering Principles
- SA-12 - Supply Chain Protection
- SA-13 - Trustworthiness
- SA-15 - Development Process, Standards, And Tools
- SA-20 - Customized Development Of Critical Components
- SA-14 (1) - Critical Components With No Viable Alternative Sourcing
- [Withdrawn: Incorporated into SA-20].
- RMF Control
- SA-15
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- HIGH
- SA-15a.
- Requires the developer of the information system, system component, or information system service to follow a documented development process that:
- SA-15b.
- Reviews the development process, standards, tools, and tool options/configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy [Assignment: organization-defined security requirements].
- SA-15.1 - CCI-003233
- The organization requires the developer of the information system, system component, or information system service to follow a documented development process.
- SA-15.2 - CCI-003234
- The documented information system, system component, or information system service development process explicitly addresses security requirements.
- SA-15.3 - CCI-003235
- The documented information system, system component, or information system service development process identifies the standards used in the development process.
- SA-15.4 - CCI-003236
- The documented information system, system component, or information system service development process identifies the tools used in the development process.
- SA-15.5 - CCI-003237
- The documented information system, system component, or information system service development process documents the specific tool options and tool configurations used in the development process.
- SA-15.6 - CCI-003238
- The documented information system, system component, or information system service development process documents changes to the process and/or tools used in development.
- SA-15.7 - CCI-003239
- The documented information system, system component, or information system service development process manages changes to the process and/or tools used in development.
- SA-15.8 - CCI-003240
- The documented information system, system component, or information system service development process ensures the integrity of changes to the process and/or tools used in development.
- SA-15.9 - CCI-003241
- The organization reviews the development process in accordance with organization-defined frequency to determine if the development process selected and employed can satisfy organization-defined security requirements.
- SA-15.10 - CCI-003242
- The organization reviews the development standards in accordance with organization-defined frequency to determine if the development standards selected and employed can satisfy organization-defined security requirements.
- SA-15.11 - CCI-003243
- The organization reviews the development tools in accordance with organization-defined frequency to determine if the development tools selected and employed can satisfy organization-defined security requirements.
- SA-15.12 - CCI-003244
- The organization reviews the development tool options/configurations in accordance with organization-defined frequency to determine if the development tool options/configurations selected and employed can satisfy organization-defined security requirements.
- SA-15.13 - CCI-003245
- The organization defines the frequency on which to review the development process, standards, tools, and tool options/configurations to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy organization-defined security requirements.
- SA-15.14 - CCI-003246
- The organization defines the security requirements that must be satisfied by conducting a review of the development process, standards, tools, and tool options/configurations.
- SA-15 (1) - Quality Metrics
- The organization requires the developer of the information system, system component, or information system service to:
- SA-15 (2) - Security Tracking Tools
- The organization requires the developer of the information system, system component, or information system service to select and employ a security tracking tool for use during the development process.
- SA-15 (3) - Criticality Analysis
- The organization requires the developer of the information system, system component, or information system service to perform a criticality analysis at [Assignment: organization-defined breadth/depth] and at [Assignment: organization-defined decision points in the system development life cycle].
- SA-15 (4) - Threat Modeling / Vulnerability Analysis
- The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [Assignment: organization-defined breadth/depth] that:
- SA-15 (5) - Attack Surface Reduction
- The organization requires the developer of the information system, system component, or information system service to reduce attack surfaces to [Assignment: organization-defined thresholds].
- SA-15 (6) - Continuous Improvement
- The organization requires the developer of the information system, system component, or information system service to implement an explicit process to continuously improve the development process.
- SA-15 (7) - Automated Vulnerability Analysis
- The organization requires the developer of the information system, system component, or information system service to:
- SA-15 (8) - Reuse Of Threat / Vulnerability Information
- The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
- SA-15 (9) - Use Of Live Data
- The organization approves, documents, and controls the use of live data in development and test environments for the information system, system component, or information system service.
- SA-15 (10) - Incident Response Plan
- The organization requires the developer of the information system, system component, or information system service to provide an incident response plan.
- SA-15 (11) - Archive Information System / Component
- The organization requires the developer of the information system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security review.
- RMF Control
- SA-16
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- HIGH
- SA-16.1 - CCI-003291
- The organization requires the developer of the information system, system component, or information system service to provide organization-defined training on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
- SA-16.2 - CCI-003292
- The organization defines the training the developer of the information system, system component, or information system service is required to provide on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
- RMF Control
- SA-17
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- HIGH
- SA-17a.
- Is consistent with and supportive of the organization�s security architecture which is established within and is an integrated part of the organization�s enterprise architecture;
- SA-17b.
- Accurately and completely describes the required security functionality, and the allocation of security controls among physical and logical components; and
- SA-17c.
- Expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection.
- SA-17.1 - CCI-003293
- The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture.
- SA-17.2 - CCI-003294
- The design specification and security architecture is consistent with and supportive of the organization's security architecture which is established within and is interrogated part of the organization's enterprise architecture.
- SA-17.3 - CCI-003295
- The design specification and security architecture accurately and completely describes the required security functionality
- SA-17.4 - CCI-003296
- The design specification and security architecture accurately and completely describes the allocation of security controls among physical and logical components.
- SA-17.5 - CCI-003297
- The design specification and security architecture expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection.
- SA-17 (1) - Formal Policy Model
- The organization requires the developer of the information system, system component, or information system service to:
- SA-17 (2) - Security-Relevant Components
- The organization requires the developer of the information system, system component, or information system service to:
- SA-17 (3) - Formal Correspondence
- The organization requires the developer of the information system, system component, or information system service to:
- SA-17 (4) - Informal Correspondence
- The organization requires the developer of the information system, system component, or information system service to:
- SA-17 (5) - Conceptually Simple Design
- The organization requires the developer of the information system, system component, or information system service to:
- SA-17 (6) - Structure For Testing
- The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate testing.
- SA-17 (7) - Structure For Least Privilege
- The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.
- RMF Control
- SA-18
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-18.1 - CCI-003346
- The organization implements a tamper protection program for the information system, system component, or information system service.
- SA-18 (1) - Multiple Phases Of Sdlc
- The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including design, development, integration, operations, and maintenance.
- SA-18 (2) - Inspection Of Information Systems, Components, Or Devices
- The organization inspects [Assignment: organization-defined information systems, system components, or devices] [Selection (one or more): at random; at [Assignment: organization-defined frequency], upon [Assignment: organization-defined indications of need for inspection]] to detect tampering.
- RMF Control
- SA-19
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-19a.
- Develops and implements anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the information system; and
- SA-19b.
- Reports counterfeit information system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].
- SA-19.1 - CCI-003356
- The organization develops anti-counterfeit policy that include the means to detect counterfeit components from entering the information system.
- SA-19.2 - CCI-003357
- The organization develops anti-counterfeit policy that include the means to prevent counterfeit components from entering the information system.
- SA-19.3 - CCI-003358
- The organization develops anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
- SA-19.4 - CCI-003359
- The organization develops anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
- SA-19.5 - CCI-003360
- The organization implements anti-counterfeit policy that include the means to detect counterfeit components from entering the information system.
- SA-19.6 - CCI-003361
- The organization implements anti-counterfeit policy that include the means to prevent counterfeit components from entering the information system.
- SA-19.7 - CCI-003362
- The organization implements anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
- SA-19.8 - CCI-003363
- The organization implements anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
- SA-19.9 - CCI-003364
- The organization reports counterfeit information system components to source of counterfeit component, organization-defined external reporting organizations and/or organization-defined personnel or roles.
- SA-19.10 - CCI-003365
- The organization defines the external reporting organizations to whom counterfeit information system components are to be reported.
- SA-19.11 - CCI-003366
- The organization defines the personnel or roles to whom counterfeit information system components are to be reported.
- SA-19 (1) - Anti-Counterfeit Training
- The organization trains [Assignment: organization-defined personnel or roles] to detect counterfeit information system components (including hardware, software, and firmware).
- SA-19 (2) - Configuration Control For Component Service / Repair
- The organization maintains configuration control over [Assignment: organization-defined information system components] awaiting service/repair and serviced/repaired components awaiting return to service.
- SA-19 (3) - Component Disposal
- The organization disposes of information system components using [Assignment: organization-defined techniques and methods].
- SA-19 (4) - Anti-Counterfeit Scanning
- The organization scans for counterfeit information system components [Assignment: organization-defined frequency].
- RMF Control
- SA-20
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-20.1 - CCI-003386
- The organization defines the critical information system components to re-implement or custom develop.
- SA-20.2 - CCI-003387
- The organization re-implements or custom develops organization-defined critical information system components.
- RMF Control
- SA-21
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-21a.
- Have appropriate access authorizations as determined by assigned [Assignment: organization-defined official government duties]; and
- SA-21b.
- Satisfy [Assignment: organization-defined additional personnel screening criteria].
- SA-21.1 - CCI-003384
- The organization defines the information system, system component, or information system service which require the information system developer to have appropriate access authorizations and satisfy additional personnel screening criteria.
- SA-21.2 - CCI-003383
- The organization defines the official government duties to be assigned to the developer of organization-defined information system, system component, or information system service.
- SA-21.3 - CCI-003385
- The organization requires that the developer of organization-defined information system, system component, or information system service have appropriate access authorizations as determined by assigned organization-defined official government duties.
- SA-21.5 - CCI-003382
- The organization requires that the developer of organization-defined information system, system component, or information system service satisfy organization-defined additional personnel screening criteria.
- SA-21.4 - CCI-003381
- The organization defines additional personnel screening criteria that must be satisfied by the developer of organization-defined information system, system component, or information system service.
- SA-21 (1) - Validation Of Screening
- The organization requires the developer of the information system, system component, or information system service take [Assignment: organization-defined actions] to ensure that the required access authorizations and screening criteria are satisfied.
- RMF Control
- SA-22
- Subject Area
- SYSTEM AND SERVICES ACQUISITION
- Baseline Areas
- SA-22a.
- Replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer; and
- SA-22b.
- Provides justification and documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
- SA-22.2 - CCI-003374
- The organization documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
- SA-22.3 - CCI-003375
- The organization provides justification for the continued use of unsupported system components required to satisfy mission/business needs.
- SA-22.1 - CCI-003376
- The organization replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer.
- SA-22 (1) - Alternative Sources For Continued Support
- The organization provides [Selection (one or more): in-house support; [Assignment: organization-defined support from external providers]] for unsupported information system components.
- RMF Control
- SC-1
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- SC-1b.
- Reviews and updates the current:
- SC-1.2 - CCI-002380
- The organization defines the personnel or roles to be recipients of the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
- SC-1.1 - CCI-002378
- The organization defines the personnel or roles to be recipients of the system and communications protection policy.
- SC-1.3 - CCI-001074
- The organization develops and documents a system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance
- SC-1.4 - CCI-001075
- The organization disseminates to organization-defined personnel or roles the system and communications protection policy.
- SC-1.5 - CCI-001078
- The organization develops and documents system and communications protection procedures to facilitate the implementation of the system and communications protection policy and communications protection controls and associated system and communications protection controls.
- SC-1.6 - CCI-001079
- The organization disseminates to organization-defined personnel or roles the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
- SC-1.8 - CCI-001077
- The organization defines the frequency for reviewing and updating the system and communications protection policy.
- SC-1.7 - CCI-001076
- The organization reviews and updates the system and communications protection policy in accordance with organization-defined frequency.
- SC-1.10 - CCI-001081
- The organization defines the frequency of system and communications protection procedure reviews and updates.
- SC-1.9 - CCI-001080
- The organization reviews and updates the system and communications protection procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- SC-2
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-2.1 - CCI-001082
- The information system separates user functionality (including user interface services) from information system management functionality.
- SC-2 (1) - Interfaces For Non-Privileged Users
- The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
- RMF Control
- SC-3
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- HIGH
- SC-3.1 - CCI-001084
- The information system isolates security functions from nonsecurity functions.
- SC-3 (1) - Hardware Separation
- The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
- SC-3 (2) - Access / Flow Control Functions
- The information system isolates security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
- SC-3 (3) - Minimize Nonsecurity Functionality
- The organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
- SC-3 (4) - Module Coupling And Cohesiveness
- The organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
- SC-3 (5) - Layered Structures
- The organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
- RMF Control
- SC-4
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-4.1 - CCI-001090
- The information system prevents unauthorized and unintended information transfer via shared system resources.
- SC-4 (1) - Security Levels
- [Withdrawn: Incorporated into SC-4].
- SC-4 (2) - Periods Processing
- The information system prevents unauthorized information transfer via shared resources in accordance with [Assignment: organization-defined procedures] when system processing explicitly switches between different information classification levels or security categories.
- RMF Control
- SC-5
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-5.1 - CCI-001093
- The organization defines the types of denial of service attacks (or provides references to sources of current denial of service attacks) that can be addressed by the information system.
- SC-5.3 - CCI-002386
- The organization defines the security safeguards to be employed to protect the information system against, or limit the effects of, denial of service attacks.
- SC-5.2 - CCI-002385
- The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards.
- SC-5 (1) - Restrict Internal Users
- The information system restricts the ability of individuals to launch [Assignment: organization-defined denial of service attacks] against other information systems.
- SC-5 (2) - Excess Capacity / Bandwidth / Redundancy
- The information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding denial of service attacks.
- SC-5 (3) - Detection / Monitoring
- The organization:
- RMF Control
- SC-6
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-6.1 - CCI-002392
- The organization defines the resources to be allocated to protect the availability of information system resources.
- SC-6.2 - CCI-002393
- The organization defines the security safeguards to be employed to protect the availability of information system resources.
- SC-6.3 - CCI-002394
- The information system protects the availability of resources by allocating organization-defined resources based on priority, quota, and/or organization-defined security safeguards.
- RMF Control
- SC-7
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-7a.
- Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;
- SC-7b.
- Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and
- SC-7c.
- Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
- SC-7.1 - CCI-001097
- The information system monitors and controls communications at the external boundary of the system and at key internal boundaries within the system.
- SC-7.2 - CCI-002395
- The information system implements subnetworks for publicly accessible system components that are physically and/or logically separated from internal organizational networks.
- SC-7.3 - CCI-001098
- The information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-41, http://csrc.nist.gov/publications/PubsSPs.html#800-41
- NIST Special Publication 800-77, http://csrc.nist.gov/publications/PubsSPs.html#800-77
- SC-7 (1) - Physically Separated Subnetworks
- [Withdrawn: Incorporated into SC-7].
- SC-7 (2) - Public Access
- [Withdrawn: Incorporated into SC-7].
- SC-7 (3) - Access Points
- The organization limits the number of external network connections to the information system.
- SC-7 (4) - External Telecommunications Services
- The organization:
- SC-7 (5) - Deny By Default / Allow By Exception
- The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
- SC-7 (6) - Response To Recognized Failures
- [Withdrawn: Incorporated into SC-7 (18)].
- SC-7 (7) - Prevent Split Tunneling For Remote Devices
- The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks.
- SC-7 (8) - Route Traffic To Authenticated Proxy Servers
- The information system routes [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.
- SC-7 (9) - Restrict Threatening Outgoing Communications Traffic
- The information system:
- SC-7 (10) - Prevent Unauthorized Exfiltration
- The organization prevents the unauthorized exfiltration of information across managed interfaces.
- SC-7 (11) - Restrict Incoming Communications Traffic
- The information system only allows incoming communications from [Assignment: organization-defined authorized sources] to be routed to [Assignment: organization-defined authorized destinations].
- SC-7 (12) - Host-Based Protection
- The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].
- SC-7 (13) - Isolation Of Security Tools / Mechanisms / Support Components
- The organization isolates [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
- SC-7 (14) - Protects Against Unauthorized Physical Connections
- The organization protects against unauthorized physical connections at [Assignment: organization-defined managed interfaces].
- SC-7 (15) - Route Privileged Network Accesses
- The information system routes all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
- SC-7 (16) - Prevent Discovery Of Components / Devices
- The information system prevents discovery of specific system components composing a managed interface.
- SC-7 (17) - Automated Enforcement Of Protocol Formats
- The information system enforces adherence to protocol formats.
- SC-7 (18) - Fail Secure
- The information system fails securely in the event of an operational failure of a boundary protection device.
- SC-7 (19) - Blocks Communication From Non-Organizationally Configured Hosts
- The information system blocks both inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.
- SC-7 (20) - Dynamic Isolation / Segregation
- The information system provides the capability to dynamically isolate/segregate [Assignment: organization-defined information system components] from other components of the system.
- SC-7 (21) - Isolation Of Information System Components
- The organization employs boundary protection mechanisms to separate [Assignment: organization-defined information system components] supporting [Assignment: organization-defined missions and/or business functions].
- SC-7 (22) - Separate Subnets For Connecting To Different Security Domains
- The information system implements separate network addresses (i.e., different subnets) to connect to systems in different security domains.
- SC-7 (23) - Disable Sender Feedback On Protocol Validation Failure
- The information system disables feedback to senders on protocol format validation failure.
- RMF Control
- SC-8
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-8.1 - CCI-002418
- The information system protects the confidentiality and/or integrity of transmitted information.
- FIPS Publication 140-2, http://csrc.nist.gov/publications/PubsFIPS.html#140-2
- FIPS Publication 197, http://csrc.nist.gov/publications/PubsFIPS.html#197
- NIST Special Publication 800-52, http://csrc.nist.gov/publications/PubsSPs.html#800-52
- NIST Special Publication 800-77, http://csrc.nist.gov/publications/PubsSPs.html#800-77
- NIST Special Publication 800-81, http://csrc.nist.gov/publications/PubsSPs.html#800-81
- NIST Special Publication 800-113, http://csrc.nist.gov/publications/PubsSPs.html#800-113
- CNSS Policy 15, https://www.cnss.gov/policies.html
- NSTISSI No. 7003, http://www.cnss.gov/Assets/pdf/nstissi_7003.pdf
- SC-8 (1) - Cryptographic Or Alternate Physical Protection
- The information system implements cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
- SC-8 (2) - Pre / Post Transmission Handling
- The information system maintains the [Selection (one or more): confidentiality; integrity] of information during preparation for transmission and during reception.
- SC-8 (3) - Cryptographic Protection For Message Externals
- The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
- SC-8 (4) - Conceal / Randomize Communications
- The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
- RMF Control
- SC-9
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- RMF Control
- SC-10
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-10.1 - CCI-001133
- The information system terminates the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity.
- SC-10.2 - CCI-001134
- The organization defines the time period of inactivity after which the information system terminates a network connection associated with a communications session.
- RMF Control
- SC-11
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-11.1 - CCI-001135
- The information system establishes a trusted communications path between the user and organization-defined security functions within the information system.
- SC-11.2 - CCI-001661
- The organization defines the security functions, to minimally include information system authentication and re-authentication, within the information system to be included in a trusted communications path.
- SC-11 (1) - Logical Isolation
- The information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
- RMF Control
- SC-12
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-12.1 - CCI-002428
- The organization defines the requirements for cryptographic key generation to be employed within the information system.
- SC-12.2 - CCI-002429
- The organization defines the requirements for cryptographic key distribution to be employed within the information system.
- SC-12.3 - CCI-002430
- The organization defines the requirements for cryptographic key storage to be employed within the information system.
- SC-12.4 - CCI-002431
- The organization defines the requirements for cryptographic key access to be employed within the information system.
- SC-12.5 - CCI-002432
- The organization defines the requirements for cryptographic key destruction to be employed within the information system.
- SC-12.6 - CCI-002433
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
- SC-12.7 - CCI-002434
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
- SC-12.8 - CCI-002435
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
- SC-12.9 - CCI-002436
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
- SC-12.10 - CCI-002437
- The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
- SC-12.11 - CCI-002438
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
- SC-12.12 - CCI-002439
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
- SC-12.13 - CCI-002440
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
- SC-12.14 - CCI-002441
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
- SC-12.15 - CCI-002442
- The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
- NIST Special Publication 800-56, http://csrc.nist.gov/publications/PubsSPs.html#800-56
- NIST Special Publication 800-57, http://csrc.nist.gov/publications/PubsSPs.html#800-57
- SC-12 (1) - Availability
- The organization maintains availability of information in the event of the loss of cryptographic keys by users.
- SC-12 (2) - Symmetric Keys
- The organization produces, controls, and distributes symmetric cryptographic keys using [Selection: NIST FIPS-compliant; NSA-approved] key management technology and processes.
- SC-12 (3) - Asymmetric Keys
- The organization produces, controls, and distributes asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user�s private key].
- SC-12 (4) - Pki Certificates
- [Withdrawn: Incorporated into SC-12].
- SC-12 (5) - Pki Certificates / Hardware Tokens
- [Withdrawn: Incorporated into SC-12].
- RMF Control
- SC-13
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-13.1 - CCI-002449
- The organization defines the cryptographic uses, and type of cryptography required for each use, to be implemented by the information system.
- SC-13.2 - CCI-002450
- The information system implements organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
- AC-2 - Account Management
- AC-3 - Access Enforcement
- AC-7 - Unsuccessful Logon Attempts
- AC-17 - Remote Access
- AC-18 - Wireless Access
- AU-9 - Protection Of Audit Information
- AU-10 - Non-Repudiation
- CM-11 - User-Installed Software
- CP-9 - Information System Backup
- IA-3 - Device Identification And Authentication
- IA-7 - Cryptographic Module Authentication
- MA-4 - Nonlocal Maintenance
- MP-2 - Media Access
- MP-4 - Media Storage
- MP-5 - Media Transport
- SA-4 - Acquisition Process
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-28 - Protection Of Information At Rest
- SI-7 - Software, Firmware, And Information Integrity
- FIPS Publication 140, http://csrc.nist.gov/publications/PubsFIPS.html
- http://csrc.nist.gov/cryptval, http://csrc.nist.gov/cryptval
- http://www.cnss.gov, http://www.cnss.gov
- SC-13 (1) - Fips-Validated Cryptography
- [Withdrawn: Incorporated into SC-13].
- SC-13 (2) - Nsa-Approved Cryptography
- [Withdrawn: Incorporated into SC-13].
- SC-13 (3) - Individuals Without Formal Access Approvals
- [Withdrawn: Incorporated into SC-13].
- SC-13 (4) - Digital Signatures
- [Withdrawn: Incorporated into SC-13].
- RMF Control
- SC-14
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- RMF Control
- SC-15
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-15a.
- Prohibits remote activation of collaborative computing devices with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and
- SC-15b.
- Provides an explicit indication of use to users physically present at the devices.
- SC-15.1 - CCI-001150
- The information system prohibits remote activation of collaborative computing devices excluding the organization-defined exceptions where remote activation is to be allowed.
- SC-15.2 - CCI-001151
- The organization defines exceptions to the prohibiting of collaborative computing devices where remote activation is to be allowed.
- SC-15.3 - CCI-001152
- The information system provides an explicit indication of use to users physically present at collaborative computing devices.
- AC-21 - Information Sharing
- SC-15 (1) - Physical Disconnect
- The information system provides physical disconnect of collaborative computing devices in a manner that supports ease of use.
- SC-15 (2) - Blocking Inbound / Outbound Communications Traffic
- [Withdrawn: Incorporated into SC-7].
- SC-15 (3) - Disabling / Removal In Secure Work Areas
- The organization disables or removes collaborative computing devices from [Assignment: organization-defined information systems or information system components] in [Assignment: organization-defined secure work areas].
- SC-15 (4) - Explicitly Indicate Current Participants
- The information system provides an explicit indication of current participants in [Assignment: organization-defined online meetings and teleconferences].
- RMF Control
- SC-16
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-16.1 - CCI-001157
- The information system associates organization-defined security attributes with information exchanged between information systems.
- SC-16.2 - CCI-002454
- The organization defines the security attributes the information system is to associate with the information being exchanged between information systems and between information system components.
- SC-16.3 - CCI-002455
- The information system associates organization-defined security attributes with information exchanged between information system components.
- SC-16 (1) - Integrity Validation
- The information system validates the integrity of transmitted security attributes.
- RMF Control
- SC-17
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-17.1 - CCI-001159
- The organization issues public key certificates under an organization-defined certificate policy or obtains public key certificates from an approved service provider.
- SC-17.2 - CCI-002456
- The organization defines the certificate policy employed to issue public key certificates.
- SC-12 - Cryptographic Key Establishment And Management
- OMB Memorandum 05-24, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2005/m05-24.pdf
- NIST Special Publication 800-32, http://csrc.nist.gov/publications/PubsSPs.html#800-32
- NIST Special Publication 800-63, http://csrc.nist.gov/publications/PubsSPs.html#800-63
- RMF Control
- SC-18
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-18a.
- Defines acceptable and unacceptable mobile code and mobile code technologies;
- SC-18b.
- Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and
- SC-18c.
- Authorizes, monitors, and controls the use of mobile code within the information system.
- SC-18.1 - CCI-001160
- The organization defines acceptable and unacceptable mobile code and mobile code technologies.
- SC-18.2 - CCI-001161
- The organization establishes usage restrictions for acceptable mobile code and mobile code technologies.
- SC-18.3 - CCI-001162
- The organization establishes implementation guidance for acceptable mobile code and mobile code technologies.
- SC-18.4 - CCI-001163
- The organizations authorizes the use of mobile code within the information system.
- SC-18.5 - CCI-001164
- The organization monitors the use of mobile code within the information system.
- SC-18.6 - CCI-001165
- The organization controls the use of mobile code within the information system.
- NIST Special Publication 800-28, http://csrc.nist.gov/publications/PubsSPs.html#800-28
- DoD Instruction 8552.01, http://www.dtic.mil/whs/directives/corres/ins1.html
- SC-18 (1) - Identify Unacceptable Code / Take Corrective Actions
- The information system identifies [Assignment: organization-defined unacceptable mobile code] and takes [Assignment: organization-defined corrective actions].
- SC-18 (2) - Acquisition / Development / Use
- The organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets [Assignment: organization-defined mobile code requirements].
- SC-18 (3) - Prevent Downloading / Execution
- The information system prevents the download and execution of [Assignment: organization-defined unacceptable mobile code].
- SC-18 (4) - Prevent Automatic Execution
- The information system prevents the automatic execution of mobile code in [Assignment: organization-defined software applications] and enforces [Assignment: organization-defined actions] prior to executing the code.
- SC-18 (5) - Allow Execution Only In Confined Environments
- The organization allows execution of permitted mobile code only in confined virtual machine environments.
- RMF Control
- SC-19
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-19a.
- Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
- SC-19b.
- Authorizes, monitors, and controls the use of VoIP within the information system.
- SC-19.1 - CCI-001173
- The organization establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
- SC-19.2 - CCI-001174
- The organization establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
- SC-19.3 - CCI-001175
- The organization authorizes the use of VoIP within the information system.
- SC-19.4 - CCI-001176
- The organization monitors the use of VoIP within the information system.
- SC-19.5 - CCI-001177
- The organization controls the use of VoIP within the information system.
- NIST Special Publication 800-58, http://csrc.nist.gov/publications/PubsSPs.html#800-58
- RMF Control
- SC-20
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-20a.
- Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and
- SC-20b.
- Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
- SC-20.1 - CCI-001178
- The information system provides additional data origin authentication artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- SC-20.2 - CCI-002462
- The information system provides additional integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
- SC-20.3 - CCI-001179
- The information system, when operating as part of a distributed, hierarchical namespace, provides the means to indicate the security status of child zones.
- SC-20.4 - CCI-001663
- The information system, when operating as part of a distributed, hierarchical namespace, provides the means to enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).
- AU-10 - Non-Repudiation
- SC-8 - Transmission Confidentiality And Integrity
- SC-12 - Cryptographic Key Establishment And Management
- SC-13 - Cryptographic Protection
- SC-21 - Secure Name / Address Resolution Service (Recursive Or Caching Resolver)
- SC-22 - Architecture And Provisioning For Name / Address Resolution Service
- OMB Memorandum 08-23, http://www.whitehouse.gov/sites/default/files/omb/assets/omb/memoranda/fy2008/m08-23.pdf
- NIST Special Publication 800-81, http://csrc.nist.gov/publications/PubsSPs.html#800-81
- SC-20 (1) - Child Subspaces
- [Withdrawn: Incorporated into SC-20].
- SC-20 (2) - Data Origin / Integrity
- The information system provides data origin and integrity protection artifacts for internal name/address resolution queries.
- RMF Control
- SC-21
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-21.1 - CCI-002465
- The information system requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.2 - CCI-002466
- The information system requests data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.3 - CCI-002467
- The information system performs data integrity verification on the name/address resolution responses the system receives from authoritative sources.
- SC-21.4 - CCI-002468
- The information system performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
- NIST Special Publication 800-81, http://csrc.nist.gov/publications/PubsSPs.html#800-81
- SC-21 (1) - Data Origin / Integrity
- [Withdrawn: Incorporated into SC-21].
- RMF Control
- SC-22
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-22.1 - CCI-001182
- The information systems that collectively provide name/address resolution service for an organization are fault-tolerant.
- SC-22.2 - CCI-001183
- The information systems that collectively provide name/address resolution service for an organization implement internal/external role separation.
- NIST Special Publication 800-81, http://csrc.nist.gov/publications/PubsSPs.html#800-81
- RMF Control
- SC-23
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-23.1 - CCI-001184
- The information system protects the authenticity of communications sessions.
- NIST Special Publication 800-52, http://csrc.nist.gov/publications/PubsSPs.html#800-52
- NIST Special Publication 800-77, http://csrc.nist.gov/publications/PubsSPs.html#800-77
- NIST Special Publication 800-95, http://csrc.nist.gov/publications/PubsSPs.html#800-95
- SC-23 (1) - Invalidate Session Identifiers At Logout
- The information system invalidates session identifiers upon user logout or other session termination.
- SC-23 (2) - User-Initiated Logouts / Message Displays
- [Withdrawn: Incorporated into AC-12 (1)].
- SC-23 (3) - Unique Session Identifiers With Randomization
- The information system generates a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognizes only session identifiers that are system-generated.
- SC-23 (4) - Unique Session Identifiers With Randomization
- [Withdrawn: Incorporated into SC-23 (3)].
- SC-23 (5) - Allowed Certificate Authorities
- The information system only allows the use of [Assignment: organization-defined certificate authorities] for verification of the establishment of protected sessions.
- RMF Control
- SC-24
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- HIGH
- SC-24.1 - CCI-001190
- The information system fails to an organization-defined known-state for organization-defined types of failures.
- SC-24.2 - CCI-001191
- The organization defines the known states the information system should fail to in the event of a organization-defined system failure.
- SC-24.3 - CCI-001192
- The organization defines types of failures for which the information system should fail to an organization-defined known state.
- SC-24.4 - CCI-001193
- The organization defines system state information that should be preserved in the event of a system failure.
- SC-24.5 - CCI-001665
- The information system preserves organization-defined system state information in the event of a system failure.
- RMF Control
- SC-25
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-25.1 - CCI-001194
- The information system employs organization-defined information system components with minimal functionality and information storage.
- SC-25.2 - CCI-002471
- The organization defines the information system components, with minimal functionality and information storage, to be employed.
- SC-30 - Concealment And Misdirection
- RMF Control
- SC-26
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-26.1 - CCI-001195
- The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
- SC-26 (1) - Detection Of Malicious Code
- [Withdrawn: Incorporated into SC-35].
- RMF Control
- SC-27
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-27.1 - CCI-001197
- The information system includes organization-defined platform-independent applications.
- SC-27.2 - CCI-001198
- The organization defines applications that are platform independent.
- SC-29 - Heterogeneity
- RMF Control
- SC-28
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- MODERATE, HIGH
- SC-28.1 - CCI-001199
- The information system protects the confidentiality and/or integrity of organization-defined information at rest.
- SC-28.2 - CCI-002472
- The organization defines the information at rest that is to be protected by the information system.
- AC-3 - Access Enforcement
- AC-6 - Least Privilege
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-6 - Configuration Settings
- PE-3 - Physical Access Control
- SC-8 - Transmission Confidentiality And Integrity
- SC-13 - Cryptographic Protection
- SI-3 - Malicious Code Protection
- SI-7 - Software, Firmware, And Information Integrity
- NIST Special Publication 800-56, http://csrc.nist.gov/publications/PubsSPs.html#800-56
- NIST Special Publication 800-57, http://csrc.nist.gov/publications/PubsSPs.html#800-57
- NIST Special Publication 800-111, http://csrc.nist.gov/publications/PubsSPs.html#800-111
- SC-28 (1) - Cryptographic Protection
- The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components].
- SC-28 (2) - Off-Line Storage
- The organization removes from online storage and stores off-line in a secure location [Assignment: organization-defined information].
- RMF Control
- SC-29
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-29.1 - CCI-001201
- The organization employs a diverse set of information technologies for organization-defined information system components in the implementation of the information system.
- SC-29.2 - CCI-002480
- The organization defines the information system components for which a diverse set of information technologies are to be employed.
- SC-29 (1) - Virtualization Techniques
- The organization employs virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed [Assignment: organization-defined frequency].
- RMF Control
- SC-30
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-30.1 - CCI-002482
- The organization defines the concealment and misdirection techniques employed for organization-defined information systems to confuse and mislead adversaries.
- SC-30.2 - CCI-002483
- The organization defines the information systems for which organization-defined concealment and misdirection techniques are to be employed.
- SC-30.3 - CCI-002484
- The organization defines the time periods at which it will employ organization-defined concealment and misdirection techniques on organization-defined information systems.
- SC-30.4 - CCI-002485
- The organization employs organization-defined concealment and misdirection techniques for organization-defined information systems at organization-defined time periods to confuse and mislead adversaries.
- SC-30 (1) - Virtualization Techniques
- [Withdrawn: Incorporated into SC-29 (1)].
- SC-30 (2) - Randomness
- The organization employs [Assignment: organization-defined techniques] to introduce randomness into organizational operations and assets.
- SC-30 (3) - Change Processing / Storage Locations
- The organization changes the location of [Assignment: organization-defined processing and/or storage] [Selection: [Assignment: organization-defined time frequency]; at random time intervals]].
- SC-30 (4) - Misleading Information
- The organization employs realistic, but misleading information in [Assignment: organization-defined information system components] with regard to its security state or posture.
- SC-30 (5) - Concealment Of System Components
- The organization employs [Assignment: organization-defined techniques] to hide or conceal [Assignment: organization-defined information system components].
- RMF Control
- SC-31
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-31a.
- Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and
- SC-31b.
- Estimates the maximum bandwidth of those channels.
- SC-31.1 - CCI-002498
- The organization performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert storage and/or timing channels.
- SC-31.2 - CCI-002499
- The organization estimates the maximum bandwidth of the covert storage and timing channels.
- SC-31 (1) - Test Covert Channels For Exploitability
- The organization tests a subset of the identified covert channels to determine which channels are exploitable.
- SC-31 (2) - Maximum Bandwidth
- The organization reduces the maximum bandwidth for identified covert [Selection (one or more); storage; timing] channels to [Assignment: organization-defined values].
- SC-31 (3) - Measure Bandwidth In Operational Environments
- The organization measures the bandwidth of [Assignment: organization-defined subset of identified covert channels] in the operational environment of the information system.
- RMF Control
- SC-32
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-32.1 - CCI-002504
- The organization defines the information system components into which the information system is partitioned.
- SC-32.2 - CCI-002505
- The organization defines the circumstances under which the information system components are to be physically separated to support partitioning.
- SC-32.3 - CCI-002506
- The organization partitions the information system into organization-defined information system components residing in separate physical domains or environments based on organization-defined circumstances for physical separation of components.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- RMF Control
- SC-33
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- RMF Control
- SC-34
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-34a.
- Loads and executes the operating environment from hardware-enforced, read-only media; and
- SC-34b.
- Loads and executes [Assignment: organization-defined applications] from hardware-enforced, read-only media.
- SC-34.1 - CCI-001212
- The organization defines information system components for which the operating environment and organization-defined applications are loaded and executed from hardware-enforced, read-only media.
- SC-34.2 - CCI-001210
- The information system, at organization-defined information system components, loads and executes the operating environment from hardware-enforced, read-only media.
- SC-34.3 - CCI-001211
- The information system, at organization-defined information system components, loads and executes organization-defined applications from hardware-enforced, read-only media.
- SC-34.4 - CCI-001213
- The organization defines applications that will be loaded and executed from hardware-enforced, read-only media.
- SC-34 (1) - No Writable Storage
- The organization employs [Assignment: organization-defined information system components] with no writeable storage that is persistent across component restart or power on/off.
- SC-34 (2) - Integrity Protection / Read-Only Media
- The organization protects the integrity of information prior to storage on read-only media and controls the media after such information has been recorded onto the media.
- SC-34 (3) - Hardware-Based Protection
- The organization:
- RMF Control
- SC-35
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-35.1 - CCI-001196
- The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
- RMF Control
- SC-36
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-36.1 - CCI-002513
- The organization defines the processing that is to be distributed across multiple physical locations.
- SC-36.2 - CCI-002514
- The organization defines the storage that is to be distributed across multiple physical locations.
- SC-36.3 - CCI-002515
- The organization distributes organization-defined processing across multiple physical locations.
- SC-36.4 - CCI-002516
- The organization distributes organization-defined storage across multiple physical locations.
- SC-36 (1) - Polling Techniques
- The organization employs polling techniques to identify potential faults, errors, or compromises to [Assignment: organization-defined distributed processing and storage components].
- RMF Control
- SC-37
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-37.1 - CCI-002521
- The organization defines the out-of-band channels to be employed for the physical delivery or electronic transmission of organization-defined information, information system components, or devices.
- SC-37.2 - CCI-002522
- The organization defines the information, information system components or devices that are to be electronically transmitted or physically delivered via organization-defined out-of-band channels.
- SC-37(1).1 - CCI-002523
- The organization defines the individuals or information systems authorized to be recipients of organization-defined information, information system components, or devices to be delivered by employing organization-defined out-of-band channels for electronic transmission or physical delivery.
- SC-37.4 - CCI-002524
- The organization employs organization-defined out-of-band channels for the electronic transmission or physical delivery of organization-defined information, information system components, or devices to organization-defined individuals or information systems.
- AC-2 - Account Management
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-7 - Least Functionality
- IA-4 - Identifier Management
- IA-5 - Authenticator Management
- MA-4 - Nonlocal Maintenance
- SC-12 - Cryptographic Key Establishment And Management
- SI-3 - Malicious Code Protection
- SI-4 - Information System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- SC-37 (1) - Ensure Delivery / Transmission
- The organization employs [Assignment: organization-defined security safeguards] to ensure that only [Assignment: organization-defined individuals or information systems] receive the [Assignment: organization-defined information, information system components, or devices].
- RMF Control
- SC-38
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-38.1 - CCI-002528
- The organization defines the operations security safeguards to be employed to protect key organizational information throughout the system development life cycle.
- SC-38.2 - CCI-002529
- The organization employs organization-defined operations security safeguards to protect key organizational information throughout the system development life cycle.
- RMF Control
- SC-39
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- LOW, MODERATE, HIGH
- SC-39.1 - CCI-002530
- The information system maintains a separate execution domain for each executing process.
- SC-39 (1) - Hardware Separation
- The information system implements underlying hardware separation mechanisms to facilitate process separation.
- SC-39 (2) - Thread Isolation
- The information system maintains a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].
- RMF Control
- SC-40
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-40.1 - CCI-002534
- The organization defines types of signal parameter attacks or references to sources for such attacks from which the information system protects organization-defined wireless links.
- SC-40.2 - CCI-002535
- The organization defines the external and internal wireless links the information system is to protect from organization-defined types of signal parameter attacks or references to sources for such attacks.
- SC-40.3 - CCI-002536
- The information system protects organization-defined external and internal wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks.
- SC-40 (1) - Electromagnetic Interference
- The information system implements cryptographic mechanisms that achieve [Assignment: organization-defined level of protection] against the effects of intentional electromagnetic interference.
- SC-40 (2) - Reduce Detection Potential
- The information system implements cryptographic mechanisms to reduce the detection potential of wireless links to [Assignment: organization-defined level of reduction].
- SC-40 (3) - Imitative Or Manipulative Communications Deception
- The information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
- SC-40 (4) - Signal Parameter Identification
- The information system implements cryptographic mechanisms to prevent the identification of [Assignment: organization-defined wireless transmitters] by using the transmitter signal parameters.
- RMF Control
- SC-41
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-41.1 - CCI-002544
- The organization defines the information systems or information system components on which organization-defined connection ports or input/output devices are to be physically disabled or removed.
- SC-41.2 - CCI-002545
- The organization defines the connection ports or input/output devices that are to be physically disabled or removed from organization-defined information systems or information system components.
- SC-41.3 - CCI-002546
- The organization physically disables or removes organization-defined connection ports or input/output devices on organization-defined information systems or information system components.
- RMF Control
- SC-42
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-42a.
- Prohibits the remote activation of environmental sensing capabilities with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]; and
- SC-42b.
- Provides an explicit indication of sensor use to [Assignment: organization-defined class of users].
- SC-42.1 - CCI-002547
- The organization defines the exceptions where remote activation of sensors is allowed.
- SC-42.2 - CCI-002548
- The information system prohibits the remote activation of environmental sensing capabilities except for the organization-defined exceptions where remote activation of sensors is allowed.
- SC-42.3 - CCI-002549
- The organization defines the class of users to receive explicit indication of sensor use.
- SC-42.4 - CCI-002550
- The information system provides an explicit indication of sensor use to the organization-defined class of users.
- SC-42 (1) - Reporting To Authorized Individuals Or Roles
- The organization ensures that the information system is configured so that data or information collected by the [Assignment: organization-defined sensors] is only reported to authorized individuals or roles.
- SC-42 (2) - Authorized Use
- The organization employs the following measures: [Assignment: organization-defined measures], so that data or information collected by [Assignment: organization-defined sensors] is only used for authorized purposes.
- SC-42 (3) - Prohibit Use Of Devices
- The organization prohibits the use of devices possessing [Assignment: organization-defined environmental sensing capabilities] in [Assignment: organization-defined facilities, areas, or systems].
- RMF Control
- SC-43
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-43a.
- Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and
- SC-43b.
- Authorizes, monitors, and controls the use of such components within the information system.
- SC-43.1 - CCI-002559
- The organization defines the information system components for which usage restrictions and implementation guidance are to be established.
- SC-43.2 - CCI-002560
- The organization establishes usage restrictions and implementation guidance for organization-defined information system components based on the potential to cause damage to the information system if used maliciously.
- SC-43.3 - CCI-002561
- The organization authorizes the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- SC-43.4 - CCI-002562
- The organization monitors the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- SC-43.5 - CCI-002563
- The organization controls the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
- RMF Control
- SC-44
- Subject Area
- SYSTEM AND COMMUNICATIONS PROTECTION
- Baseline Areas
- SC-44.1 - CCI-002564
- The organization defines the information system, system components, or location where a detonation chamber (i.e., dynamic execution environments) capability is employed.
- SC-44.2 - CCI-002565
- The organization employs a detonation chamber (i.e., dynamic execution environments) capability within an organization-defined information system, system component, or location.
- RMF Control
- SI-1
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-1a.
- Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
- SI-1b.
- Reviews and updates the current:
- SI-1.1 - CCI-002601
- The organization defines the personnel or roles to whom the system and information integrity policy and procedures are to be disseminated.
- SI-1.2 - CCI-001217
- The organization develops and documents a system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- SI-1.3 - CCI-001218
- The organization disseminates the system and information integrity policy to organization-defined personnel or roles.
- SI-1.4 - CCI-001220
- The organization develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
- SI-1.5 - CCI-001221
- The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
- SI-1.7 - CCI-001223
- The organization defines the frequency of system and information integrity policy reviews and updates.
- SI-1.6 - CCI-001219
- The organization reviews and updates system and information integrity policy in accordance with organization-defined frequency.
- SI-1.9 - CCI-001224
- The organization defines the frequency of system and information integrity procedure reviews and updates
- SI-1.8 - CCI-001222
- The organization reviews and updates system and information integrity procedures in accordance with organization-defined frequency.
- PM-9 - Risk Management Strategy
- NIST Special Publication 800-12, http://csrc.nist.gov/publications/PubsSPs.html#800-12
- NIST Special Publication 800-100, http://csrc.nist.gov/publications/PubsSPs.html#800-100
- RMF Control
- SI-2
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-2a.
- Identifies, reports, and corrects information system flaws;
- SI-2b.
- Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;
- SI-2c.
- Installs security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates; and
- SI-2d.
- Incorporates flaw remediation into the organizational configuration management process.
- SI-2.1 - CCI-001225
- The organization identifies information system flaws.
- SI-2.2 - CCI-001226
- The organization reports information system flaws.
- SI-2.3 - CCI-001227
- The organization corrects information system flaws.
- SI-2.4 - CCI-001228
- The organization tests software updates related to flaw remediation for effectiveness before installation.
- SI-2.5 - CCI-001229
- The organization tests software updates related to flaw remediation for potential side effects before installation.
- SI-2.12 - CCI-001230
- The organization incorporates flaw remediation into the organizational configuration management process.
- SI-2.6 - CCI-002602
- The organization tests firmware updates related to flaw remediation for effectiveness before installation.
- SI-2.7 - CCI-002603
- The organization tests firmware updates related to flaw remediation for potential side effects before installation.
- SI-2.8 - CCI-002604
- The organization defines the time period within the release of updates that security-related software updates are to be installed.
- SI-2.9 - CCI-002605
- The organization installs security-relevant software updates within organization-defined time period of the release of the updates
- SI-2.10 - CCI-002606
- The organization defines the time period within the release of updates that security-related firmware updates are to be installed.
- SI-2.11 - CCI-002607
- The organization installs security-relevant firmware updates within organization-defined time period of the release of the updates
- CA-2 - Security Assessments
- CA-7 - Continuous Monitoring
- CM-3 - Configuration Change Control
- CM-5 - Access Restrictions For Change
- CM-8 - Information System Component Inventory
- MA-2 - Controlled Maintenance
- IR-4 - Incident Handling
- RA-5 - Vulnerability Scanning
- SA-10 - Developer Configuration Management
- SA-11 - Developer Security Testing And Evaluation
- SI-11 - Error Handling
- NIST Special Publication 800-40, http://csrc.nist.gov/publications/PubsSPs.html#800-40
- NIST Special Publication 800-128, http://csrc.nist.gov/publications/PubsSPs.html#800-128
- SI-2 (1) - Central Management
- The organization centrally manages the flaw remediation process.
- SI-2 (2) - Automated Flaw Remediation Status
- The organization employs automated mechanisms [Assignment: organization-defined frequency] to determine the state of information system components with regard to flaw remediation.
- SI-2 (3) - Time To Remediate Flaws / Benchmarks For Corrective Actions
- The organization:
- SI-2 (4) - Automated Patch Management Tools
- [Withdrawn: Incorporated into SI-2].
- SI-2 (5) - Automatic Software / Firmware Updates
- The organization installs [Assignment: organization-defined security-relevant software and firmware updates] automatically to [Assignment: organization-defined information system components].
- SI-2 (6) - Removal Of Previous Versions Of Software / Firmware
- The organization removes [Assignment: organization-defined software and firmware components] after updated versions have been installed.
- RMF Control
- SI-3
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-3a.
- Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;
- SI-3b.
- Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;
- SI-3c.
- Configures malicious code protection mechanisms to:
- SI-3d.
- Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
- SI-3.1 - CCI-002619
- The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.
- SI-3.3 - CCI-002621
- The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
- SI-3.2 - CCI-002620
- The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.
- SI-3.4 - CCI-002622
- The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.
- SI-3.5 - CCI-001240
- The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
- SI-3.6 - CCI-002623
- The organization defines the frequency for performing periodic scans of the information system for malicious code.
- SI-3.7 - CCI-002624
- The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at network entry/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy.
- SI-3.9 - CCI-001242
- The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.
- SI-3.8 - CCI-001241
- The organization configures malicious code protection mechanisms to perform periodic scans of the information system on an organization-defined frequency.
- SI-3.11 - CCI-001244
- The organization defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alert to administrator.
- SI-3.10 - CCI-001243
- The organization configures malicious code protection mechanisms to perform organization-defined action(s) in response to malicious code detection.
- SI-3.12 - CCI-001245
- The organization addresses the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the information system.
- CM-3 - Configuration Change Control
- MP-2 - Media Access
- SA-4 - Acquisition Process
- SA-8 - Security Engineering Principles
- SA-12 - Supply Chain Protection
- SA-13 - Trustworthiness
- SC-7 - Boundary Protection
- SC-26 - Honeypots
- SC-44 - Detonation Chambers
- SI-2 - Flaw Remediation
- SI-4 - Information System Monitoring
- SI-7 - Software, Firmware, And Information Integrity
- NIST Special Publication 800-83, http://csrc.nist.gov/publications/PubsSPs.html#800-83
- SI-3 (1) - Central Management
- The organization centrally manages malicious code protection mechanisms.
- SI-3 (2) - Automatic Updates
- The information system automatically updates malicious code protection mechanisms.
- SI-3 (3) - Non-Privileged Users
- [Withdrawn: Incorporated into AC-6 (10)].
- SI-3 (4) - Updates Only By Privileged Users
- The information system updates malicious code protection mechanisms only when directed by a privileged user.
- SI-3 (5) - Portable Storage Devices
- [Withdrawn: Incorporated into MP-7].
- SI-3 (6) - Testing / Verification
- The organization:
- SI-3 (7) - Nonsignature-Based Detection
- The information system implements nonsignature-based malicious code detection mechanisms.
- SI-3 (8) - Detect Unauthorized Commands
- The information system detects [Assignment: organization-defined unauthorized operating system commands] through the kernel application programming interface at [Assignment: organization-defined information system hardware components] and [Selection (one or more): issues a warning; audits the command execution; prevents the execution of the command].
- SI-3 (9) - Authenticate Remote Commands
- The information system implements [Assignment: organization-defined security safeguards] to authenticate [Assignment: organization-defined remote commands].
- SI-3 (10) - Malicious Code Analysis
- The organization:
- RMF Control
- SI-4
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-4a.
- Monitors the information system to detect:
- SI-4b.
- Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods];
- SI-4c.
- Deploys monitoring devices:
- SI-4d.
- Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;
- SI-4e.
- Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;
- SI-4f.
- Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and
- SI-4g.
- Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].
- SI-4.1 - CCI-001253
- The organization defines the objectives of monitoring for attacks and indicators of potential attacks on the information system.
- SI-4.2 - CCI-002641
- The organization monitors the information system to detect attacks and indicators of potential attacks in accordance with organization-defined monitoring objectives.
- SI-4.3 - CCI-002642
- The organization monitors the information system to detect unauthorized local connections.
- SI-4.4 - CCI-002643
- The organization monitors the information system to detect unauthorized network connections.
- SI-4.5 - CCI-002644
- The organization monitors the information system to detect unauthorized remote connections.
- SI-4.6 - CCI-002645
- The organization defines the techniques and methods to be used to identify unauthorized use of the information system.
- SI-4.7 - CCI-002646
- The organization identifies unauthorized use of the information system through organization-defined techniques and methods.
- SI-4.8 - CCI-001255
- The organization deploys monitoring devices strategically within the information system to collect organization determined essential information.
- SI-4.9 - CCI-001256
- The organization deploys monitoring devices at ad hoc locations within the system to track specific types of transactions of interest to the organization.
- SI-4.10 - CCI-002647
- The organization protects information obtained from intrusion-monitoring tools from unauthorized access.
- SI-4.11 - CCI-002648
- The organization protects information obtained from intrusion-monitoring tools from unauthorized modification.
- SI-4.12 - CCI-002649
- The organization protects information obtained from intrusion-monitoring tools from unauthorized deletion.
- SI-4.13 - CCI-001257
- The organization heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information.
- SI-4.14 - CCI-001258
- The organization obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
- SI-4.15 - CCI-002650
- The organization defines the information system monitoring information that is to be provided the organization-defined personnel or roles.
- SI-4.16 - CCI-002651
- The organization defines the personnel or roles that are to be provided organization-defined information system monitoring information.
- SI-4.17 - CCI-002652
- The organization defines the frequency at which the organization will provide the organization-defined information system monitoring information to organization-defined personnel or roles
- SI-4.18 - CCI-002654
- The organization provides organization-defined information system monitoring information to organization-defined personnel or roles as needed or per organization-defined frequency.
- AC-3 - Access Enforcement
- AC-4 - Information Flow Enforcement
- AC-8 - System Use Notification
- AC-17 - Remote Access
- AU-2 - Audit Events
- AU-6 - Audit Review, Analysis, And Reporting
- AU-7 - Audit Reduction And Report Generation
- AU-9 - Protection Of Audit Information
- AU-12 - Audit Generation
- CA-7 - Continuous Monitoring
- IR-4 - Incident Handling
- PE-3 - Physical Access Control
- RA-5 - Vulnerability Scanning
- SC-7 - Boundary Protection
- SC-26 - Honeypots
- SC-35 - Honeyclients
- SI-3 - Malicious Code Protection
- SI-7 - Software, Firmware, And Information Integrity
- NIST Special Publication 800-61, http://csrc.nist.gov/publications/PubsSPs.html#800-61
- NIST Special Publication 800-83, http://csrc.nist.gov/publications/PubsSPs.html#800-83
- NIST Special Publication 800-92, http://csrc.nist.gov/publications/PubsSPs.html#800-92
- NIST Special Publication 800-94, http://csrc.nist.gov/publications/PubsSPs.html#800-94
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- SI-4 (1) - System-Wide Intrusion Detection System
- The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.
- SI-4 (2) - Automated Tools For Real-Time Analysis
- The organization employs automated tools to support near real-time analysis of events.
- SI-4 (3) - Automated Tool Integration
- The organization employs automated tools to integrate intrusion detection tools into access control and flow control mechanisms for rapid response to attacks by enabling reconfiguration of these mechanisms in support of attack isolation and elimination.
- SI-4 (4) - Inbound And Outbound Communications Traffic
- The information system monitors inbound and outbound communications traffic [Assignment: organization-defined frequency] for unusual or unauthorized activities or conditions.
- SI-4 (5) - System-Generated Alerts
- The information system alerts [Assignment: organization-defined personnel or roles] when the following indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
- SI-4 (6) - Restrict Non-Privileged Users
- [Withdrawn: Incorporated into AC-6 (10)].
- SI-4 (7) - Automated Response To Suspicious Events
- The information system notifies [Assignment: organization-defined incident response personnel (identified by name and/or by role)] of detected suspicious events and takes [Assignment: organization-defined least-disruptive actions to terminate suspicious events].
- SI-4 (8) - Protection Of Monitoring Information
- [Withdrawn: Incorporated into SI-4].
- SI-4 (9) - Testing Of Monitoring Tools
- The organization tests intrusion-monitoring tools [Assignment: organization-defined frequency].
- SI-4 (10) - Visibility Of Encrypted Communications
- The organization makes provisions so that [Assignment: organization-defined encrypted communications traffic] is visible to [Assignment: organization-defined information system monitoring tools].
- SI-4 (11) - Analyze Communications Traffic Anomalies
- The organization analyzes outbound communications traffic at the external boundary of the information system and selected [Assignment: organization-defined interior points within the system (e.g., subnetworks, subsystems)] to discover anomalies.
- SI-4 (12) - Automated Alerts
- The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: [Assignment: organization-defined activities that trigger alerts].
- SI-4 (13) - Analyze Traffic / Event Patterns
- The organization:
- SI-4 (14) - Wireless Intrusion Detection
- The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.
- SI-4 (15) - Wireless To Wireline Communications
- The organization employs an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
- SI-4 (16) - Correlate Monitoring Information
- The organization correlates information from monitoring tools employed throughout the information system.
- SI-4 (17) - Integrated Situational Awareness
- The organization correlates information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.
- SI-4 (18) - Analyze Traffic / Covert Exfiltration
- The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at [Assignment: organization-defined interior points within the system (e.g., subsystems, subnetworks)] to detect covert exfiltration of information.
- SI-4 (19) - Individuals Posing Greater Risk
- The organization implements [Assignment: organization-defined additional monitoring] of individuals who have been identified by [Assignment: organization-defined sources] as posing an increased level of risk.
- SI-4 (20) - Privileged Users
- The organization implements [Assignment: organization-defined additional monitoring] of privileged users.
- SI-4 (21) - Probationary Periods
- The organization implements [Assignment: organization-defined additional monitoring] of individuals during [Assignment: organization-defined probationary period].
- SI-4 (22) - Unauthorized Network Services
- The information system detects network services that have not been authorized or approved by [Assignment: organization-defined authorization or approval processes] and [Selection (one or more): audits; alerts [Assignment: organization-defined personnel or roles]].
- SI-4 (23) - Host-Based Devices
- The organization implements [Assignment: organization-defined host-based monitoring mechanisms] at [Assignment: organization-defined information system components].
- SI-4 (24) - Indicators Of Compromise
- The information system discovers, collects, distributes, and uses indicators of compromise.
- RMF Control
- SI-5
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-5a.
- Receives information system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis;
- SI-5b.
- Generates internal security alerts, advisories, and directives as deemed necessary;
- SI-5c.
- Disseminates security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and
- SI-5d.
- Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
- SI-5.2 - CCI-002692
- The organization defines the external organizations from which it receives information system security alerts, advisories and directives.
- SI-5.1 - CCI-001285
- The organization receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis.
- SI-5.3 - CCI-001286
- The organization generates internal security alerts, advisories, and directives as deemed necessary.
- SI-5.5 - CCI-001288
- The organization defines the personnel or roles to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.6 - CCI-002693
- The organization defines the elements within the organization to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.7 - CCI-002694
- The organization defines the external organizations to whom the organization will disseminate security alerts, advisories and directives.
- SI-5.4 - CCI-001287
- The organization disseminates security alerts, advisories, and directives to organization-defined personnel or roles, organization-defined elements within the organization, and/or organization-defined external organizations.
- SI-5.8 - CCI-001289
- The organization implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
- SI-2 - Flaw Remediation
- NIST Special Publication 800-40, http://csrc.nist.gov/publications/PubsSPs.html#800-40
- SI-5 (1) - Automated Alerts And Advisories
- The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
- RMF Control
- SI-6
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- HIGH
- SI-6a.
- Verifies the correct operation of [Assignment: organization-defined security functions];
- SI-6b.
- Performs this verification [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];
- SI-6c.
- Notifies [Assignment: organization-defined personnel or roles] of failed security verification tests; and
- SI-6d.
- [Selection (one or more): shuts the information system down; restarts the information system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.
- SI-6.1 - CCI-002695
- The organization defines the security functions that require verification of correct operation.
- SI-6.2 - CCI-002696
- The information system verifies correct operation of organization-defined security functions.
- SI-6.4 - CCI-002698
- The organization defines the system transitional states when the information system will verify correct operation of organization-defined security functions.
- SI-6.3 - CCI-002697
- The organization defines the frequency at which it will verify correct operation of organization-defined security functions.
- SI-6.5 - CCI-002699
- The information system performs verification of the correct operation of organization-defined security functions: when the system is in an organization-defined transitional state; upon command by a user with appropriate privileges; and/or on an organization-defined frequency.
- SI-6.7 - CCI-002700
- The organization defines the personnel or roles to be notified when security verification tests fail.
- SI-6.8 - CCI-002701
- The organization defines alternative action(s) to be taken when the information system discovers anomalies in the operation of organization-defined security functions.
- SI-6.6 - CCI-001294
- The information system notifies organization-defined personnel or roles of failed security verification tests.
- SI-6.9 - CCI-002702
- The information system shuts the information system down, restarts the information system, and/or initiates organization-defined alternative action(s) when anomalies in the operation of the organization-defined security functions are discovered.
- SI-6 (1) - Notification Of Failed Security Tests
- [Withdrawn: Incorporated into SI-6].
- SI-6 (2) - Automation Support For Distributed Testing
- The information system implements automated mechanisms to support the management of distributed security testing.
- SI-6 (3) - Report Verification Results
- The organization reports the results of security function verification to [Assignment: organization-defined personnel or roles].
- RMF Control
- SI-7
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- MODERATE, HIGH
- SI-7.1 - CCI-002703
- The organization defines the software, firmware, and information which will be subjected to integrity verification tools to detect unauthorized changes.
- SI-7.2 - CCI-002704
- The organization employs integrity verification tools to detect unauthorized changes to organization-defined software, firmware, and information.
- NIST Special Publication 800-147, http://csrc.nist.gov/publications/PubsSPs.html#800-147
- NIST Special Publication 800-155, http://csrc.nist.gov/publications/PubsSPs.html#800-155
- SI-7 (1) - Integrity Checks
- The information system performs an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one or more): at startup; at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defined frequency]].
- SI-7 (2) - Automated Notifications Of Integrity Violations
- The organization employs automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification.
- SI-7 (3) - Centrally-Managed Integrity Tools
- The organization employs centrally managed integrity verification tools.
- SI-7 (4) - Tamper-Evident Packaging
- [Withdrawn: Incorporated into SA-12].
- SI-7 (5) - Automated Response To Integrity Violations
- The information system automatically [Selection (one or more): shuts the information system down; restarts the information system; implements [Assignment: organization-defined security safeguards]] when integrity violations are discovered.
- SI-7 (6) - Cryptographic Protection
- The information system implements cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
- SI-7 (7) - Integration Of Detection And Response
- The organization incorporates the detection of unauthorized [Assignment: organization-defined security-relevant changes to the information system] into the organizational incident response capability.
- SI-7 (8) - Auditing Capability For Significant Events
- The information system, upon detection of a potential integrity violation, provides the capability to audit the event and initiates the following actions: [Selection (one or more): generates an audit record; alerts current user; alerts [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined other actions]].
- SI-7 (9) - Verify Boot Process
- The information system verifies the integrity of the boot process of [Assignment: organization-defined devices].
- SI-7 (10) - Protection Of Boot Firmware
- The information system implements [Assignment: organization-defined security safeguards] to protect the integrity of boot firmware in [Assignment: organization-defined devices].
- SI-7 (11) - Confined Environments With Limited Privileges
- The organization requires that [Assignment: organization-defined user-installed software] execute in a confined physical or virtual machine environment with limited privileges.
- SI-7 (12) - Integrity Verification
- The organization requires that the integrity of [Assignment: organization-defined user-installed software] be verified prior to execution.
- SI-7 (13) - Code Execution In Protected Environments
- The organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles].
- SI-7 (14) - Binary Or Machine Executable Code
- The organization:
- SI-7 (15) - Code Authentication
- The information system implements cryptographic mechanisms to authenticate [Assignment: organization-defined software or firmware components] prior to installation.
- SI-7 (16) - Time Limit On Process Execution W/O Supervision
- The organization does not allow processes to execute without supervision for more than [Assignment: organization-defined time period].
- RMF Control
- SI-8
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- MODERATE, HIGH
- SI-8a.
- Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
- SI-8b.
- Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
- SI-8.1 - CCI-002741
- The organization employs spam protection mechanisms at information system entry points to detect and take action on unsolicited messages.
- SI-8.2 - CCI-002742
- The organization employs spam protection mechanisms at information system exit points to detect and take action on unsolicited messages.
- SI-8.3 - CCI-001306
- The organization updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
- NIST Special Publication 800-45, http://csrc.nist.gov/publications/PubsSPs.html#800-45
- SI-8 (1) - Central Management
- The organization centrally manages spam protection mechanisms.
- SI-8 (2) - Automatic Updates
- The information system automatically updates spam protection mechanisms.
- SI-8 (3) - Continuous Learning Capability
- The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
- RMF Control
- SI-9
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- RMF Control
- SI-10
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- MODERATE, HIGH
- SI-10.2 - CCI-002744
- The organization defines the inputs the information system is to conduct validity checks.
- SI-10.1 - CCI-001310
- The information system checks the validity of organization-defined inputs.
- SI-10 (1) - Manual Override Capability
- The information system:
- SI-10 (2) - Review / Resolution Of Errors
- The organization ensures that input validation errors are reviewed and resolved within [Assignment: organization-defined time period].
- SI-10 (3) - Predictable Behavior
- The information system behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
- SI-10 (4) - Review / Timing Interactions
- The organization accounts for timing interactions among information system components in determining appropriate responses for invalid inputs.
- SI-10 (5) - Restrict Inputs To Trusted Sources And Approved Formats
- The organization restricts the use of information inputs to [Assignment: organization-defined trusted sources] and/or [Assignment: organization-defined formats].
- RMF Control
- SI-11
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- MODERATE, HIGH
- SI-11a.
- Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and
- SI-11b.
- Reveals error messages only to [Assignment: organization-defined personnel or roles].
- SI-11.1 - CCI-001312
- The information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
- SI-11.3 - CCI-002759
- The organization defines the personnel or roles to whom error messages are to be revealed.
- SI-11.2 - CCI-001314
- The information system reveals error messages only to organization-defined personnel or roles.
- RMF Control
- SI-12
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- LOW, MODERATE, HIGH
- SI-12.1 - CCI-001315
- The organization handles information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
- SI-12.2 - CCI-001678
- The organization retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
- RMF Control
- SI-13
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- SI-13a.
- Determines mean time to failure (MTTF) for [Assignment: organization-defined information system components] in specific environments of operation; and
- SI-13b.
- Provides substitute information system components and a means to exchange active and standby components at [Assignment: organization-defined MTTF substitution criteria].
- SI-13.2 - CCI-002761
- The organization defines the system components in specific environments of operation for which the mean time to failure (MTTF) is to be determined.
- SI-13.1 - CCI-002760
- The organization determines mean time to failure (MTTF) for organization-defined information system components in specific environments of operation.
- SI-13.4 - CCI-002762
- The organization defines the mean time to failure substitution criteria to be employed as a means to determine the need to exchange active and standby components.
- SI-13.3 - CCI-001318
- The organization provides substitute information system components.
- SI-13.5 - CCI-002763
- The organization provides a means to exchange active and standby components in accordance with the organization-defined mean time to failure substitution criteria.
- SI-13 (1) - Transferring Component Responsibilities
- The organization takes information system components out of service by transferring component responsibilities to substitute components no later than [Assignment: organization-defined fraction or percentage] of mean time to failure.
- SI-13 (2) - Time Limit On Process Execution Without Supervision
- [Withdrawn: Incorporated into SI-7 (16)].
- SI-13 (3) - Manual Transfer Between Components
- The organization manually initiates transfers between active and standby information system components [Assignment: organization-defined frequency] if the mean time to failure exceeds [Assignment: organization-defined time period].
- SI-13 (4) - Standby Component Installation / Notification
- The organization, if information system component failures are detected:
- SI-13 (5) - Failover Capability
- The organization provides [Selection: real-time; near real-time] [Assignment: organization-defined failover capability] for the information system.
- RMF Control
- SI-14
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- SI-14.1 - CCI-002764
- The organization defines non-persistent information system components and services to be implemented.
- SI-14.2 - CCI-002765
- The organization defines the frequency at which it will terminate organization-defined non-persistent information system components and services.
- SI-14.3 - CCI-002766
- The organization implements organization-defined non-persistence information system components and services that are initiated in a known state.
- SI-14.4 - CCI-002767
- The organization implements organization-defined non-persistence information system components and services that are terminated upon end of session of use and/or periodically at organization-defined frequency.
- SI-14 (1) - Refresh From Trusted Sources
- The organization ensures that software and data employed during information system component and service refreshes are obtained from [Assignment: organization-defined trusted sources].
- RMF Control
- SI-15
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- SI-15.1 - CCI-002770
- The organization defines the software programs and/or applications from which the information system is to validate the information output to ensure the information is consistent with expected content.
- SI-15.2 - CCI-002771
- The information system validates information output from organization-defined software programs and/or applications to ensure that the information is consistent with the expected content.
- RMF Control
- SI-16
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- MODERATE, HIGH
- SI-16.1 - CCI-002823
- The organization defines the security safeguards to be implemented to protect the information system's memory from unauthorized code execution.
- SI-16.2 - CCI-002824
- The information system implements organization-defined security safeguards to protect its memory from unauthorized code execution.
- RMF Control
- SI-17
- Subject Area
- SYSTEM AND INFORMATION INTEGRITY
- Baseline Areas
- SI-17.1 - CCI-002773
- The organization defines the fail-safe procedures to be implemented by the information system when organization-defined failure conditions occur.
- SI-17.2 - CCI-002774
- The organization defines the failure conditions which, when they occur, will result in the information system implementing organization-defined fail-safe procedures.
- SI-17.3 - CCI-002775
- The information system implements organization-defined fail-safe procedures when organization-defined failure conditions occur.
- RMF Control
- PM-1
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-1a.
- Develops and disseminates an organization-wide information security program plan that:
- PM-1b.
- Reviews the organization-wide information security program plan [Assignment: organization-defined frequency];
- PM-1c.
- Updates the plan to address organizational changes and problems identified during plan implementation or security control assessments; and
- PM-1d.
- Protects the information security program plan from unauthorized disclosure and modification.
- PM-1.1 - CCI-000073
- The organization develops an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
- PM-1.2 - CCI-002985
- The organization disseminates an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
- PM-1.4 - CCI-001680
- The organization develops an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PM-1.3 - CCI-002986
- The organization disseminates an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
- PM-1.5 - CCI-002984
- The organization develops an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
- PM-1.6 - CCI-002987
- The organization disseminates an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
- PM-1.8 - CCI-000074
- The organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
- PM-1.7 - CCI-002988
- The organization disseminates an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
- PM-1.10 - CCI-000076
- The organization defines the frequency to review the organization-wide information security program plan.
- PM-1.9 - CCI-000075
- The organization reviews the organization-wide information security program plan on an organization-defined frequency.
- PM-1.11 - CCI-000077
- The organization updates the plan to address organizational changes and problems identified during plan implementation or security control assessments.
- PM-1.12 - CCI-002989
- The organization protects the information security program plan from unauthorized disclosure.
- PM-1.13 - CCI-002990
- The organization protects the information security program plan from unauthorized modification.
- PM-8 - Critical Infrastructure Plan
- RMF Control
- PM-2
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-2.1 - CCI-000078
- The organization appoints a senior information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.
- RMF Control
- PM-3
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-3a.
- Ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement;
- PM-3b.
- Employs a business case/Exhibit 300/Exhibit 53 to record the resources required; and
- PM-3c.
- Ensures that information security resources are available for expenditure as planned.
- PM-3.1 - CCI-000080
- The organization ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement.
- PM-3.2 - CCI-000081
- The organization employs a business case/Exhibit 300/Exhibit 53 to record the resources required.
- PM-3.3 - CCI-000141
- The organization ensures that information security resources are available for expenditure as planned.
- NIST Special Publication 800-65, http://csrc.nist.gov/publications/PubsSPs.html#800-65
- RMF Control
- PM-4
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-4a.
- Implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems:
- PM-4b.
- Reviews plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-4.2 - CCI-002991
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are developed.
- PM-4.1 - CCI-000142
- The organization implements a process for ensuring that plans of action and milestones for the security program and the associated organizational information systems are maintained.
- PM-4.3 - CCI-000170
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to organizational operations and assets, individuals, other organizations, and the Nation.
- PM-4.4 - CCI-002992
- The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are reported in accordance with OMB FISMA reporting requirements.
- PM-4.5 - CCI-002993
- The organization reviews plans of action and milestones for the security program and associated organization information systems for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- CA-5 - Plan Of Action And Milestones
- OMB Memorandum 02-01, http://www.whitehouse.gov/omb/memoranda_m02-01
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- RMF Control
- PM-5
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-5.1 - CCI-000207
- The organization develops and maintains an inventory of its information systems.
- http://www.omb.gov, http://www.omb.gov
- RMF Control
- PM-6
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-6.1 - CCI-000209
- The organization develops the results of information security measures of performance.
- PM-6.2 - CCI-000210
- The organization monitors the results of information security measures of performance.
- PM-6.3 - CCI-000211
- The organization reports on the results of information security measures of performance.
- NIST Special Publication 800-55, http://csrc.nist.gov/publications/PubsSPs.html#800-55
- RMF Control
- PM-7
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-7.1 - CCI-000212
- The organization develops an enterprise architecture with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- RMF Control
- PM-8
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-8.1 - CCI-000216
- The organization develops and documents a critical infrastructure and key resource protection plan that addresses information security issues.
- PM-8.2 - CCI-001640
- The organization updates the critical infrastructure and key resources protection plan that addresses information security issues.
- HSPD 7, http://www.fas.org/irp/offdocs/nspd/hspd-7.html
- National Infrastructure Protection Plan, https://www.dhs.gov/national-infrastructure-protection-plan
- RMF Control
- PM-9
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-9a.
- Develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems;
- PM-9b.
- Implements the risk management strategy consistently across the organization; and
- PM-9c.
- Reviews and updates the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.
- PM-9.1 - CCI-000227
- The organization develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems.
- PM-9.2 - CCI-000228
- The organization implements a comprehensive strategy to manage risk to organization operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems consistently across the organization.
- PM-9.3 - CCI-002994
- The organization reviews and updates the risk management strategy in accordance with organization-defined frequency or as required, to address organizational changes.
- PM-9.4 - CCI-002995
- The organization defines the frequency to review and update the risk management strategy to address organizational changes.
- RA-3 - Risk Assessment
- NIST Special Publication 800-30, http://csrc.nist.gov/publications/PubsSPs.html#800-30
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- RMF Control
- PM-10
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-10a.
- Manages (i.e., documents, tracks, and reports) the security state of organizational information systems and the environments in which those systems operate through security authorization processes;
- PM-10b.
- Designates individuals to fulfill specific roles and responsibilities within the organizational risk management process; and
- PM-10c.
- Fully integrates the security authorization processes into an organization-wide risk management program.
- PM-10.1 - CCI-000229
- The organization documents the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.2 - CCI-000230
- The organization tracks the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.3 - CCI-000231
- The organization reports the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
- PM-10.4 - CCI-000233
- The organization designates individuals to fulfill specific roles and responsibilities within the organizational risk management process.
- PM-10.5 - CCI-000234
- The organization fully integrates the security authorization processes into an organization-wide risk management program.
- CA-6 - Security Authorization
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-39, http://csrc.nist.gov/publications/PubsSPs.html#800-39
- RMF Control
- PM-11
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-11a.
- Defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; and
- PM-11b.
- Determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until achievable protection needs are obtained.
- PM-11.1 - CCI-000235
- The organization defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
- PM-11.2 - CCI-000236
- The organization determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until an achievable set of protection needs are obtained.
- FIPS Publication 199, http://csrc.nist.gov/publications/PubsFIPS.html#199
- NIST Special Publication 800-60, http://csrc.nist.gov/publications/PubsSPs.html#800-60
- RMF Control
- PM-12
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-12.1 - CCI-002996
- The organization implements an insider threat program that includes a cross-discipline insider threat incident handling team.
- AC-6 - Least Privilege
- AT-2 - Security Awareness Training
- AU-6 - Audit Review, Analysis, And Reporting
- AU-7 - Audit Reduction And Report Generation
- AU-10 - Non-Repudiation
- AU-12 - Audit Generation
- AU-13 - Monitoring For Information Disclosure
- CA-7 - Continuous Monitoring
- IA-4 - Identifier Management
- IR-4 - Incident Handling
- MP-7 - Media Use
- PE-2 - Physical Access Authorizations
- PS-3 - Personnel Screening
- PS-4 - Personnel Termination
- PS-5 - Personnel Transfer
- PS-8 - Personnel Sanctions
- SC-7 - Boundary Protection
- SC-38 - Operations Security
- SI-4 - Information System Monitoring
- PM-1 - Information Security Program Plan
- PM-14 - Testing, Training, And Monitoring
- RMF Control
- PM-13
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-13.1 - CCI-002997
- The organization establishes an information security workforce development and improvement program.
- RMF Control
- PM-14
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-14a.
- Implements a process for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational information systems:
- PM-14b.
- Reviews testing, training, and monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.1 - CCI-002998
- The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are developed.
- PM-14.2 - CCI-002999
- The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are maintained.
- PM-14.3 - CCI-003000
- The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are developed.
- PM-14.4 - CCI-003001
- The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are maintained.
- PM-14.5 - CCI-003002
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are developed.
- PM-14.6 - CCI-003003
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are maintained.
- PM-14.7 - CCI-003004
- The organization implements a process for ensuring that organizational plans for conducting security testing associated with organizational information systems continue to be executed in a timely manner.
- PM-14.8 - CCI-003005
- The organization implements a process for ensuring that organizational plans for conducting security training associated with organizational information systems continue to be executed in a timely manner.
- PM-14.9 - CCI-003006
- The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems continue to be executed in a timely manner.
- PM-14.10 - CCI-003007
- The organization reviews testing plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.11 - CCI-003008
- The organization reviews training plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- PM-14.12 - CCI-003009
- The organization reviews monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
- NIST Special Publication 800-16, http://csrc.nist.gov/publications/PubsSPs.html#800-16
- NIST Special Publication 800-37, http://csrc.nist.gov/publications/PubsSPs.html#800-37
- NIST Special Publication 800-53A, http://csrc.nist.gov/publications/PubsSPs.html#800-53A
- NIST Special Publication 800-137, http://csrc.nist.gov/publications/PubsSPs.html#800-137
- RMF Control
- PM-15
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-15a.
- To facilitate ongoing security education and training for organizational personnel;
- PM-15b.
- To maintain currency with recommended security practices, techniques, and technologies; and
- PM-15c.
- To share current security-related information including threats, vulnerabilities, and incidents.
- PM-15.1 - CCI-003010
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to facilitate ongoing security education and training for organizational personnel.
- PM-15.2 - CCI-003011
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to maintain currency with recommended security practices, techniques, and technologies.
- PM-15.3 - CCI-003012
- The organization establishes and institutionalizes contact with selected groups and associations within the security community to share current security-related information including threats, vulnerabilities, and incidents.
- SI-5 - Security Alerts, Advisories, And Directives
- RMF Control
- PM-16
- Subject Area
- PROGRAM MANAGEMENT
- Baseline Areas
- PM-16.1 - CCI-003013
- The organization implements a threat awareness program that includes a cross-organization information-sharing capability.