Controls
We take security, compliance, and privacy seriously. Explore our certifications, reports, and policies in one place.
⌘KParamify Cloud FedRAMP High
AC-10
PassLimit the number of concurrent sessions for each to .
AC-11(1)
PassConceal, via the device lock, information previously visible on the display with a publicly viewable image.
AC-11 Part a
PassPrevent further access to the system by .
AC-11 Part b
PassRetain the device lock until the user reestablishes access using established identification and authentication procedures.
AC-12
PassAutomatically terminate a user session after .
AC-14 Part a
PassIdentify that can be performed on the system without identification or authentication consistent with organizational mission and business functions.
AC-14 Part b
PassDocument and provide supporting rationale in the security plan for the system, user actions not requiring identification or authentication.
AC-17(1)
PassEmploy automated mechanisms to monitor and control remote access methods.
AC-17(2)
PassImplement cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
AC-17(3)
PassRoute remote accesses through authorized and managed network access control points.
AC-17(4) Part a
PassAuthorize the execution of privileged commands and access to security-relevant information via remote access only in a format that provides assessable evidence and for the following needs: .
AC-17(4) Part b
PassDocument the rationale for remote access in the security plan for the system.
AC-17 Part a
PassEstablish and document usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed.
AC-17 Part b
PassAuthorize each type of remote access to the system prior to allowing such connections.
AC-18(1)
PassProtect wireless access to the system using authentication of and encryption.
AC-18(3)
PassDisable, when not intended for use, wireless networking capabilities embedded within system components prior to issuance and deployment.
AC-18(4)
PassIdentify and explicitly authorize users allowed to independently configure wireless networking capabilities.
AC-18(5)
PassSelect radio antennas and calibrate transmission power levels to reduce the probability that signals from wireless access points can be received outside of organization-controlled boundaries.
AC-18 Part a
PassEstablish configuration requirements, connection requirements, and implementation guidance for each type of wireless access.
AC-18 Part b
PassAuthorize each type of wireless access to the system prior to allowing such connections.
AC-19(5)
PassEmploy to protect the confidentiality and integrity of information on .
AC-19 Part a
PassEstablish configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices, to include when such devices are outside of controlled areas.
AC-19 Part b
PassAuthorize the connection of mobile devices to organizational systems.
AC-1 Part a1
PassDevelop, document, and disseminate to access control policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AC-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the access control policy and the associated access controls.
AC-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the access control policy and procedures.
AC-1 Part c1
PassReview and update the current access control policy and following .
AC-1 Part c2
PassReview and update the current access control procedures and following .
AC-20(1) Part a
PassPermit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after verification of the implementation of controls on the external system as specified in the organization’s security and privacy policies and security and privacy plans.
AC-20(1) Part b
PassPermit authorized individuals to use an external system to access the system or to process, store, or transmit organization-controlled information only after retention of approved system connection or processing agreements with the organizational entity hosting the external system.
AC-20(2)
PassRestrict the use of organization-controlled portable storage devices by authorized individuals on external systems using .
AC-20 Part a
Pass, consistent with the trust relationships established with other organizations owning, operating, and/or maintaining external systems, allowing authorized individuals to: 1. access the system from external systems; and 2. process, store, or transmit organization-controlled information using external systems.
AC-20 Part b
PassProhibit the use of .
AC-2(1)
PassSupport the management of system accounts using .
AC-2(11)
PassEnforce for .
AC-2(12) Part a
PassMonitor system accounts for .
AC-2(12) Part b
PassReport atypical usage of system accounts to .
AC-2(13)
PassDisable accounts of individuals within of discovery of .
AC-21 Part a
PassEnable authorized users to determine whether access authorizations assigned to a sharing partner match the information’s access and use restrictions for .
AC-21 Part b
PassEmploy to assist users in making information sharing and collaboration decisions.
AC-2(2)
PendingAutomatically temporary and emergency accounts after .
AC-22 Part a
PassDesignate individuals authorized to make information publicly accessible.
AC-22 Part b
PassTrain authorized individuals to ensure that publicly accessible information does not contain nonpublic information.
AC-22 Part c
PassReview the proposed content of information prior to posting onto the publicly accessible system to ensure that nonpublic information is not included.
AC-22 Part d
PassReview the content on the publicly accessible system for nonpublic information and remove such information, if discovered.
AC-2(3) Part a
PassDisable accounts within when the accounts have expired.
AC-2(3) Part b
PassDisable accounts within when the accounts are no longer associated with a user or individual.
AC-2(3) Part c
PassDisable accounts within when the accounts are in violation of organizational policy.
AC-2(3) Part d
PassDisable accounts within when the accounts have been inactive for .
AC-2(4)
PassAutomatically audit account creation, modification, enabling, disabling, and removal actions.
AC-2(5)
PassRequire that users log out when .
AC-2(7) Part a
PassEstablish and administer privileged user accounts in accordance with .
AC-2(7) Part b
PassMonitor privileged role or attribute assignments.
AC-2(7) Part c
PassMonitor changes to roles or attributes.
AC-2(7) Part d
PassRevoke access when privileged role or attribute assignments are no longer appropriate.
AC-2(9)
PassOnly permit the use of shared and group accounts that meet .
AC-2 Part a
PassDefine and document the types of accounts allowed and specifically prohibited for use within the system.
AC-2 Part b
PassAssign account managers.
AC-2 Part c
PassRequire for group and role membership.
AC-2 Part d
PassSpecify: 1. authorized users of the system; 2. group and role membership; and 3. access authorizations (i.e., privileges) and for each account.
AC-2 Part e
PassRequire approvals by for requests to create accounts.
AC-2 Part f
PassCreate, enable, modify, disable, and remove accounts in accordance with .
AC-2 Part g
PassMonitor the use of accounts.
AC-2 Part h
PassNotify account managers and within: 1. when accounts are no longer required; 2. when users are terminated or transferred; and 3. when system usage or need-to-know changes for an individual.
AC-2 Part i
PassAuthorize access to the system based on: 1. a valid access authorization; 2. intended system usage; and 3. .
AC-2 Part j
PassReview accounts for compliance with account management requirements .
AC-2 Part k
PassEstablish and implement a process for changing shared or group account authenticators (if deployed) when individuals are removed from the group.
AC-2 Part l
PassAlign account management processes with personnel termination and transfer processes.
AC-3
PassEnforce approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
AC-4
PassEnforce approved authorizations for controlling the flow of information within the system and between connected systems based on .
AC-4(21)
PassSeparate information flows logically or physically using to accomplish .
AC-4(4)
PassPrevent encrypted information from bypassing by .
AC-5 Part a
PassIdentify and document .
AC-5 Part b
PassDefine system access authorizations to support separation of duties.
AC-6
PassEmploy the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) that are necessary to accomplish assigned organizational tasks.
AC-6(10)
PassPrevent non-privileged users from executing privileged functions.
AC-6(1) Part a
PassAuthorize access for to .
AC-6(1) Part b
PassAuthorize access for to .
AC-6(2)
PassRequire that users of system accounts (or roles) with access to use non-privileged accounts or roles, when accessing nonsecurity functions.
AC-6(3)
PassAuthorize network access to only for and document the rationale for such access in the security plan for the system.
AC-6(5)
PassRestrict privileged accounts on the system to .
AC-6(7) Part a
PassReview the privileges assigned to to validate the need for such privileges.
AC-6(7) Part b
PassReassign or remove privileges, if necessary, to correctly reflect organizational mission and business needs.
AC-6(8)
PassPrevent the following software from executing at higher privilege levels than users executing the software: .
AC-6(9)
PassLog the execution of privileged functions.
AC-7 Part a
PassEnforce a limit of consecutive invalid logon attempts by a user during a .
AC-7 Part b
PassAutomatically when the maximum number of unsuccessful attempts is exceeded.
AC-8 Part a
PassDisplay to users before granting access to the system that provides privacy and security notices consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines and state that: 1. users are accessing a U.S. Government system; 2. system usage may be monitored, recorded, and subject to audit; 3. unauthorized use of the system is prohibited and subject to criminal and civil penalties; and 4. use of the system indicates consent to monitoring and recording.
AC-8 Part b
PassRetain the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the system.
AC-8 Part c
PassFor publicly accessible systems: 1. display system use information , before granting further access to the publicly accessible system; 2. display references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and 3. include a description of the authorized uses of the system.
AT-1 Part a1
PassDevelop, document, and disseminate to awareness and training policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AT-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the awareness and training policy and the associated awareness and training controls.
AT-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the awareness and training policy and procedures.
AT-1 Part c1
PassReview and update the current awareness and training policy and following .
AT-1 Part c2
PassReview and update the current awareness and training procedures and following .
AT-2(2)
PassProvide literacy training on recognizing and reporting potential indicators of insider threat.
AT-2(3)
PassProvide literacy training on recognizing and reporting potential and actual instances of social engineering and social mining.
AT-2 Part a
PassProvide security and privacy literacy training to system users (including managers, senior executives, and contractors): 1. as part of initial training for new users and thereafter; and 2. when required by system changes or following .
AT-2 Part b
PassEmploy the following techniques to increase the security and privacy awareness of system users .
AT-2 Part c
PassUpdate literacy training and awareness content and following .
AT-2 Part d
PassIncorporate lessons learned from internal or external security incidents or breaches into literacy training and awareness techniques.
AT-3 Part a
PassProvide role-based security and privacy training to personnel with the following roles and responsibilities: : 1. before authorizing access to the system, information, or performing assigned duties, and thereafter; and 2. when required by system changes.
AT-3 Part b
PassUpdate role-based training content and following .
AT-3 Part c
PassIncorporate lessons learned from internal or external security incidents or breaches into role-based training.
AT-4 Part a
PassDocument and monitor information security and privacy training activities, including security and privacy awareness training and specific role-based security and privacy training.
AT-4 Part b
PassRetain individual training records for .
AU-10
PassProvide irrefutable evidence that an individual (or process acting on behalf of an individual) has performed .
AU-11
PassRetain audit records for to provide support for after-the-fact investigations of incidents and to meet regulatory and organizational information retention requirements.
AU-12(1)
PassCompile audit records from into a system-wide (logical or physical) audit trail that is time-correlated to within .
AU-12(3)
PassProvide and implement the capability for to change the logging to be performed on based on within .
AU-12 Part a
PassProvide audit record generation capability for the event types the system is capable of auditing as defined in [AU-2a](#au-2_smt.a) on .
AU-12 Part b
PassAllow to select the event types that are to be logged by specific components of the system.
AU-12 Part c
PassGenerate audit records for the event types defined in [AU-2c](#au-2_smt.c) that include the audit record content defined in [AU-3](#au-3).
AU-1 Part a1
PassDevelop, document, and disseminate to audit and accountability policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
AU-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the audit and accountability policy and the associated audit and accountability controls.
AU-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the audit and accountability policy and procedures.
AU-1 Part c1
PassReview and update the current audit and accountability policy and following .
AU-1 Part c2
PassReview and update the current audit and accountability procedures and following .
AU-2 Part a
PassIdentify the types of events that the system is capable of logging in support of the audit function: .
AU-2 Part b
PassCoordinate the event logging function with other organizational entities requiring audit-related information to guide and inform the selection criteria for events to be logged.
AU-2 Part c
PassSpecify the following event types for logging within the system: .
AU-2 Part d
PassProvide a rationale for why the event types selected for logging are deemed to be adequate to support after-the-fact investigations of incidents.
AU-2 Part e
PassReview and update the event types selected for logging .
AU-3(1)
PassGenerate audit records containing the following additional information: .
AU-3 Part a
PassEnsure that audit records contain information that establishes the following what type of event occurred.
AU-3 Part b
PassEnsure that audit records contain information that establishes the following when the event occurred.
AU-3 Part c
PassEnsure that audit records contain information that establishes the following where the event occurred.
AU-3 Part d
PassEnsure that audit records contain information that establishes the following source of the event.
AU-3 Part e
PassEnsure that audit records contain information that establishes the following outcome of the event.
AU-3 Part f
PassEnsure that audit records contain information that establishes the following identity of any individuals, subjects, or objects/entities associated with the event.
AU-4
PassAllocate audit log storage capacity to accommodate .
AU-5(1)
PassProvide a warning to within when allocated audit log storage volume reaches of repository maximum audit log storage capacity.
AU-5(2)
PassProvide an alert within to when the following audit failure events occur: .
AU-5 Part a
PassAlert within in the event of an audit logging process failure.
AU-5 Part b
PassTake the following additional actions: .
AU-6(1)
PassIntegrate audit record review, analysis, and reporting processes using .
AU-6(3)
PassAnalyze and correlate audit records across different repositories to gain organization-wide situational awareness.
AU-6(4)
PassProvide and implement the capability to centrally review and analyze audit records from multiple components within the system.
AU-6(5)
PassIntegrate analysis of audit records with analysis of to further enhance the ability to identify inappropriate or unusual activity.
AU-6(6)
PassCorrelate information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.
AU-6(7)
PassSpecify the permitted actions for each associated with the review, analysis, and reporting of audit record information.
AU-6 Part a
PassReview and analyze system audit records for indications of and the potential impact of the inappropriate or unusual activity.
AU-6 Part b
PassReport findings to .
AU-6 Part c
PassAdjust the level of audit record review, analysis, and reporting within the system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
AU-7(1)
PassProvide and implement the capability to process, sort, and search audit records for events of interest based on the following content: .
AU-7 Part a
PassProvide and implement an audit record reduction and report generation capability that supports on-demand audit record review, analysis, and reporting requirements and after-the-fact investigations of incidents.
AU-7 Part b
PassProvide and implement an audit record reduction and report generation capability that does not alter the original content or time ordering of audit records.
AU-8 Part a
PassUse internal system clocks to generate time stamps for audit records.
AU-8 Part b
PassRecord time stamps for audit records that meet and that use Coordinated Universal Time, have a fixed local time offset from Coordinated Universal Time, or that include the local time offset as part of the time stamp.
AU-9(2)
PassStore audit records in a repository that is part of a physically different system or system component than the system or component being audited.
AU-9(3)
PassImplement cryptographic mechanisms to protect the integrity of audit information and audit tools.
AU-9(4)
PassAuthorize access to management of audit logging functionality to only .
AU-9 Part a
PassProtect audit information and audit logging tools from unauthorized access, modification, and deletion.
AU-9 Part b
PassAlert upon detection of unauthorized access, modification, or deletion of audit information.
CA-1 Part a1
PassDevelop, document, and disseminate to assessment, authorization, and monitoring policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
CA-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the assessment, authorization, and monitoring policy and the associated assessment, authorization, and monitoring controls.
CA-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the assessment, authorization, and monitoring policy and procedures.
CA-1 Part c1
PassReview and update the current assessment, authorization, and monitoring policy and following .
CA-1 Part c2
PassReview and update the current assessment, authorization, and monitoring procedures and following .
CA-2(1)
PassEmploy independent assessors or assessment teams to conduct control assessments.
CA-2(2)
PassInclude as part of control assessments, , , .
CA-2(3)
PassLeverage the results of control assessments performed by on when the assessment meets .
CA-2 Part a
PassSelect the appropriate assessor or assessment team for the type of assessment to be conducted.
CA-2 Part b
PassDevelop a control assessment plan that describes the scope of the assessment including: 1. controls and control enhancements under assessment; 2. assessment procedures to be used to determine control effectiveness; and 3. assessment environment, assessment team, and assessment roles and responsibilities.
CA-2 Part c
PassEnsure the control assessment plan is reviewed and approved by the authorizing official or designated representative prior to conducting the assessment.
CA-2 Part d
PassAssess the controls in the system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security and privacy requirements.
CA-2 Part e
PassProduce a control assessment report that document the results of the assessment.
CA-2 Part f
PassProvide the results of the control assessment to .
CA-3(6)
PassVerify that individuals or systems transferring data between interconnecting systems have the requisite authorizations (i.e., write permissions or privileges) prior to accepting such data.
CA-3 Part a
PassApprove and manage the exchange of information between the system and other systems using .
CA-3 Part b
PassDocument, as part of each exchange agreement, the interface characteristics, security and privacy requirements, controls, and responsibilities for each system, and the impact level of the information communicated.
CA-3 Part c
PassReview and update the agreements .
CA-5 Part a
PassDevelop a plan of action and milestones for the system to document the planned remediation actions of the organization to correct weaknesses or deficiencies noted during the assessment of the controls and to reduce or eliminate known vulnerabilities in the system.
CA-5 Part b
PassUpdate existing plan of action and milestones based on the findings from control assessments, independent audits or reviews, and continuous monitoring activities.
CA-6 Part a
PassAssign a senior official as the authorizing official for the system.
CA-6 Part b
PassAssign a senior official as the authorizing official for common controls available for inheritance by organizational systems.
CA-6 Part c
PassEnsure that the authorizing official for the system, before commencing operations: 1. accepts the use of common controls inherited by the system; and 2. authorizes the system to operate.
CA-6 Part d
PassEnsure that the authorizing official for common controls authorizes the use of those controls for inheritance by organizational systems.
CA-6 Part e
PassUpdate the authorizations .
CA-7(1)
PassEmploy independent assessors or assessment teams to monitor the controls in the system on an ongoing basis.
CA-7(4) Part a
PassEnsure risk monitoring is an integral part of the continuous monitoring strategy that includes the following effectiveness monitoring.
CA-7(4) Part b
PassEnsure risk monitoring is an integral part of the continuous monitoring strategy that includes the following compliance monitoring.
CA-7(4) Part c
PassEnsure risk monitoring is an integral part of the continuous monitoring strategy that includes the following change monitoring.
CA-7 Part a
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes establishing the following system-level metrics to be monitored: .
CA-7 Part b
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes establishing for monitoring and for assessment of control effectiveness.
CA-7 Part c
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes ongoing control assessments in accordance with the continuous monitoring strategy.
CA-7 Part d
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes ongoing monitoring of system and organization-defined metrics in accordance with the continuous monitoring strategy.
CA-7 Part e
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes correlation and analysis of information generated by control assessments and monitoring.
CA-7 Part f
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes response actions to address results of the analysis of control assessment and monitoring information.
CA-7 Part g
PassDevelop a system-level continuous monitoring strategy and implement continuous monitoring in accordance with the organization-level continuous monitoring strategy that includes reporting the security and privacy status of the system to .
CA-8
PassConduct penetration testing on .
CA-8(1)
PassEmploy an independent penetration testing agent or team to perform penetration testing on the system or system components.
CA-8(2)
PassEmploy the following red-team exercises to simulate attempts by adversaries to compromise organizational systems in accordance with applicable rules of engagement: .
CA-9 Part a
PassAuthorize internal connections of to the system.
CA-9 Part b
PassDocument, for each internal connection, the interface characteristics, security and privacy requirements, and the nature of the information communicated.
CA-9 Part c
PassTerminate internal system connections after .
CA-9 Part d
PassReview the continued need for each internal connection.
CM-10 Part a
PassUse software and associated documentation in accordance with contract agreements and copyright laws.
CM-10 Part b
PassTrack the use of software and associated documentation protected by quantity licenses to control copying and distribution.
CM-10 Part c
PassControl and document the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
CM-11 Part a
PassEstablish governing the installation of software by users.
CM-11 Part b
PassEnforce software installation policies through the following methods: .
CM-11 Part c
PassMonitor policy compliance .
CM-12(1)
PassUse automated tools to identify on to ensure controls are in place to protect organizational information and individual privacy.
CM-12 Part a
PassIdentify and document the location of and the specific system components on which the information is processed and stored.
CM-12 Part b
PassIdentify and document the users who have access to the system and system components where the information is processed and stored.
CM-12 Part c
PassDocument changes to the location (i.e., system or system components) where the information is processed and stored.
CM-14
PassPrevent the installation of without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
CM-1 Part a1
PassDevelop, document, and disseminate to configuration management policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
CM-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the configuration management policy and the associated configuration management controls.
CM-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the configuration management policy and procedures.
CM-1 Part c1
PassReview and update the current configuration management policy and following .
CM-1 Part c2
PassReview and update the current configuration management procedures and following .
CM-2(2)
PassMaintain the currency, completeness, accuracy, and availability of the baseline configuration of the system using .
CM-2(3)
PassRetain of previous versions of baseline configurations of the system to support rollback.
CM-2(7) Part a
PassIssue with to individuals traveling to locations that the organization deems to be of significant risk.
CM-2(7) Part b
PassApply the following controls to the systems or components when the individuals return from travel: .
CM-2 Part a
PassDevelop, document, and maintain under configuration control, a current baseline configuration of the system.
CM-2 Part b
PassReview and update the baseline configuration of the system: 1. ; 2. when required due to ; and 3. when system components are installed or upgraded.
CM-3(1) Part a
PassUse to document proposed changes to the system.
CM-3(1) Part b
PassUse to notify of proposed changes to the system and request change approval.
CM-3(1) Part c
PassUse to highlight proposed changes to the system that have not been approved or disapproved within .
CM-3(1) Part d
PassUse to prohibit changes to the system until designated approvals are received.
CM-3(1) Part e
PassUse to document all changes to the system.
CM-3(1) Part f
PassUse to notify when approved changes to the system are completed.
CM-3(2)
PassTest, validate, and document changes to the system before finalizing the implementation of the changes.
CM-3(4)
PassRequire to be members of the .
CM-3(6)
PassEnsure that cryptographic mechanisms used to provide the following controls are under configuration management: .
CM-3 Part a
PassDetermine and document the types of changes to the system that are configuration-controlled.
CM-3 Part b
PassReview proposed configuration-controlled changes to the system and approve or disapprove such changes with explicit consideration for security and privacy impact analyses.
CM-3 Part c
PassDocument configuration change decisions associated with the system.
CM-3 Part d
PassImplement approved configuration-controlled changes to the system.
CM-3 Part e
PassRetain records of configuration-controlled changes to the system for .
CM-3 Part f
PassMonitor and review activities associated with configuration-controlled changes to the system.
CM-3 Part g
PassCoordinate and provide oversight for configuration change control activities through that convenes .
CM-4
PassAnalyze changes to the system to determine potential security and privacy impacts prior to change implementation.
CM-4(1)
PassAnalyze changes to the system in a separate test environment before implementation in an operational environment, looking for security and privacy impacts due to flaws, weaknesses, incompatibility, or intentional malice.
CM-4(2)
PassAfter system changes, verify that the impacted controls are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security and privacy requirements for the system.
CM-5
PassDefine, document, approve, and enforce physical and logical access restrictions associated with changes to the system.
CM-5(1) Part a
PassEnforce access restrictions using .
CM-5(1) Part b
PassAutomatically generate audit records of the enforcement actions.
CM-5(5) Part a
PassLimit privileges to change system components and system-related information within a production or operational environment.
CM-5(5) Part b
PassReview and reevaluate privileges .
CM-6(1)
PassManage, apply, and verify configuration settings for using .
CM-6(2)
PassTake the following actions in response to unauthorized changes to : .
CM-6 Part a
PassEstablish and document configuration settings for components employed within the system that reflect the most restrictive mode consistent with operational requirements using .
CM-6 Part b
PassImplement the configuration settings.
CM-6 Part c
PassIdentify, document, and approve any deviations from established configuration settings for based on .
CM-6 Part d
PassMonitor and control changes to the configuration settings in accordance with organizational policies and procedures.
CM-7(1) Part a
PassReview the system to identify unnecessary and/or nonsecure functions, ports, protocols, software, and services.
CM-7(1) Part b
PassDisable or remove .
CM-7(2)
PassPrevent program execution in accordance with .
CM-7(5) Part a
PassIdentify .
CM-7(5) Part b
PassEmploy a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the system.
CM-7(5) Part c
PassReview and update the list of authorized software programs .
CM-7 Part a
PassConfigure the system to provide only .
CM-7 Part b
PassProhibit or restrict the use of the following functions, ports, protocols, software, and/or services: .
CM-8(1)
PassUpdate the inventory of system components as part of component installations, removals, and system updates.
CM-8(2)
PassMaintain the currency, completeness, accuracy, and availability of the inventory of system components using .
CM-8(3) Part a
PassDetect the presence of unauthorized hardware, software, and firmware components within the system using .
CM-8(3) Part b
PassTake the following actions when unauthorized components are detected: .
CM-8(4)
PassInclude in the system component inventory information, a means for identifying by , individuals responsible and accountable for administering those components.
CM-8 Part a
PassDevelop and document an inventory of system components that: 1. accurately reflects the system; 2. includes all components within the system; 3. does not include duplicate accounting of components or components assigned to any other system; 4. is at the level of granularity deemed necessary for tracking and reporting; and 5. includes the following information to achieve system component accountability: .
CM-8 Part b
PassReview and update the system component inventory .
CM-9 Part a
PassDevelop, document, and implement a configuration management plan for the system that addresses roles, responsibilities, and configuration management processes and procedures.
CM-9 Part b
PassDevelop, document, and implement a configuration management plan for the system that establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items.
CM-9 Part c
PassDevelop, document, and implement a configuration management plan for the system that defines the configuration items for the system and places the configuration items under configuration management.
CM-9 Part d
PassDevelop, document, and implement a configuration management plan for the system that is reviewed and approved by .
CM-9 Part e
PassDevelop, document, and implement a configuration management plan for the system that protects the configuration management plan from unauthorized disclosure and modification.
CP-10
PassProvide for the recovery and reconstitution of the system to a known state within after a disruption, compromise, or failure.
CP-10(2)
PassImplement transaction recovery for systems that are transaction-based.
CP-10(4)
PassProvide the capability to restore system components within from configuration-controlled and integrity-protected information representing a known, operational state for the components.
CP-1 Part a1
PassDevelop, document, and disseminate to contingency planning policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
CP-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the contingency planning policy and the associated contingency planning controls.
CP-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the contingency planning policy and procedures.
CP-1 Part c1
PassReview and update the current contingency planning policy and following .
CP-1 Part c2
PassReview and update the current contingency planning procedures and following .
CP-2(1)
PassCoordinate contingency plan development with organizational elements responsible for related plans.
CP-2(2)
PassConduct capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.
CP-2(3)
PassPlan for the resumption of mission and business functions within of contingency plan activation.
CP-2(5)
PassPlan for the continuance of mission and business functions with minimal or no loss of operational continuity and sustains that continuity until full system restoration at primary processing and/or storage sites.
CP-2(8)
PassIdentify critical system assets supporting mission and business functions.
CP-2 Part a
PassDevelop a contingency plan for the system that: 1. identifies essential mission and business functions and associated contingency requirements; 2. provides recovery objectives, restoration priorities, and metrics; 3. addresses contingency roles, responsibilities, assigned individuals with contact information; 4. addresses maintaining essential mission and business functions despite a system disruption, compromise, or failure; 5. addresses eventual, full system restoration without deterioration of the controls originally planned and implemented; 6. addresses the sharing of contingency information; and 7. is reviewed and approved by .
CP-2 Part b
PassDistribute copies of the contingency plan to .
CP-2 Part c
PassCoordinate contingency planning activities with incident handling activities.
CP-2 Part d
PassReview the contingency plan for the system .
CP-2 Part e
PassUpdate the contingency plan to address changes to the organization, system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing.
CP-2 Part f
PassCommunicate contingency plan changes to .
CP-2 Part g
PassIncorporate lessons learned from contingency plan testing, training, or actual contingency activities into contingency testing and training.
CP-2 Part h
PassProtect the contingency plan from unauthorized disclosure and modification.
CP-3(1)
PassIncorporate simulated events into contingency training to facilitate effective response by personnel in crisis situations.
CP-3 Part a
PassProvide contingency training to system users consistent with assigned roles and responsibilities: 1. within of assuming a contingency role or responsibility; 2. when required by system changes; and 3. thereafter.
CP-3 Part b
PassReview and update contingency training content and following .
CP-4(1)
PassCoordinate contingency plan testing with organizational elements responsible for related plans.
CP-4(2) Part a
PassTest the contingency plan at the alternate processing site to familiarize contingency personnel with the facility and available resources.
CP-4(2) Part b
PassTest the contingency plan at the alternate processing site to evaluate the capabilities of the alternate processing site to support contingency operations.
CP-4 Part a
PassTest the contingency plan for the system using the following tests to determine the effectiveness of the plan and the readiness to execute the plan: .
CP-4 Part b
PassReview the contingency plan test results.
CP-4 Part c
PassInitiate corrective actions, if needed.
CP-6(1)
PassIdentify an alternate storage site that is sufficiently separated from the primary storage site to reduce susceptibility to the same threats.
CP-6(2)
PassConfigure the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.
CP-6(3)
PassIdentify potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outline explicit mitigation actions.
CP-6 Part a
PassEstablish an alternate storage site, including necessary agreements to permit the storage and retrieval of system backup information.
CP-6 Part b
PassEnsure that the alternate storage site provides controls equivalent to that of the primary site.
CP-7(1)
PassIdentify an alternate processing site that is sufficiently separated from the primary processing site to reduce susceptibility to the same threats.
CP-7(2)
PassIdentify potential accessibility problems to alternate processing sites in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP-7(3)
PassDevelop alternate processing site agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives).
CP-7(4)
PassPrepare the alternate processing site so that the site can serve as the operational site supporting essential mission and business functions.
CP-7 Part a
PassEstablish an alternate processing site, including necessary agreements to permit the transfer and resumption of for essential mission and business functions within when the primary processing capabilities are unavailable.
CP-7 Part b
PassMake available at the alternate processing site, the equipment and supplies required to transfer and resume operations or put contracts in place to support delivery to the site within the organization-defined time period for transfer and resumption.
CP-7 Part c
PassProvide controls at the alternate processing site that are equivalent to those at the primary site.
CP-8
PassEstablish alternate telecommunications services, including necessary agreements to permit the resumption of for essential mission and business functions within when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8(1) Part a
PassDevelop primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with availability requirements (including recovery time objectives).
CP-8(1) Part b
PassRequest Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness if the primary and/or alternate telecommunications services are provided by a common carrier.
CP-8(2)
PassObtain alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
CP-8(3)
PassObtain alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
CP-8(4) Part a
PassRequire primary and alternate telecommunications service providers to have contingency plans.
CP-8(4) Part b
PassReview provider contingency plans to ensure that the plans meet organizational contingency requirements.
CP-8(4) Part c
PassObtain evidence of contingency testing and training by providers .
CP-9(1)
PassTest backup information to verify media reliability and information integrity.
CP-9(2)
PassUse a sample of backup information in the restoration of selected system functions as part of contingency plan testing.
CP-9(3)
PassStore backup copies of in a separate facility or in a fire rated container that is not collocated with the operational system.
CP-9(5)
PassTransfer system backup information to the alternate storage site .
CP-9(8)
PassImplement cryptographic mechanisms to prevent unauthorized disclosure and modification of .
CP-9 Part a
PassConduct backups of user-level information contained in .
CP-9 Part b
PassConduct backups of system-level information contained in the system .
CP-9 Part c
PassConduct backups of system documentation, including security- and privacy-related documentation .
CP-9 Part d
PassProtect the confidentiality, integrity, and availability of backup information.
IA-11
PassRequire users to re-authenticate when .
IA-12(2)
PassRequire evidence of individual identification be presented to the registration authority.
IA-12(3)
PassRequire that the presented identity evidence be validated and verified through .
IA-12(4)
PassRequire that the validation and verification of identity evidence be conducted in person before a designated registration authority.
IA-12(5)
PassRequire that a be delivered through an out-of-band channel to verify the users address (physical or digital) of record.
IA-12 Part a
PassIdentity proof users that require accounts for logical access to systems based on appropriate identity assurance level requirements as specified in applicable standards and guidelines.
IA-12 Part b
PassResolve user identities to a unique individual.
IA-12 Part c
PassCollect, validate, and verify identity evidence.
IA-1 Part a1
PassDevelop, document, and disseminate to identification and authentication policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
IA-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the identification and authentication policy and the associated identification and authentication controls.
IA-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the identification and authentication policy and procedures.
IA-1 Part c1
PassReview and update the current identification and authentication policy and following .
IA-1 Part c2
PassReview and update the current identification and authentication procedures and following .
IA-2
PassUniquely identify and authenticate organizational users and associate that unique identification with processes acting on behalf of those users.
IA-2(1)
PassImplement multi-factor authentication for access to privileged accounts.
IA-2(12)
PassAccept and electronically verify Personal Identity Verification-compliant credentials.
IA-2(2)
PassImplement multi-factor authentication for access to non-privileged accounts.
IA-2(5)
PassWhen shared accounts or authenticators are employed, require users to be individually authenticated before granting access to the shared accounts or resources.
IA-2(6) Part a
PassImplement multi-factor authentication for access to such that one of the factors is provided by a device separate from the system gaining access.
IA-2(6) Part b
PassImplement multi-factor authentication for access to such that the device meets .
IA-2(8)
PassImplement replay-resistant authentication mechanisms for access to .
IA-3
PassUniquely identify and authenticate before establishing a connection.
IA-4(4)
PassManage individual identifiers by uniquely identifying each individual as .
IA-4 Part a
PassManage system identifiers by receiving authorization from to assign an individual, group, role, service, or device identifier.
IA-4 Part b
PassManage system identifiers by selecting an identifier that identifies an individual, group, role, service, or device.
IA-4 Part c
PassManage system identifiers by assigning the identifier to the intended individual, group, role, service, or device.
IA-4 Part d
PassManage system identifiers by preventing reuse of identifiers for .
IA-5(13)
PassProhibit the use of cached authenticators after .
IA-5(1) Part a
PassFor password-based authentication maintain a list of commonly-used, expected, or compromised passwords and update the list and when organizational passwords are suspected to have been compromised directly or indirectly.
IA-5(1) Part b
PassFor password-based authentication verify, when users create or update passwords, that the passwords are not found on the list of commonly-used, expected, or compromised passwords in IA-5(1)(a).
IA-5(1) Part c
PassFor password-based authentication transmit passwords only over cryptographically-protected channels.
IA-5(1) Part d
PassFor password-based authentication store passwords using an approved salted key derivation function, preferably using a keyed hash.
IA-5(1) Part e
PassFor password-based authentication require immediate selection of a new password upon account recovery.
IA-5(1) Part f
PassFor password-based authentication allow user selection of long passwords and passphrases, including spaces and all printable characters.
IA-5(1) Part g
PassFor password-based authentication employ automated tools to assist the user in selecting strong password authenticators.
IA-5(1) Part h
PassFor password-based authentication enforce the following composition and complexity rules: .
IA-5(2) Part a
PassFor public key-based authentication: (1) enforce authorized access to the corresponding private key; and (2) map the authenticated identity to the account of the individual or group.
IA-5(2) Part b
PassWhen public key infrastructure (PKI) is used: (1) validate certificates by constructing and verifying a certification path to an accepted trust anchor, including checking certificate status information; and (2) implement a local cache of revocation data to support path discovery and validation.
IA-5(6)
PassProtect authenticators commensurate with the security category of the information to which use of the authenticator permits access.
IA-5(7)
PassEnsure that unencrypted static authenticators are not embedded in applications or other forms of static storage.
IA-5(8)
PassImplement to manage the risk of compromise due to individuals having accounts on multiple systems.
IA-5 Part a
PassManage system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, service, or device receiving the authenticator.
IA-5 Part b
PassManage system authenticators by establishing initial authenticator content for any authenticators issued by the organization.
IA-5 Part c
PassManage system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
IA-5 Part d
PassManage system authenticators by establishing and implementing administrative procedures for initial authenticator distribution, for lost or compromised or damaged authenticators, and for revoking authenticators.
IA-5 Part e
PassManage system authenticators by changing default authenticators prior to first use.
IA-5 Part f
PassManage system authenticators by changing or refreshing authenticators or when occur.
IA-5 Part g
PassManage system authenticators by protecting authenticator content from unauthorized disclosure and modification.
IA-5 Part h
PassManage system authenticators by requiring individuals to take, and having devices implement, specific controls to protect authenticators.
IA-5 Part i
PassManage system authenticators by changing authenticators for group or role accounts when membership to those accounts changes.
IA-6
PassObscure feedback of authentication information during the authentication process to protect the information from possible exploitation and use by unauthorized individuals.
IA-7
PassImplement mechanisms for authentication to a cryptographic module that meet the requirements of applicable laws, executive orders, directives, policies, regulations, standards, and guidelines for such authentication.
IA-8
PassUniquely identify and authenticate non-organizational users or processes acting on behalf of non-organizational users.
IA-8(1)
PassAccept and electronically verify Personal Identity Verification-compliant credentials from other federal agencies.
IA-8(2) Part a
PassAccept only external authenticators that are NIST-compliant.
IA-8(2) Part b
PassDocument and maintain a list of accepted external authenticators.
IA-8(4)
PassConform to the following profiles for identity management .
IR-1 Part a1
PassDevelop, document, and disseminate to incident response policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
IR-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the incident response policy and the associated incident response controls.
IR-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the incident response policy and procedures.
IR-1 Part c1
PassReview and update the current incident response policy and following .
IR-1 Part c2
PassReview and update the current incident response procedures and following .
IR-2(1)
PassIncorporate simulated events into incident response training to facilitate the required response by personnel in crisis situations.
IR-2(2)
PassProvide an incident response training environment using .
IR-2 Part a
PassProvide incident response training to system users consistent with assigned roles and responsibilities: 1. within of assuming an incident response role or responsibility or acquiring system access; 2. when required by system changes; and 3. thereafter.
IR-2 Part b
PassReview and update incident response training content and following .
IR-3
PassTest the effectiveness of the incident response capability for the system using the following tests: .
IR-3(2)
PassCoordinate incident response testing with organizational elements responsible for related plans.
IR-4(1)
PassSupport the incident handling process using .
IR-4(11)
PassEstablish and maintain an integrated incident response team that can be deployed to any location identified by the organization in .
IR-4(2)
PassInclude the following types of dynamic reconfiguration for as part of the incident response capability: .
IR-4(4)
PassCorrelate incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.
IR-4(6)
PassImplement an incident handling capability for incidents involving insider threats.
IR-4 Part a
PassImplement an incident handling capability for incidents that is consistent with the incident response plan and includes preparation, detection and analysis, containment, eradication, and recovery.
IR-4 Part b
PassCoordinate incident handling activities with contingency planning activities.
IR-4 Part c
PassIncorporate lessons learned from ongoing incident handling activities into incident response procedures, training, and testing, and implement the resulting changes accordingly.
IR-4 Part d
PassEnsure the rigor, intensity, scope, and results of incident handling activities are comparable and predictable across the organization.
IR-5
PassTrack and document incidents.
IR-5(1)
PassTrack incidents and collect and analyze incident information using .
IR-6(1)
PassReport incidents using .
IR-6(3)
PassProvide incident information to the provider of the product or service and other organizations involved in the supply chain or supply chain governance for systems or system components related to the incident.
IR-6 Part a
PassRequire personnel to report suspected incidents to the organizational incident response capability within .
IR-6 Part b
PassReport incident information to .
IR-7
PassProvide an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the system for the handling and reporting of incidents.
IR-7(1)
PassIncrease the availability of incident response information and support using .
IR-8 Part a
PassDevelop an incident response plan that: 1. provides the organization with a roadmap for implementing its incident response capability; 2. describes the structure and organization of the incident response capability; 3. provides a high-level approach for how the incident response capability fits into the overall organization; 4. meets the unique requirements of the organization, which relate to mission, size, structure, and functions; 5. defines reportable incidents; 6. provides metrics for measuring the incident response capability within the organization; 7. defines the resources and management support needed to effectively maintain and mature an incident response capability; 8. addresses the sharing of incident information; 9. is reviewed and approved by ; and 10. explicitly designates responsibility for incident response to .
IR-8 Part b
PassDistribute copies of the incident response plan to .
IR-8 Part c
PassUpdate the incident response plan to address system and organizational changes or problems encountered during plan implementation, execution, or testing.
IR-8 Part d
PassCommunicate incident response plan changes to .
IR-8 Part e
PassProtect the incident response plan from unauthorized disclosure and modification.
IR-9(2)
PassProvide information spillage response training .
IR-9(3)
PassImplement the following procedures to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions: .
IR-9(4)
PassEmploy the following controls for personnel exposed to information not within assigned access authorizations: .
IR-9 Part a
PassRespond to information spills by assigning with responsibility for responding to information spills.
IR-9 Part b
PassRespond to information spills by identifying the specific information involved in the system contamination.
IR-9 Part c
PassRespond to information spills by alerting of the information spill using a method of communication not associated with the spill.
IR-9 Part d
PassRespond to information spills by isolating the contaminated system or system component.
IR-9 Part e
PassRespond to information spills by eradicating the information from the contaminated system or component.
IR-9 Part f
PassRespond to information spills by identifying other systems or system components that may have been subsequently contaminated.
IR-9 Part g
PassRespond to information spills by performing the following additional actions: .
MA-1 Part a1
PassDevelop, document, and disseminate to maintenance policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
MA-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the maintenance policy and the associated maintenance controls.
MA-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the maintenance policy and procedures.
MA-1 Part c1
PassReview and update the current maintenance policy and following .
MA-1 Part c2
PassReview and update the current maintenance procedures and following .
MA-2(2) Part a
PassSchedule, conduct, and document maintenance, repair, and replacement actions for the system using .
MA-2(2) Part b
PassProduce up-to date, accurate, and complete records of all maintenance, repair, and replacement actions requested, scheduled, in process, and completed.
MA-2 Part a
PassSchedule, document, and review records of maintenance, repair, and replacement on system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 Part b
PassApprove and monitor all maintenance activities, whether performed on site or remotely and whether the system or system components are serviced on site or removed to another location.
MA-2 Part c
PassRequire that explicitly approve the removal of the system or system components from organizational facilities for off-site maintenance, repair, or replacement.
MA-2 Part d
PassSanitize equipment to remove the following information from associated media prior to removal from organizational facilities for off-site maintenance, repair, or replacement: .
MA-2 Part e
PassCheck all potentially impacted controls to verify that the controls are still functioning properly following maintenance, repair, or replacement actions.
MA-2 Part f
PassInclude the following information in organizational maintenance records: .
MA-3(1)
PassInspect the maintenance tools used by maintenance personnel for improper or unauthorized modifications.
MA-3(2)
PassCheck media containing diagnostic and test programs for malicious code before the media are used in the system.
MA-3(3) Part a
PassPrevent the removal of maintenance equipment containing organizational information by verifying that there is no organizational information contained on the equipment.
MA-3(3) Part b
PassPrevent the removal of maintenance equipment containing organizational information by sanitizing or destroying the equipment.
MA-3(3) Part c
PassPrevent the removal of maintenance equipment containing organizational information by retaining the equipment within the facility.
MA-3(3) Part d
PassPrevent the removal of maintenance equipment containing organizational information by obtaining an exemption from explicitly authorizing removal of the equipment from the facility.
MA-3 Part a
PassApprove, control, and monitor the use of system maintenance tools.
MA-3 Part b
PassReview previously approved system maintenance tools .
MA-4(3) Part a
PassRequire that nonlocal maintenance and diagnostic services be performed from a system that implements a security capability comparable to the capability implemented on the system being serviced.
MA-4(3) Part b
PassRemove the component to be serviced from the system prior to nonlocal maintenance or diagnostic services; sanitize the component (for organizational information); and after the service is performed, inspect and sanitize the component (for potentially malicious software) before reconnecting the component to the system.
MA-4 Part a
PassApprove and monitor nonlocal maintenance and diagnostic activities.
MA-4 Part b
PassAllow the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the system.
MA-4 Part c
PassEmploy strong authentication in the establishment of nonlocal maintenance and diagnostic sessions.
MA-4 Part d
PassMaintain records for nonlocal maintenance and diagnostic activities.
MA-4 Part e
PassTerminate session and network connections when nonlocal maintenance is completed.
MA-5(1) Part a
PassImplement procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements: (1) maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified; and (2) prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured.
MA-5(1) Part b
PassDevelop and implement in the event a system component cannot be sanitized, removed, or disconnected from the system.
MA-5 Part a
PassEstablish a process for maintenance personnel authorization and maintain a list of authorized maintenance organizations or personnel.
MA-5 Part b
PassVerify that non-escorted personnel performing maintenance on the system possess the required access authorizations.
MA-5 Part c
PassDesignate organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
MA-6
PassObtain maintenance support and/or spare parts for within of failure.
MP-1 Part a1
PassDevelop, document, and disseminate to media protection policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
MP-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the media protection policy and the associated media protection controls.
MP-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the media protection policy and procedures.
MP-1 Part c1
PassReview and update the current media protection policy and following .
MP-1 Part c2
PassReview and update the current media protection procedures and following .
MP-2
PassRestrict access to to .
MP-3 Part a
PassMark system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.
MP-3 Part b
PassExempt from marking if the media remain within .
MP-4 Part a
PassPhysically control and securely store within .
MP-4 Part b
PassProtect system media types defined in MP-4a until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
MP-5 Part a
PassProtect and control during transport outside of controlled areas using .
MP-5 Part b
PassMaintain accountability for system media during transport outside of controlled areas.
MP-5 Part c
PassDocument activities associated with the transport of system media.
MP-5 Part d
PassRestrict the activities associated with the transport of system media to authorized personnel.
MP-6(1)
PassReview, approve, track, document, and verify media sanitization and disposal actions.
MP-6(2)
PassTest sanitization equipment and procedures to ensure that the intended sanitization is being achieved.
MP-6(3)
PassApply nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the system under the following circumstances: .
MP-6 Part a
PassSanitize prior to disposal, release out of organizational control, or release for reuse using .
MP-6 Part b
PassEmploy sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
MP-7 Part a
Passthe use of on using .
MP-7 Part b
PassProhibit the use of portable storage devices in organizational systems when such devices have no identifiable owner.
PE-10 Part a
PassProvide the capability of shutting off power to in emergency situations.
PE-10 Part b
PassPlace emergency shutoff switches or devices in to facilitate access for authorized personnel.
PE-10 Part c
PassProtect emergency power shutoff capability from unauthorized activation.
PE-11
PassProvide an uninterruptible power supply to facilitate in the event of a primary power source loss.
PE-11(1)
PassProvide an alternate power supply for the system that is activated and that can maintain minimally required operational capability in the event of an extended loss of the primary power source.
PE-12
PassEmploy and maintain automatic emergency lighting for the system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
PE-13
PassEmploy and maintain fire detection and suppression systems that are supported by an independent energy source.
PE-13(1)
PassEmploy fire detection systems that activate automatically and notify and in the event of a fire.
PE-13(2) Part a
PassEmploy fire suppression systems that activate automatically and notify and .
PE-13(2) Part b
PassEmploy an automatic fire suppression capability when the facility is not staffed on a continuous basis.
PE-14(2)
PassEmploy environmental control monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment to .
PE-14 Part a
PassMaintain levels within the facility where the system resides at .
PE-14 Part b
PassMonitor environmental control levels .
PE-15
PassProtect the system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.
PE-15(1)
PassDetect the presence of water near the system and alert using .
PE-16 Part a
PassAuthorize and control entering and exiting the facility.
PE-16 Part b
PassMaintain records of the system components.
PE-17 Part a
PassDetermine and document the allowed for use by employees.
PE-17 Part b
PassEmploy the following controls at alternate work sites: .
PE-17 Part c
PassAssess the effectiveness of controls at alternate work sites.
PE-17 Part d
PassProvide a means for employees to communicate with information security and privacy personnel in case of incidents.
PE-18
PassPosition system components within the facility to minimize potential damage from and to minimize the opportunity for unauthorized access.
PE-1 Part a1
PassDevelop, document, and disseminate to physical and environmental protection policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
PE-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the physical and environmental protection policy and the associated physical and environmental protection controls.
PE-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the physical and environmental protection policy and procedures.
PE-1 Part c1
PassReview and update the current physical and environmental protection policy and following .
PE-1 Part c2
PassReview and update the current physical and environmental protection procedures and following .
PE-2(1)
PassAuthorize physical access to the facility where the system resides based on position or role.
PE-2(2)
PassRequire two forms of identification from the following forms of identification for visitor access to the facility where the system resides: .
PE-2(3)
PassRestrict unescorted access to the facility where the system resides to personnel with .
PE-2 Part a
PassDevelop, approve, and maintain a list of individuals with authorized access to the facility where the system resides.
PE-2 Part b
PassIssue authorization credentials for facility access.
PE-2 Part c
PassReview the access list detailing authorized facility access by individuals .
PE-2 Part d
PassRemove individuals from the facility access list when access is no longer required.
PE-3(1)
PassEnforce physical access authorizations to the system in addition to the physical access controls for the facility at .
PE-3(2)
PassPerform security checks at the physical perimeter of the facility or system for exfiltration of information or removal of system components.
PE-3(3)
PassEmploy guards to control to the facility where the system resides 24 hours per day, 7 days per week.
PE-3 Part a
PassEnforce physical access authorizations at by: 1. verifying individual access authorizations before granting access to the facility; and 2. controlling ingress and egress to the facility using .
PE-3 Part b
PassMaintain physical access audit logs for .
PE-3 Part c
PassControl access to areas within the facility designated as publicly accessible by implementing the following controls: .
PE-3 Part d
PassEscort visitors and control visitor activity .
PE-3 Part e
PassSecure keys, combinations, and other physical access devices.
PE-3 Part f
PassInventory every .
PE-3 Part g
PassChange combinations and keys and/or when keys are lost, combinations are compromised, or when individuals possessing the keys or combinations are transferred or terminated.
PE-4
PassControl physical access to within organizational facilities using .
PE-5
PassControl physical access to output from to prevent unauthorized individuals from obtaining the output.
PE-6(1)
PassMonitor physical access to the facility where the system resides using physical intrusion alarms and surveillance equipment.
PE-6(2)
PassRecognize and initiate using .
PE-6(3) Part a
PassEmploy video surveillance of .
PE-6(3) Part b
PassReview video recordings .
PE-6(3) Part c
PassRetain video recordings for .
PE-6(4)
PassMonitor physical access to the system in addition to the physical access monitoring of the facility at .
PE-6 Part a
PassMonitor physical access to the facility where the system resides to detect and respond to physical security incidents.
PE-6 Part b
PassReview physical access logs and upon occurrence of .
PE-6 Part c
PassCoordinate results of reviews and investigations with the organizational incident response capability.
PE-8(1)
PassMaintain and review visitor access records using .
PE-8 Part a
PassMaintain visitor access records to the facility where the system resides for .
PE-8 Part b
PassReview visitor access records .
PE-8 Part c
PassReport anomalies in visitor access records to .
PE-9
PassProtect power equipment and power cabling for the system from damage and destruction.
PL-10
PassSelect a control baseline for the system.
PL-11
PassTailor the selected control baseline by applying specified tailoring actions.
PL-1 Part a1
PassDevelop, document, and disseminate to planning policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
PL-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the planning policy and the associated planning controls.
PL-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the planning policy and procedures.
PL-1 Part c1
PassReview and update the current planning policy and following .
PL-1 Part c2
PassReview and update the current planning procedures and following .
PL-2 Part a
PassDevelop security and privacy plans for the system that: 1. are consistent with the organization’s enterprise architecture; 2. explicitly define the constituent system components; 3. describe the operational context of the system in terms of mission and business processes; 4. identify the individuals that fulfill system roles and responsibilities; 5. identify the information types processed, stored, and transmitted by the system; 6. provide the security categorization of the system, including supporting rationale; 7. describe any specific threats to the system that are of concern to the organization; 8. provide the results of a privacy risk assessment for systems processing personally identifiable information; 9. describe the operational environment for the system and any dependencies on or connections to other systems or system components; 10. provide an overview of the security and privacy requirements for the system; 11. identify any relevant control baselines or overlays, if applicable; 12. describe the controls in place or planned for meeting the security and privacy requirements, including a rationale for any tailoring decisions; 13. include risk determinations for security and privacy architecture and design decisions; 14. include security- and privacy-related activities affecting the system that require planning and coordination with ; and 15. are reviewed and approved by the authorizing official or designated representative prior to plan implementation.
PL-2 Part b
PassDistribute copies of the plans and communicate subsequent changes to the plans to .
PL-2 Part c
PassReview the plans .
PL-2 Part d
PassUpdate the plans to address changes to the system and environment of operation or problems identified during plan implementation or control assessments.
PL-2 Part e
PassProtect the plans from unauthorized disclosure and modification.
PL-4(1) Part a
PassInclude in the rules of behavior, restrictions on use of social media, social networking sites, and external sites/applications.
PL-4(1) Part b
PassInclude in the rules of behavior, restrictions on posting organizational information on public websites.
PL-4(1) Part c
PassInclude in the rules of behavior, restrictions on use of organization-provided identifiers (e.g., email addresses) and authentication secrets (e.g., passwords) for creating accounts on external sites/applications.
PL-4 Part a
PassEstablish and provide to individuals requiring access to the system, the rules that describe their responsibilities and expected behavior for information and system usage, security, and privacy.
PL-4 Part b
PassReceive a documented acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the system.
PL-4 Part c
PassReview and update the rules of behavior .
PL-4 Part d
PassRequire individuals who have acknowledged a previous version of the rules of behavior to read and re-acknowledge .
PL-8 Part a
PassDevelop security and privacy architectures for the system that: 1. describe the requirements and approach to be taken for protecting the confidentiality, integrity, and availability of organizational information; 2. describe the requirements and approach to be taken for processing personally identifiable information to minimize privacy risk to individuals; 3. describe how the architectures are integrated into and support the enterprise architecture; and 4. describe any assumptions about, and dependencies on, external systems and services.
PL-8 Part b
PassReview and update the architectures to reflect changes in the enterprise architecture.
PL-8 Part c
PassReflect planned architecture changes in security and privacy plans, Concept of Operations (CONOPS), criticality analysis, organizational procedures, and procurements and acquisitions.
PS-1 Part a1
PassDevelop, document, and disseminate to personnel security policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
PS-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the personnel security policy and the associated personnel security controls.
PS-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the personnel security policy and procedures.
PS-1 Part c1
PassReview and update the current personnel security policy and following .
PS-1 Part c2
PassReview and update the current personnel security procedures and following .
PS-2 Part a
PassAssign a risk designation to all organizational positions.
PS-2 Part b
PassEstablish screening criteria for individuals filling those positions.
PS-2 Part c
PassReview and update position risk designations .
PS-3(3) Part a
PassVerify that individuals accessing a system processing, storing, or transmitting information requiring special protection have valid access authorizations that are demonstrated by assigned official government duties.
PS-3(3) Part b
PassVerify that individuals accessing a system processing, storing, or transmitting information requiring special protection satisfy .
PS-3 Part a
PassScreen individuals prior to authorizing access to the system.
PS-3 Part b
PassRescreen individuals in accordance with .
PS-4(2)
PassUse to .
PS-4 Part a
PassUpon termination of individual employment disable system access within .
PS-4 Part b
PassUpon termination of individual employment terminate or revoke any authenticators and credentials associated with the individual.
PS-4 Part c
PassUpon termination of individual employment conduct exit interviews that include a discussion of .
PS-4 Part d
PassUpon termination of individual employment retrieve all security-related organizational system-related property.
PS-4 Part e
PassUpon termination of individual employment retain access to organizational information and systems formerly controlled by terminated individual.
PS-5 Part a
PassReview and confirm ongoing operational need for current logical and physical access authorizations to systems and facilities when individuals are reassigned or transferred to other positions within the organization.
PS-5 Part b
PassInitiate within .
PS-5 Part c
PassModify access authorization as needed to correspond with any changes in operational need due to reassignment or transfer.
PS-5 Part d
PassNotify within .
PS-6 Part a
PassDevelop and document access agreements for organizational systems.
PS-6 Part b
PassReview and update the access agreements .
PS-6 Part c
PassVerify that individuals requiring access to organizational information and systems: 1. sign appropriate access agreements prior to being granted access; and 2. re-sign access agreements to maintain access to organizational systems when access agreements have been updated or .
PS-7 Part a
PassEstablish personnel security requirements, including security roles and responsibilities for external providers.
PS-7 Part b
PassRequire external providers to comply with personnel security policies and procedures established by the organization.
PS-7 Part c
PassDocument personnel security requirements.
PS-7 Part d
PassRequire external providers to notify of any personnel transfers or terminations of external personnel who possess organizational credentials and/or badges, or who have system privileges within .
PS-7 Part e
PassMonitor provider compliance with personnel security requirements.
PS-8 Part a
PassEmploy a formal sanctions process for individuals failing to comply with established information security and privacy policies and procedures.
PS-8 Part b
PassNotify within when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
PS-9
PassIncorporate security and privacy roles and responsibilities into organizational position descriptions.
RA-1 Part a1
PassDevelop, document, and disseminate to risk assessment policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
RA-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the risk assessment policy and the associated risk assessment controls.
RA-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the risk assessment policy and procedures.
RA-1 Part c1
PassReview and update the current risk assessment policy and following .
RA-1 Part c2
PassReview and update the current risk assessment procedures and following .
RA-2 Part a
PassCategorize the system and information it processes, stores, and transmits.
RA-2 Part b
PassDocument the security categorization results, including supporting rationale, in the security plan for the system.
RA-2 Part c
PassVerify that the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
RA-3(1) Part a
PassAssess supply chain risks associated with .
RA-3(1) Part b
PassUpdate the supply chain risk assessment , when there are significant changes to the relevant supply chain, or when changes to the system, environments of operation, or other conditions may necessitate a change in the supply chain.
RA-3 Part a
PassConduct a risk assessment, including: 1. identifying threats to and vulnerabilities in the system; 2. determining the likelihood and magnitude of harm from unauthorized access, use, disclosure, disruption, modification, or destruction of the system, the information it processes, stores, or transmits, and any related information; and 3. determining the likelihood and impact of adverse effects on individuals arising from the processing of personally identifiable information.
RA-3 Part b
PassIntegrate risk assessment results and risk management decisions from the organization and mission or business process perspectives with system-level risk assessments.
RA-3 Part c
PassDocument risk assessment results in .
RA-3 Part d
PassReview risk assessment results .
RA-3 Part e
PassDisseminate risk assessment results to .
RA-3 Part f
PassUpdate the risk assessment or when there are significant changes to the system, its environment of operation, or other conditions that may impact the security or privacy state of the system.
RA-5(11)
PassEstablish a public reporting channel for receiving reports of vulnerabilities in organizational systems and system components.
RA-5(2)
PassUpdate the system vulnerabilities to be scanned .
RA-5(3)
PassDefine the breadth and depth of vulnerability scanning coverage.
RA-5(4)
PassDetermine information about the system that is discoverable and take .
RA-5(5)
PassImplement privileged access authorization to for .
RA-5(8)
PassReview historic audit logs to determine if a vulnerability identified in a has been previously exploited within an .
RA-5 Part a
PassMonitor and scan for vulnerabilities in the system and hosted applications and when new vulnerabilities potentially affecting the system are identified and reported.
RA-5 Part b
PassEmploy vulnerability monitoring tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: 1. enumerating platforms, software flaws, and improper configurations; 2. formatting checklists and test procedures; and 3. measuring vulnerability impact.
RA-5 Part c
PassAnalyze vulnerability scan reports and results from vulnerability monitoring.
RA-5 Part d
PassRemediate legitimate vulnerabilities in accordance with an organizational assessment of risk.
RA-5 Part e
PassShare information obtained from the vulnerability monitoring process and control assessments with to help eliminate similar vulnerabilities in other systems.
RA-5 Part f
PassEmploy vulnerability monitoring tools that include the capability to readily update the vulnerabilities to be scanned.
RA-7
PassRespond to findings from security and privacy assessments, monitoring, and audits in accordance with organizational risk tolerance.
RA-9
PassIdentify critical system components and functions by performing a criticality analysis for at .
SA-10 Part a
PassRequire the developer of the system, system component, or system service to perform configuration management during system, component, or service .
SA-10 Part b
PassRequire the developer of the system, system component, or system service to document, manage, and control the integrity of changes to .
SA-10 Part c
PassRequire the developer of the system, system component, or system service to implement only organization-approved changes to the system, component, or service.
SA-10 Part d
PassRequire the developer of the system, system component, or system service to document approved changes to the system, component, or service and the potential security and privacy impacts of such changes.
SA-10 Part e
PassRequire the developer of the system, system component, or system service to track security flaws and flaw resolution within the system, component, or service and report findings to .
SA-11(1)
PassRequire the developer of the system, system component, or system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
SA-11(2) Part a
PassRequire the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that uses the following contextual information: .
SA-11(2) Part b
PassRequire the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that employs the following tools and methods: .
SA-11(2) Part c
PassRequire the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that conducts the modeling and analyses at the following level of rigor: .
SA-11(2) Part d
PassRequire the developer of the system, system component, or system service to perform threat modeling and vulnerability analyses during development and the subsequent testing and evaluation of the system, component, or service that produces evidence that meets the following acceptance criteria: .
SA-11 Part a
PassRequire the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to develop and implement a plan for ongoing security and privacy control assessments.
SA-11 Part b
PassRequire the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to perform testing/evaluation at .
SA-11 Part c
PassRequire the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to produce evidence of the execution of the assessment plan and the results of the testing and evaluation.
SA-11 Part d
PassRequire the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to implement a verifiable flaw remediation process.
SA-11 Part e
PassRequire the developer of the system, system component, or system service, at all post-design stages of the system development life cycle, to correct flaws identified during testing and evaluation.
SA-15(3) Part a
PassRequire the developer of the system, system component, or system service to perform a criticality analysis at the following decision points in the system development life cycle: .
SA-15(3) Part b
PassRequire the developer of the system, system component, or system service to perform a criticality analysis at the following level of rigor: .
SA-15 Part a
PassRequire the developer of the system, system component, or system service to follow a documented development process that: 1. explicitly addresses security and privacy requirements; 2. identifies the standards and tools used in the development process; 3. documents the specific tool options and tool configurations used in the development process; and 4. documents, manages, and ensures the integrity of changes to the process and/or tools used in development.
SA-15 Part b
PassReview the development process, standards, tools, tool options, and tool configurations to determine if the process, standards, tools, tool options and tool configurations selected and employed can satisfy the following security and privacy requirements: .
SA-16
PassRequire the developer of the system, system component, or system service to provide the following training on the correct use and operation of the implemented security and privacy functions, controls, and/or mechanisms: .
SA-17 Part a
PassRequire the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that is consistent with the organization’s security and privacy architecture that is an integral part the organization’s enterprise architecture.
SA-17 Part b
PassRequire the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that accurately and completely describes the required security and privacy functionality, and the allocation of controls among physical and logical components.
SA-17 Part c
PassRequire the developer of the system, system component, or system service to produce a design specification and security and privacy architecture that expresses how individual security and privacy functions, mechanisms, and services work together to provide required security and privacy capabilities and a unified approach to protection.
SA-1 Part a1
PassDevelop, document, and disseminate to system and services acquisition policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
SA-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the system and services acquisition policy and the associated system and services acquisition controls.
SA-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the system and services acquisition policy and procedures.
SA-1 Part c1
PassReview and update the current system and services acquisition policy and following .
SA-1 Part c2
PassReview and update the current system and services acquisition procedures and following .
SA-21 Part a
PassRequire that the developer of has appropriate access authorizations as determined by assigned .
SA-21 Part b
PassRequire that the developer of satisfies the following additional personnel screening criteria: .
SA-22 Part a
PassReplace system components when support for the components is no longer available from the developer, vendor, or manufacturer.
SA-22 Part b
PassProvide the following options for alternative sources for continued support for unsupported components .
SA-2 Part a
PassDetermine the high-level information security and privacy requirements for the system or system service in mission and business process planning.
SA-2 Part b
PassDetermine, document, and allocate the resources required to protect the system or system service as part of the organizational capital planning and investment control process.
SA-2 Part c
PassEstablish a discrete line item for information security and privacy in organizational programming and budgeting documentation.
SA-3 Part a
PassAcquire, develop, and manage the system using that incorporates information security and privacy considerations.
SA-3 Part b
PassDefine and document information security and privacy roles and responsibilities throughout the system development life cycle.
SA-3 Part c
PassIdentify individuals having information security and privacy roles and responsibilities.
SA-3 Part d
PassIntegrate the organizational information security and privacy risk management process into system development life cycle activities.
SA-4(1)
PassRequire the developer of the system, system component, or system service to provide a description of the functional properties of the controls to be implemented.
SA-4(10)
PassEmploy only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational systems.
SA-4(2)
PassRequire the developer of the system, system component, or system service to provide design and implementation information for the controls that includes: at .
SA-4(5) Part a
PassRequire the developer of the system, system component, or system service to deliver the system, component, or service with implemented.
SA-4(5) Part b
PassRequire the developer of the system, system component, or system service to use the configurations as the default for any subsequent system, component, or service reinstallation or upgrade.
SA-4(9)
PassRequire the developer of the system, system component, or system service to identify the functions, ports, protocols, and services intended for organizational use.
SA-4 Part a
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service security and privacy functional requirements.
SA-4 Part b
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service strength of mechanism requirements.
SA-4 Part c
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service security and privacy assurance requirements.
SA-4 Part d
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service controls needed to satisfy the security and privacy requirements.
SA-4 Part e
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service security and privacy documentation requirements.
SA-4 Part f
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service requirements for protecting security and privacy documentation.
SA-4 Part g
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service description of the system development environment and environment in which the system is intended to operate.
SA-4 Part h
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service allocation of responsibility or identification of parties responsible for information security, privacy, and supply chain risk management.
SA-4 Part i
PassInclude the following requirements, descriptions, and criteria, explicitly or by reference, using in the acquisition contract for the system, system component, or system service acceptance criteria.
SA-5 Part a
PassObtain or develop administrator documentation for the system, system component, or system service that describes: 1. secure configuration, installation, and operation of the system, component, or service; 2. effective use and maintenance of security and privacy functions and mechanisms; and 3. known vulnerabilities regarding configuration and use of administrative or privileged functions.
SA-5 Part b
PassObtain or develop user documentation for the system, system component, or system service that describes: 1. user-accessible security and privacy functions and mechanisms and how to effectively use those functions and mechanisms; 2. methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner and protect individual privacy; and 3. user responsibilities in maintaining the security of the system, component, or service and privacy of individuals.
SA-5 Part c
PassDocument attempts to obtain system, system component, or system service documentation when such documentation is either unavailable or nonexistent and take in response.
SA-5 Part d
PassDistribute documentation to .
SA-8
PassApply the following systems security and privacy engineering principles in the specification, design, development, implementation, and modification of the system and system components: .
SA-9(1) Part a
PassConduct an organizational assessment of risk prior to the acquisition or outsourcing of information security services.
SA-9(1) Part b
PassVerify that the acquisition or outsourcing of dedicated information security services is approved by .
SA-9(2)
PassRequire providers of the following external system services to identify the functions, ports, protocols, and other services required for the use of such services: .
SA-9(5)
PassRestrict the location of to based on .
SA-9 Part a
PassRequire that providers of external system services comply with organizational security and privacy requirements and employ the following controls: .
SA-9 Part b
PassDefine and document organizational oversight and user roles and responsibilities with regard to external system services.
SA-9 Part c
PassEmploy the following processes, methods, and techniques to monitor control compliance by external service providers on an ongoing basis: .
SC-10
PassTerminate the network connection associated with a communications session at the end of the session or after of inactivity.
SC-12
PassEstablish and manage cryptographic keys when cryptography is employed within the system in accordance with the following key management requirements: .
SC-12(1)
PassMaintain availability of information in the event of the loss of cryptographic keys by users.
SC-13 Part a
PassDetermine the .
SC-13 Part b
PassImplement the following types of cryptography required for each specified cryptographic use: .
SC-15 Part a
PassProhibit remote activation of collaborative computing devices and applications with the following exceptions: .
SC-15 Part b
PassProvide an explicit indication of use to users physically present at the devices.
SC-17 Part a
PassIssue public key certificates under an or obtain public key certificates from an approved service provider.
SC-17 Part b
PassInclude only approved trust anchors in trust stores or certificate stores managed by the organization.
SC-18 Part a
PassDefine acceptable and unacceptable mobile code and mobile code technologies.
SC-18 Part b
PassAuthorize, monitor, and control the use of mobile code within the system.
SC-1 Part a1
PassDevelop, document, and disseminate to system and communications protection policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
SC-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the system and communications protection policy and the associated system and communications protection controls.
SC-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the system and communications protection policy and procedures.
SC-1 Part c1
PassReview and update the current system and communications protection policy and following .
SC-1 Part c2
PassReview and update the current system and communications protection procedures and following .
SC-2
PassSeparate user functionality, including user interface services, from system management functionality.
SC-20 Part a
PassProvide additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
SC-20 Part b
PassProvide the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
SC-21
PassRequest and perform data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-22
PassEnsure the systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal and external role separation.
SC-23
PassProtect the authenticity of communications sessions.
SC-24
PassFail to a for the following failures on the indicated components while preserving in failure: .
SC-28
PassProtect the of the following information at rest: .
SC-28(1)
PassImplement cryptographic mechanisms to prevent unauthorized disclosure and modification of the following information at rest on : .
SC-3
PassIsolate security functions from nonsecurity functions.
SC-39
PassMaintain a separate execution domain for each executing system process.
SC-4
PassPrevent unauthorized and unintended information transfer via shared system resources.
SC-45
PassSynchronize system clocks within and between systems and system components.
SC-45(1) Part a
PassCompare the internal system clocks with .
SC-45(1) Part b
PassSynchronize the internal system clocks to the authoritative time source when the time difference is greater than .
SC-5 Part a
Passthe effects of the following types of denial-of-service events: .
SC-5 Part b
PassEmploy the following controls to achieve the denial-of-service objective: .
SC-7(10) Part a
PassPrevent the exfiltration of information.
SC-7(10) Part b
PassConduct exfiltration tests .
SC-7(12)
PassImplement at .
SC-7(18)
PassPrevent systems from entering unsecure states in the event of an operational failure of a boundary protection device.
SC-7(20)
PassProvide the capability to dynamically isolate from other system components.
SC-7(21)
PassEmploy boundary protection mechanisms to isolate supporting .
SC-7(3)
PassLimit the number of external network connections to the system.
SC-7(4) Part a
PassImplement a managed interface for each external telecommunication service.
SC-7(4) Part b
PassEstablish a traffic flow policy for each managed interface.
SC-7(4) Part c
PassProtect the confidentiality and integrity of the information being transmitted across each interface.
SC-7(4) Part d
PassDocument each exception to the traffic flow policy with a supporting mission or business need and duration of that need.
SC-7(4) Part e
PassReview exceptions to the traffic flow policy and remove exceptions that are no longer supported by an explicit mission or business need.
SC-7(4) Part f
PassPrevent unauthorized exchange of control plane traffic with external networks.
SC-7(4) Part g
PassPublish information to enable remote networks to detect unauthorized control plane traffic from internal networks.
SC-7(4) Part h
PassFilter unauthorized control plane traffic from external networks.
SC-7(5)
PassDeny network communications traffic by default and allow network communications traffic by exception .
SC-7(7)
PassPrevent split tunneling for remote devices connecting to organizational systems unless the split tunnel is securely provisioned using .
SC-7(8)
PassRoute to through authenticated proxy servers at managed interfaces.
SC-7 Part a
PassMonitor and control communications at the external managed interfaces to the system and at key internal managed interfaces within the system.
SC-7 Part b
PassImplement subnetworks for publicly accessible system components that are separated from internal organizational networks.
SC-7 Part c
PassConnect to external networks or systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security and privacy architecture.
SC-8
PassProtect the of transmitted information.
SC-8(1)
PassImplement cryptographic mechanisms to during transmission.
SC-8(5)
PassImplement to during transmission.
SI-10
PassCheck the validity of the following information inputs: .
SI-11 Part a
PassGenerate error messages that provide information necessary for corrective actions without revealing information that could be exploited.
SI-11 Part b
PassReveal error messages only to .
SI-12
PassManage and retain information within the system and information output from the system in accordance with applicable laws, executive orders, directives, regulations, policies, standards, guidelines and operational requirements.
SI-16
PassImplement the following controls to protect the system memory from unauthorized code execution: .
SI-1 Part a1
PassDevelop, document, and disseminate to system and information integrity policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
SI-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the system and information integrity policy and the associated system and information integrity controls.
SI-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the system and information integrity policy and procedures.
SI-1 Part c1
PassReview and update the current system and information integrity policy and following .
SI-1 Part c2
PassReview and update the current system and information integrity procedures and following .
SI-2(2)
PassDetermine if system components have applicable security-relevant software and firmware updates installed using .
SI-2(3) Part a
PassMeasure the time between flaw identification and flaw remediation.
SI-2(3) Part b
PassEstablish the following benchmarks for taking corrective actions: .
SI-2 Part a
PassIdentify, report, and correct system flaws.
SI-2 Part b
PassTest software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation.
SI-2 Part c
PassInstall security-relevant software and firmware updates within of the release of the updates.
SI-2 Part d
PassIncorporate flaw remediation into the organizational configuration management process.
SI-3 Part a
PassImplement malicious code protection mechanisms at system entry and exit points to detect and eradicate malicious code.
SI-3 Part b
PassAutomatically update malicious code protection mechanisms as new releases are available in accordance with organizational configuration management policy and procedures.
SI-3 Part c
PassConfigure malicious code protection mechanisms to: 1. perform periodic scans of the system and real-time scans of files from external sources at as the files are downloaded, opened, or executed in accordance with organizational policy; and 2. ; and send alert to in response to malicious code detection.
SI-3 Part d
PassAddress the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the system.
SI-4(1)
PassConnect and configure individual intrusion detection tools into a system-wide intrusion detection system.
SI-4(10)
PassMake provisions so that is visible to .
SI-4(11)
PassAnalyze outbound communications traffic at the external interfaces to the system and selected to discover anomalies.
SI-4(12)
PassAlert using when the following indications of inappropriate or unusual activities with security or privacy implications occur: .
SI-4(14)
PassEmploy a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises or breaches to the system.
SI-4(16)
PassCorrelate information from monitoring tools and mechanisms employed throughout the system.
SI-4(18)
PassAnalyze outbound communications traffic at external interfaces to the system and at the following interior points to detect covert exfiltration of information: .
SI-4(19)
PassImplement of individuals who have been identified by as posing an increased level of risk.
SI-4(2)
PassEmploy automated tools and mechanisms to support near real-time analysis of events.
SI-4(20)
PassImplement the following additional monitoring of privileged users: .
SI-4(22) Part a
PassDetect network services that have not been authorized or approved by .
SI-4(22) Part b
Passwhen detected.
SI-4(23)
PassImplement the following host-based monitoring mechanisms at : .
SI-4(4) Part a
PassDetermine criteria for unusual or unauthorized activities or conditions for inbound and outbound communications traffic.
SI-4(4) Part b
PassMonitor inbound and outbound communications traffic for .
SI-4(5)
PassAlert when the following system-generated indications of compromise or potential compromise occur: .
SI-4 Part a
PassMonitor the system to detect: 1. attacks and indicators of potential attacks in accordance with the following monitoring objectives: ; and 2. unauthorized local, network, and remote connections.
SI-4 Part b
PassIdentify unauthorized use of the system through the following techniques and methods: .
SI-4 Part c
PassInvoke internal monitoring capabilities or deploy monitoring devices: 1. strategically within the system to collect organization-determined essential information; and 2. at ad hoc locations within the system to track specific types of transactions of interest to the organization.
SI-4 Part d
PassAnalyze detected events and anomalies.
SI-4 Part e
PassAdjust the level of system monitoring activity when there is a change in risk to organizational operations and assets, individuals, other organizations, or the Nation.
SI-4 Part f
PassObtain legal opinion regarding system monitoring activities.
SI-4 Part g
PassProvide to .
SI-5(1)
PassBroadcast security alert and advisory information throughout the organization using .
SI-5 Part a
PassReceive system security alerts, advisories, and directives from on an ongoing basis.
SI-5 Part b
PassGenerate internal security alerts, advisories, and directives as deemed necessary.
SI-5 Part c
PassDisseminate security alerts, advisories, and directives to: .
SI-5 Part d
PassImplement security directives in accordance with established time frames, or notify the issuing organization of the degree of noncompliance.
SI-6 Part a
PassVerify the correct operation of .
SI-6 Part b
PassPerform the verification of the functions specified in SI-6a .
SI-6 Part c
PassAlert to failed security and privacy verification tests.
SI-6 Part d
Passwhen anomalies are discovered.
SI-7(1)
PassPerform an integrity check of .
SI-7(15)
PassImplement cryptographic mechanisms to authenticate the following software or firmware components prior to installation: .
SI-7(2)
PassEmploy automated tools that provide notification to upon discovering discrepancies during integrity verification.
SI-7(5)
PassAutomatically when integrity violations are discovered.
SI-7(7)
PassIncorporate the detection of the following unauthorized changes into the organizational incident response capability: .
SI-7 Part a
PassEmploy integrity verification tools to detect unauthorized changes to the following software, firmware, and information: .
SI-7 Part b
PassTake the following actions when unauthorized changes to the software, firmware, and information are detected: .
SI-8(2)
PassAutomatically update spam protection mechanisms .
SI-8 Part a
PassEmploy spam protection mechanisms at system entry and exit points to detect and act on unsolicited messages.
SI-8 Part b
PassUpdate spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
SR-10
PassInspect the following systems or system components to detect tampering: .
SR-11(1)
PassTrain to detect counterfeit system components (including hardware, software, and firmware).
SR-11(2)
PassMaintain configuration control over the following system components awaiting service or repair and serviced or repaired components awaiting return to service: .
SR-11 Part a
PassDevelop and implement anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the system.
SR-11 Part b
PassReport counterfeit system components to .
SR-12
PassDispose of using the following techniques and methods: .
SR-1 Part a1
PassDevelop, document, and disseminate to supply chain risk management policy that: (a) addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and (b) is consistent with applicable laws, executive orders, directives, regulations, policies, standards, and guidelines.
SR-1 Part a2
PassDevelop, document, and disseminate to procedures to facilitate the implementation of the supply chain risk management policy and the associated supply chain risk management controls.
SR-1 Part b
PassDesignate an to manage the development, documentation, and dissemination of the supply chain risk management policy and procedures.
SR-1 Part c1
PassReview and update the current supply chain risk management policy and following .
SR-1 Part c2
PassReview and update the current supply chain risk management procedures and following .
SR-2(1)
PassEstablish a supply chain risk management team consisting of to lead and support the following SCRM activities: .
SR-2 Part a
PassDevelop a plan for managing supply chain risks associated with the research and development, design, manufacturing, acquisition, delivery, integration, operations and maintenance, and disposal of the following systems, system components or system services: .
SR-2 Part b
PassReview and update the supply chain risk management plan or as required, to address threat, organizational or environmental changes.
SR-2 Part c
PassProtect the supply chain risk management plan from unauthorized disclosure and modification.
SR-3 Part a
PassEstablish a process or processes to identify and address weaknesses or deficiencies in the supply chain elements and processes of in coordination with .
SR-3 Part b
PassEmploy the following controls to protect against supply chain risks to the system, system component, or system service and to limit the harm or consequences from supply chain-related events: .
SR-3 Part c
PassDocument the selected and implemented supply chain processes and controls in .
SR-5
PassEmploy the following acquisition strategies, contract tools, and procurement methods to protect against, identify, and mitigate supply chain risks: .
SR-6
PassAssess and review the supply chain-related risks associated with suppliers or contractors and the system, system component, or system service they provide .
SR-8
PassEstablish agreements and procedures with entities involved in the supply chain for the system, system component, or system service for the .
SR-9
PassImplement a tamper protection program for the system, system component, or system service.
SR-9(1)
PassEmploy anti-tamper technologies, tools, and techniques throughout the system development life cycle.