From 6099ce5c818f03616b1516daa5206dc8d2b8fa96 Mon Sep 17 00:00:00 2001 From: Wendell Piez Date: Tue, 27 Aug 2019 16:15:37 -0400 Subject: [PATCH] Cleanup of models and data (#476) * Schematron now reports duplicate definitions in a Metaschema as an error: see #465, #475 * Catalog metaschema and SP800-53 catalog adjustments renaming 'subcontrol' to 'control' per Issue #473 * Refactored metaschemas to avoid definition clashes; more/better Schematron to detect such clashes * Adding new module now required by catalog and profile metaschemas * Revising profiles to be valid to newly revised schema (no more references to subcontrol elements only controls) * Bug fix in Metaschema Schematron * Delete FedRAMP_HIGH-baseline_profile.xml * Delete FedRAMP_LOW-baseline_profile.xml * Delete FedRAMP_MODERATE-baseline_profile.xml * Create temp.txt * Revised FedRAMP Profiles These files include revisions to the FedRAMP baselines, plus a small FedRAMP catalog that provides three subcontrols added by FedRAMP. * Delete temp.txt * moved updated fedramp content to correct location * New and improved FedRAMP profiles * Repaired broken markdown conversion; added missing title content to FedRAMP catalog * add note about b -> strong and i -> em (#9) * Changed inline markup in FedRAMP profiles for lossless conversion * One more adjustment in Markdown->XML conversion (images) * One more time (cleaning up cleanup) --- build/metaschema/json/md-oscal-converter.xsl | 59 +- build/metaschema/lib/metaschema-check.sch | 7 +- .../documentation/schemas/datatypes.md | 2 + .../xml/FedRAMP_HIGH-baseline_profile.xml | 4270 ++++------------- .../xml/FedRAMP_LOW-baseline_profile.xml | 458 +- .../xml/FedRAMP_MODERATE-baseline_profile.xml | 1224 +++-- .../fedramp.gov/xml/FedRAMP_catalog.xml | 97 + ...T_SP-800-53_rev4_HIGH-baseline_profile.xml | 346 +- ...ST_SP-800-53_rev4_LOW-baseline_profile.xml | 18 +- ...-800-53_rev4_MODERATE-baseline_profile.xml | 204 +- .../rev4/xml/NIST_SP-800-53_rev4_catalog.xml | 2668 +++++----- src/metaschema/oscal_catalog_metaschema.xml | 187 +- .../oscal_control_common_metaschema.xml | 190 + ...oscal_implementation-common_metaschema.xml | 6 +- src/metaschema/oscal_profile_metaschema.xml | 160 +- 15 files changed, 4064 insertions(+), 5832 deletions(-) create mode 100644 src/content/fedramp.gov/xml/FedRAMP_catalog.xml create mode 100644 src/metaschema/oscal_control_common_metaschema.xml diff --git a/build/metaschema/json/md-oscal-converter.xsl b/build/metaschema/json/md-oscal-converter.xsl index 52bb262fab..0f1c97eeb8 100644 --- a/build/metaschema/json/md-oscal-converter.xsl +++ b/build/metaschema/json/md-oscal-converter.xsl @@ -11,6 +11,7 @@ http://csrc.nist.gov/ns/oscal/1.0 + @@ -85,10 +86,12 @@ - + + + @@ -239,10 +242,11 @@ - - - - + + + + + @@ -269,7 +273,7 @@ - + @@ -363,10 +367,10 @@ "" - !\[{{$text}}\] + !\[{{$noclosebracket}}\] - \(\) + \(\) `` \*\*\*\*\*\* @@ -402,6 +406,14 @@ + + + + + + + + @@ -435,6 +447,16 @@ (.*?) + + ([^{ @not }]*?) + + + + { insertion } @@ -448,10 +470,11 @@ Paragraph, \n\nand new paragraph Bit of `code` here and there, such as one might have along with *italics*. no insertion here: { ac-4.4_prm_2 } - + +An anchor looks like [this](this.file) or [that](that.file) Extra long x - y and z + y and z **strong** and **bold** Here's a text with a *parameter* insertion: {{ insert }} @@ -465,7 +488,7 @@ And many paragraphs! * One item in a list, with "quoted text" * Another item in a list * Sublist - * subsublist + * subsublist * Item three ```xml @@ -474,6 +497,8 @@ And many paragraphs! ... select ...> ``` +Some paragraphs have ![images](http://www.links.com) in them, sometimes ![many](../many/links) + And Prose! ``` @@ -496,10 +521,14 @@ And stuff.

Here's a markdown string.

-

This `string should *break` (overlap)*

-

`code` may occasionally turn up `in the middle`.

-

Here's a ***really interesting*** markdown string.

-

Some paragraphs might have [links elsewhere](https://link.org).

+ +

This `string should *break` (overlap)*

+ +

`code` may occasionally turn up `in the middle`.

+ +

Here's a ***really interesting*** markdown string.

+ +

Some paragraphs might have [links elsewhere](https://link.org).

\ No newline at end of file diff --git a/build/metaschema/lib/metaschema-check.sch b/build/metaschema/lib/metaschema-check.sch index 222bec1bba..fc57141527 100644 --- a/build/metaschema/lib/metaschema-check.sch +++ b/build/metaschema/lib/metaschema-check.sch @@ -20,7 +20,6 @@ - @@ -37,9 +36,10 @@ - - Definition for '' is not unique in this metaschema module (only the last one found will be used) + + + Definition for '' is not unique in this metaschema; cf . formal-name missing from description missing from model missing from @@ -47,7 +47,6 @@ is assigned a json key, but no 'json-key' is given Names "STRVALUE", "RICHTEXT" or "PROSE" (reserved names) - diff --git a/docs/content/documentation/schemas/datatypes.md b/docs/content/documentation/schemas/datatypes.md index 81ca716446..ed85acbdf1 100644 --- a/docs/content/documentation/schemas/datatypes.md +++ b/docs/content/documentation/schemas/datatypes.md @@ -358,6 +358,8 @@ The following table describes the equavalent constructs in HTML and Markdown use | Ordered List Item | <ol><li>*text*</li></ol> | 1. *text* | Unordered List Item | <ul><li>*text*</li></ul> | - *text* +Note: Markdown does not have an equivalent of the HTML <i> and <b> tags, which indicate italics and bold respectively. These concepts are mapped in OSCAL markup text to <em> and <strong> [common mark](https://spec.commonmark.org/0.29/#emphasis-and-strong-emphasis), which render equivalently in browsers, but do not have exactly the same semantics. While this mapping is imperfect, it represents the common uses of these HTML tags. + #### Parameter Insertion The OSCAL catalog, profile, and implementation layer models allow for control parameters to be defined and injected into prose text. diff --git a/src/content/fedramp.gov/xml/FedRAMP_HIGH-baseline_profile.xml b/src/content/fedramp.gov/xml/FedRAMP_HIGH-baseline_profile.xml index c9dc8ac573..9d97777652 100644 --- a/src/content/fedramp.gov/xml/FedRAMP_HIGH-baseline_profile.xml +++ b/src/content/fedramp.gov/xml/FedRAMP_HIGH-baseline_profile.xml @@ -15,262 +15,309 @@ - + - - - - - - + + + + + + + + + + + + + - - - - - - + + + + + + + + + - + + - - - - + + + + + - - - + + + + - + - - + + - + + + - + - - + + - - + + - - - - + + + + + + + - + - + - - - + + + - - + + - - + + + - + + - + + + - - - - + + + + - - + + + + - + - - - + + + + - - + + - - - + + + - - - - - + + + + + + + - - - - - - + + + + + + - + - - + + - - - + + + - - - - + + + + - - - - + + + + - - - - + + + + - - + + - - - - - - - - + + + + + + + + + + - - - - + + + + + + + + + - - - - + + + + - - + + - + - - + + + + + + - + - + - + + + + + + + - + - - - + + + - - + + + - + - + - - - + + + - + - + - - + + - + - + - - - + + + + - + - + - + + - + @@ -279,24 +326,36 @@ - - - - + + + + + + + + - - - - + + + + + - + + + + + + + + @@ -306,19 +365,26 @@ + - - - - - - - + + + + + + + + + + + - + - + + + @@ -328,123 +394,65 @@ + + - - + + + - - + + + - - - + + + + + + + + + + + + + - + - - - - - + + + + + - - + + + + - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + - + + + true + @@ -488,9 +496,6 @@ - - at a minimum, the ISSO and/or similar role within the organization - at a minimum, the ISSO and/or similar role within the organization @@ -537,11 +542,8 @@ fifteen (15) minutes - - locks the account/node for a minimum of three (3) hours or until unlocked by an administrator - - a minimum of three (3) hours + locks the account/node for a minimum of three (3) hours or until unlocked by an administrator @@ -669,11 +671,8 @@ - - Selection (one or more): vulnerability scanning information; performance data; information system monitoring information; penetration test data; [Organization -defined data/information collected from other sources] - - Organization -defined data/information collected from other sources + Possibly to include penetration test data. @@ -692,7 +691,7 @@ At least hourly - http://tfnistgov/tf-cgi/serverscgi + http://tf.nist.gov/tf-cgi/servers.cgi @@ -713,16 +712,10 @@ all information system and network components where audit capability is deployed/available - - all information system and network components where audit capability is deployed/available - all network, data storage, and computing devices - - all network, data storage, and computing devices - service provider-defined individuals or roles with audit configuration responsibilities @@ -795,9 +788,6 @@ at least annually - - at least annually - @@ -846,9 +836,6 @@ at least every thirty (30) days - - at least every thirty (30) days - @@ -1012,19 +999,10 @@ contractors; foreign nationals] - - to include sixty (60) days for passwords - - - case sensitive, minimum of fourteen (14) characters, and at least one (1) each of upper-case letters, lower-case letters, numbers, and special characters - at least fifty percent (50%) - - one (1) day minimum, sixty (60) day maximum - twenty four (24) @@ -1175,7 +1153,7 @@ - techniques and procedures IAW NIST SP 800-88 and Section 5.9: Reuse and Disposal of Storage Media and Hardware + techniques and procedures IAW NIST SP 800-88 R1, Appendix A - Minimum Sanitization Recommendations @@ -1359,7 +1337,7 @@ monthly operating system/infrastructure; monthly web applications and databases - high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery + high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery @@ -1465,7 +1443,7 @@ - at least every ninety (90) days or whenever there is a change in the threat environment that warrants a review of the exceptions] + at least every ninety (90) days or whenever there is a change in the threat environment that warrants a review of the exceptions @@ -1615,3680 +1593,1290 @@ - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the JAB/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.

+ + + + AC-2 (3) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the JAB/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Should use a shorter timeframe than AC-12.

+ + + + AC-2 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

Should use a shorter timeframe than AC-12.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Required if shared/group accounts are deployed

+ + + + AC-2 (9) Additional FedRAMP Requirements and Guidance + + Guidance: +

Required if shared/group accounts are deployed

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Required if shared/group accounts are deployed

+ + + + AC-2 (10) Additional FedRAMP Requirements and Guidance + + Guidance: +

Required if shared/group accounts are deployed

+
- - - -

NIST added this control to the NIST High Baseline during the 1/15/2015

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Guidance: Required for privileged accounts.

-

(b) Guidance: Required for privileged accounts.

+ + + + AC-2 (12) Additional FedRAMP Requirements and Guidance + + (a) Guidance: +

Required for privileged accounts.

+
+ + (b) Guidance: +

Required for privileged accounts.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. If there is a significant high-impact risk of inadvertent or intentional data leakage with a system deployed in a shared-service environment, this control is justified to mitigate that risk. Similar justification applies when an organization needs to ensure data isolation between different types of information enclaves within the organization.

-

ANALYSIS. Although this control is usually employed to control flows between different classified enclaves, it can also apply to non-classified scenarios (e.g., the need to isolate legal, personnel, health-related, financial, or other information or files deemed sensitive.

-

SAMPLE THREAT VECTORS. Sensitive free-text information passes from the personnel department to the rest of the organization. Law-enforcement sensitive information is inadvertently pulled from the organization's general counsel case management system and passed outside the department to users without authorization to view that information. HIPAA-protected health information flows freely from the HR department to all employees. Privacy-Act information flows from an HR system into a publicly released report.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Integrity-Assured, Adaptive, Manageable, Assessed, Auditable, Regulated, Controlled, Monitored, Providing Good Data Stewardship, Assured, Competent, Confidential, Data Controllable, Access-Controlled.

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.

+ + + AC-5 Additional FedRAMP Requirements and Guidance + + Guidance: +

Guidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

+ + + + AC-6 (2) Additional FedRAMP Requirements and Guidance + + Guidance: +

Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

CSP Insider Threat mitigation; Good housekeeping and a best business practice for the protection of the CSP and customer alike. In a cloud environment, the power (and potentially harm) of the privileged users is greatly magnified because of the scale. For that reason periodic review of privileges is important.

-

Priority for adding to FedRAMP-M: HIGH

-
-
-
- - - -

This control is not part of the NIST high baseline and was added for FedRAMP at the recommendation of DoD and NIST. This is a CNSSI 1253 control.

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. If an organization's mobile devices carry information whose loss would have a high impact, this control is warranted in order to mitigate the risk of such loss.

-

ANALYSIS. The technologies associated with this control are well established COTS hardware and software.

-

SAMPLE THREAT VECTORS. Mobile device is lost, falls into the hands of people without authorization to view the information contained on the device.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Integrity-Assured, Usable, Adaptive, Manageable, Agile, Supported, Assessed, Auditable, Regulated, Controlled, Monitored, Providing Good Data Stewardship, Assured, Confidential, Data Controllable, Access-Controlled, Mission Assured.

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

-

Requirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.

-

Guidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

-

Requirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

+ + + AC-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

+
+ + Requirement: +

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

+
+ + Requirement: +

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Recommended by High Baseline Tiger Team. vulnerabilities associated with not having a logout button are well-documented.

-
- -

Guidance: https://www.owasp.org/index.php/Testing_for_logout_functionality_%28OTG-SESS-006%29

+ + + + AC-12 (1) Additional FedRAMP Requirements and Guidance + + Guidance: +

https://www.owasp.org/index.php/Testing_for_logout_functionality_%28OTG-SESS-006%29

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Rationale for Selection: Best business practice for the protection of the CSP and customer alike " when not intended for use". This is an unanticipated vector for attack if present and active. While probably not an issue with data center servers and networking devices, wireless is becoming embedded in many components and devices such as printers, fax devices, copiers, scanners, communications devices, etc. There is the additional potential that wireless capabilities may become available in air conditioners, power centers, power controllers, lighting, alarm systems, etc. There is a potential that these capabilities could exist without organizational awareness. Selection drivedsawareness. It's better to perform the check than to make assumptions about what devices are in the IS.

-

ECSB Supplemental Guidance as the C/CE relates to CSPs

-

The application of this control enchancement should include all systems and devices in the CSP facility such as printers, fax devices, copiers, scanners, communications devices, air conditioners, power centers, power controllers, lighting, alarm systems, etc. Wireless networking capabilities should be disabled when they are near or networked with systems supporting customer's services.

-

Priority for adding to FedRAMP-M: Moderate

-

(Low L1/2)

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. High-impact systems warrant significantly elevated protection; one of these elevated protections is provided through simulated no-notice attacks that exercise users' ability to detect and respond correctly to attempts to steal internal information in their possession.

-

ANALYSIS. These controls are well understood and widely installed; COTS components keep implementation time and cost low.

-

SAMPLE THREAT VECTORS. Cybersecurity staff do not know how to monitor, respond, and manage complex enforcement systems and subsystems. Cybersecurity staff is not properly trained to understand how the controls are to operate. Staff does not understand the event alarms/logs. Staff is not able to protect from unauthorized disclosure. Staff is careless with handling data, or unwilling to follow the established security protocols, or willing to cut corners to save time.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Integrity-Assured, Assessed, Auditable, Controlled, Monitored, Providing Good Data Stewardship, Assured, Competent, Confidential.

-
-
-
- - - -

NEED. High-impact systems warrant significantly elevated protection.

-

ANALYSIS. These controls are well understood and widely installed.

-

THREAT VECTORS ADDRESSED. Staff does not know how to monitor or manage complex systems in a way that supports effective management decision or control. Malicious actors manipulate the system to appear as if functioning normally when in reality, it is not. People fail to review event logs. People make unauthorized changes to event logger.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Integrity-Assured, Assessed, Auditable, Controlled, Monitored, Providing Good Data Stewardship, Assured, Competent, Confidential.

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+ + + AU-2 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.

+ + + + AU-2 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.

+ + + + AU-3 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines audit record types [FedRAMP Assignment: session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon; individual identities of group account users; full-text of privileged commands]. The audit record types are approved and accepted by the JAB/AO.

+
+ + Guidance: +

For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+ + + AU-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + + + + + + AU-6 (6) Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + + + + + + + + AU-8 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.

+
+ + Requirement: +

The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.

+
+ + Guidance: +

Synchronization of system clocks improves the accuracy of log analysis.

+
- - - - -

NEED. Due to the complexity of independent systems exchanging security-related monitoring data, and high-impact systems implemented in shared-service environments, the responsible organization needs a centralized capability that integrates these various data sources into a unified whole permitting central review and analysis of diverse log data relevant to security audits.

-

ANALYSIS. This control permits analysts and auditors to focus on their primary duty of analyzing log data, and relieves them of the usual burden of discovery, collection, validation, aggregation, and indexing of large log datasets relevant to system security. Since these latter collection tasks have been automated under this control, less time and funding will be required to execute this core audit/analysis activity.

-

SAMPLE THREAT VECTORS. Staff does not know how to monitor or manage complex systems in a way that supports effective management decision or control. Malicious actors manipulate the system to appear as if functioning normally, when it is not. People fail to review event logs. People make unauthorized changes to event logger."

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored.

+ + + + + + + + + + AU-11 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

+
- - - - -

Included in NIST High Baseline, Rev 4

+ + + + + + + + + CA-2 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/

+
- - - - -

Included in NIST High Baseline, Rev 4

-
- -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+ + + + + CA-2 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).

+
- - - - -

This control is not part of the NIST high baseline and was added for FedRAMP.

+ + + + + CA-2 (2) Additional FedRAMP Requirements and Guidance + + Requirement: +

To include 'announced', 'vulnerability scanning'

+
- - - - -

Rationale for Selection L3-6: In support of cyber security threat / incident response activities. Supports flexibility in auditing levels based on threat level. Supports CSP integration with DoD security architecture. The sensitivity of the information at levels 3-6 warrents the adjustment of auditing levels based on threat level.

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: This CE supports cyber security threat / incident response activities and flexibility in auditing levels based on threat level. This CE also supports CSP integration with DoD security architecture and the ability to respond to USCYBERCOM and DoD CNDSP alerts and directives.

-

NOTE L1/2: The handling of alerts from US-CERT and other credible sources is sufficient to change auditing activities if this CE is tailored in via an SLA.

-

NOTE: L3-6: The handling of alerts and directives from USCYBERCOM and DoD CNDSPs is required at these levels in addition to handling of alerts from US-CERTand other credible sources.

-

Priority for adding to FedRAMP-M: High

+ + + + + + + CA-3 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference Architecture document.

+
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + + + CA-3 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing

+
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + + + CA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Plan of Action & Milestones (POA&M) must be provided at least monthly.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Plan of Action & Milestones (POA&M) Template Completion Guide https://www.fedramp.gov/documents/

+
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.

-

Requirement: The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.

-

Guidance: Synchronization of system clocks improves the accuracy of log analysis.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Non-repudiation

-
-
-
- - - - -

Non-repudiation

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: For JAB Authorization, must use an accredited 3PAO.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: To include 'announced', 'vulnerability scanning'

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference Architecture document.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Requirement: POA&Ms must be provided at least monthly.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(c) Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+ + + + + CA-6(c) Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: Operating System Scans: at least monthly Database and Web Application Scans: at least monthly All scans performed by Independent Assessor: at least annually

-

Guidance: CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

-

Operating System Scans: at least monthly

-

Database and Web Application Scans: at least monthly

-

All scans performed by Independent Assessor: at least annually

+ + + CA-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.

+
+ + Guidance: +

CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. Organization requires independent data to validate that current security monitoring continues to target the right data, and that no gaps have opened between what is currently measured and what needs to be measured given the constantly evolving threat environment. In particular, the organization determines that security management will need trend analytics tuned to the current security climate to ensure the organization's security officials maintain general situational awareness of larger security trends that may pose a threat to the organization's high-impact systems fielded in shared-service environments.

-

ANALYSIS. Implementation of this control should provide security management with a technical advantage by forcing them to maintain continual current awareness of the larger security threat-scape, rather than become lost in the lower-level details of specific security metrics.

-

SAMPLE THREAT VECTORS ADDRESSED. Stakeholders do not have the information they need to make sound decisions due to technology capability. System fails to send alarms, logs, and other pertinent data to the event manager. Control processes involve too many layers of review, concurrence, and revision to support effective and timely conveyance of relevant information to decision-makers. Monitoring not effectively linked to control processes.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored, Controlled

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + CA-8 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Penetration Test Guidance https://www.FedRAMP.gov/documents/

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+ + + + CM-8 Additional FedRAMP Requirements and Guidance + + (a) Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.

-

(e) Guidance: In accordance with record retention policies and procedures.

+ + + CM-3 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.

+
+ + (e) Guidance: +

In accordance with record retention policies and procedures.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Rationale for De-Selection L1/2: The sensitivity of the information at these levels may not require a information security representative to be a member of the organization-defined configuration change control element.

-

Rationale for Selection L3-6: This is a best business practice for the protection of the CSP and customer alike in that the security representative will be more aware of IA issues that configuration changes can introduce and he/she can more easily provide IA guidance for issues spotted.

-
-
-
- - - -

Rationale for SA L1: Cryptographic mechanisms are only required at this level for priviledged user (system administrator / SA) access control and the transport of privileged commands or configuration files. Not the publicly released information served at this level.

-

Rationale for Selection L2-6: Best practice. Supplemental guidance for this CE refers primarily to the processes surrounding the management of the cryptographic mechanisms used. These processes need to be under change management that addresses security concerns to ensure they remain secure.

-

CE supplemental guidance.

-

Regardless of the cryptographic means employed (e.g., public key, private key, shared secrets), organizations ensure that there are processes and procedures in place to effectively manage those means. For example, if devices use certificates as a basis for identification and authentication, there needs to be a process in place to address the expiration of those certificates.

-

Priority for adding to FedRAMP-M: High

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized.

+ + + + CM-5 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a)-1 Requirement 1: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

-

(a)-2 Requirement 2: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).

-

(a) Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

+ + + CM-6(a) Additional FedRAMP Requirements and Guidance + + Requirement 1: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

+
+ + Requirement 2: +

The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).

+
+ + Guidance: +

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(b) Requirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

-

Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

-

(Partially derived from AC-17(8).

+ + + CM-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

+
+ + Guidance: +

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc. Partially derived from AC-17(8).

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.

+ + + + CM-7 (2) Additional FedRAMP Requirements and Guidance + + Guidance: +

This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: must be provided at least monthly or when there is a change.

+ + + CM-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

Must be provided at least monthly or when there is a change.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. High-impact systems will require special measures to ensure users cannot place the overall system at risk by installing unauthorized software. This control supports that need.

-

ANALYSIS. Implementation of these controls is well understood, and relies on capabilities provided in COTS operating systems.

-

SAMPLE THREAT VECTORS. The system executes malicious and harmful software. Software updates could render the system unstable or cause it to function incorrectly. Software is not designed with adequate safeguards to protect PII and other sensitive information. Users could make mistakes in following policy. Users could intentionally install unapproved/unvetted software.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Quality Assured, Substantiated Integrity, Maintainable, Testable, Configuration Managed, Change Managed, Supported, Assessed, Auditable, Authorized, Regulated, Enforcement, Controlled, Reliable, Providing Good Data Stewardship, Assured, Confidential, Access-Controlled

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: For JAB authorizations the contingency lists include designated FedRAMP personnel.

+ + + CP-2 Additional FedRAMP Requirements and Guidance + + CP-2 Requirement: +

For JAB authorizations the contingency lists include designated FedRAMP personnel.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Requirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+ + + CP-4(a) Additional FedRAMP Requirements and Guidance + + CP-4(a) Requirement: +

The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Requirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+ + + CP-7 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.

+ + + + CP-7 (1) Additional FedRAMP Requirements and Guidance + + Guidance: +

The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+ + + CP-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

-

(a) Requirement: The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.

-

(b) Requirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.

-

(c) Requirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.

+ + + CP-9 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

+
+ + CP-9(a) Requirement: +

The service provider maintains at least three backup copies of user-level information (at least one of which is available online).

+
+ + CP-9(b)Requirement: +

The service provider maintains at least three backup copies of system-level information (at least one of which is available online).

+
+ + CP-9(c)Requirement: +

The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online).

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

+ + + + IA-2 (11) Additional FedRAMP Requirements and Guidance + + Guidance: +

PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+ + + + IA-2 (12) Additional FedRAMP Requirements and Guidance + + Guidance: +

Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(e) Requirement: The service provider defines the time period of inactivity for device identifiers.

-

Guidance: For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+ + + IA-4(e) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines the time period of inactivity for device identifiers.

+
+ + Guidance: +

For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: Authenticators must be compliant with NIST SP 800-63-2 Electronic Authentication Guideline assurance Level 4 (Link http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-63-2.pdf)

+ + + IA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 3. Link https://pages.nist.gov/800-63-3.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + + IA-5 (1), (a) and (d) Additional FedRAMP Requirements and Guidance + + (a) (d) Guidance: +

If password policies are compliant with NIST SP 800-63B Memorized Secret (Section 5.1.1) Guidance, the control may be considered compliant.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.

+ + + + IA-5 (4) Additional FedRAMP Requirements and Guidance + + Guidance: +

If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. In those cases where an organization's user accounts authenticate to more than one system, and at least one of those systems is a high-impact system implemented in a shared-service environment, then this control is warranted as a baseline capability to guard against loss of high-impact, sensitive information.

-

ANALYSIS. Organizations can use COTS tools and techniques to implement this control in many ways. Agencies should be prepared to document their plan and approach to this control technique.

-

THREAT VECTORS ADDRESSED. A user's account password is cracked, permitting attackers to identify all systems to which the user has access, and to gain access to the information in those systems.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored, Assessed

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Rationale for Selection: Best practice for authenticated web services and best business practice for the protection of the CSP and customer alike. ECSB sees this as a significant value add toward the protection of customer accounts on SaaS or customer service / managent interfaces/portals.

-

L1 Rationale for SA: No authenticators are required for user access to public informationl. Info sensitivity does not warrant. However this CE would be required priviledged user access to manage the system server(s) containing public information.

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: CSP must minimally implement this control enhancement on all SaaS offerings and customer service / managent interfaces. The time period can be negotiated in the SLA.

-

NOTE: while the browser or other client cashes the authenticator, the server must enforce its expiration if the client does not.

-

Priority for adding to FedRAMP-M: Low

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

-2 Requirement: The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). For JAB authorization, the service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test commencing.

+ + + IR-3 Additional FedRAMP Requirements and Guidance + + IR-3 -2 Requirement: +

The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). For JAB authorization, the service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test commencing.

+
+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+ + + IR-4 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. Organization requires near real-time subsystem reconfiguration for high-impact systems, especially those deployed wholly or partially into shared-service environments. This dynamic reconfiguration is required for core infrastructure components such as routers, firewalls, messaging gateways, or access control/authentication servers, especially when these core components are under cyber-attack.

-

ANALYSIS. These critical cyber controls are well understood, and to some extent their automated capability has been established. Other aspects still require human decisions. Since this technology area is rapidly changing to meet new cyber-threat scenarios, it is expected that implementation of this control will be subject to significant change for the foreseeable future. Even so, its technology advantages are clear, especially for high-impact systems infrastructure.

-

SAMPLE THREAT VECTORS. System does not have error-correcting or self-recovery capabilities. The system is not designed to allow for quick remediation of threats that will impact the system.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Survivable, Absorptive, Adaptive, Restorable

-
-
-
- - - -

NEED. Due to the direct connection between system function and critical mission/business capability, the system requires Continuity-of-Operations (COOP) controls.

-

ANALYSIS. These critical cyber controls are well understood, and to some extent their automated capability has been established. Other aspects still require human decisions. Since this technology area is rapidly changing to meet new cyber-threat scenarios and also changes in subsystem technology, it is expected that implementation of this control will be subject to significant change for the foreseeable future. Even so, its technology advantages are fundamental, especially for high-impact systems infrastructure.

-

SAMPLE THREAT VECTORS. The system does not have error-correcting or self-recovery capabilities. The system is not designed to allow for quick remediation of threats that will impact the system. Time does not allow for the design in error handling, self-recovery, or to capitalize on system diversity to restore a system. Also, the organization lacks the expertise to develop or implement a plan for restoring system. A malicious change may be implemented to counter the ability to restore the system.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Survivable, Absorptive, Adaptable, Restorable

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

NEED. High-impact systems will require special measures to ensure security incidents are correctly and effectively handled in a timely manner. This high-level control supports that need, and is therefore warranted as a baseline for high-impact systems in shared-service environments.

-

ANALYSIS. Implementation of this general control is well understood among Departments and Agencies. However, it may require special funding and time to implement in a shared service environment, where response roles and responsibilities demand vigilant analysis and definition.

-

SAMPLE THREAT VECTORS. Insiders gain access to information for which they have no authorization. Insiders push sensitive information to outside networks not authorized to receive it. Insiders violate agency information-security policies. Insider actions are not monitored.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Agile, Owned, Enforcement

-
-
-
- - - -

This control was recommended ecommended by the High Baseline Tiger Team.

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: Reports security incident information according to FedRAMP Incident Communications Procedure.

+ + + IR-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Report security incident information according to FedRAMP Incident Communications Procedure.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(b) Requirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

-

(e) Requirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+ + + IR-8 Additional FedRAMP Requirements and Guidance + + (b) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
+ + (e) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
+ + - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Rationale for Selection: Best practice business practice for the protection of the CSP and customer alike. Protects against unauthorized access and compromise of the CSP infrastructure. See Supplemental Guidance

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: While AC-17(2) is similar to this CE and implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions, System configuration, maintenance and diagnostic communications can be considered sensitive information and it is in DoD. Maintaining the confidrntiality and integrity of nonlocal maintenance and diagnostic communications helps maintain the health of the system, prevents unauthorized access from sniffing and MITM atacks, etc. While beneficial this selection may not be required for nonlocal maintenance and diagnostic communications over the CSP's private network and particularly if that network is out of band. Encryption is required if such communications are over a network external to the CSP (e.g., the Internet).

-

Priority for adding to FedRAMP-M: High

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(b) Guidance: Second parameter not-applicable

+ + + MP-3 Additional FedRAMP Requirements and Guidance + + (b) Guidance: +

Second parameter not-applicable

+
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Requirement: The service provider defines controlled areas within facilities where the information and information system reside.

+ + + MP-4 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines controlled areas within facilities where the information and information system reside.

+
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Requirement: The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB.

+ + + MP-5 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Equipment and procedures may be tested or validated for effectiveness

+ + + + MP-6 (2) Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

Equipment and procedures may be tested or validated for effectiveness

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(a) Requirements: The service provider measures temperature at server inlets and humidity levels by dew point.

+ + + PE-14(a) Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider measures temperature at server inlets and humidity levels by dew point.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(b) Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+ + + PL-8(b) Additional FedRAMP Requirements and Guidance + + (b) Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F.

-

(d) Requirement: Include all Authoring Officials and FedRAMP ISSOs.

+ + + RA-3 Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F

+
+ + RA-3 (d) Requirement: +

Include all Authorizing Officials; for JAB authorizations to include FedRAMP.

+
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + + RA-5(a) Additional FedRAMP Requirements and Guidance + RA-5 (a)Requirement: +

An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

- -

(a) Requirement: an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

-

(e) Requirement: to include the Risk Executive; for JAB authorizations to include FedRAMP

+ + RA-5(e) Additional FedRAMP Requirements and Guidance + RA-5 (e)Requirement: +

To include all Authorizing Officials; for JAB authorizations to include FedRAMP.

-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

+ + RA-5 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

+
+ - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: include in Continuous Monitoring ISSO digest/report to JAB/AO

+ + + + RA-5 (6) Additional FedRAMP Requirements and Guidance + + Guidance: +

Include in Continuous Monitoring ISSO digest/report to JAB/AO

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Requirements: This enhancement is required for all high vulnerability scan findings.

-

Guidance: While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.

+ + + + RA-5 (8) Additional FedRAMP Requirements and Guidance + + Requirement: +

This enhancement is required for all high vulnerability scan findings.

+
+ + Guidance: +

While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.

+
- - - -

NEED. Organizations commonly run vulnerability scanning tools against diverse enterprise systems and subsystems. These tools are often attuned to the specific subsystems, and often provided by different manufacturers. Because there is no single-vendor consolidation of all scanning tools, organizations need to correlate the outputs of these tools in order to triangulate on potential threats that may be related, or identical at their source. When the security impact is high a shared-service environment may increase the number of independent scanning tools, implementation of this control is warranted.

-

ANALYSIS. Although this control is well understood by vendors, its implementation takes many forms, depending on the scanning tools adopted by a particular organization.

-

SAMPLE THREAT VECTORS. Different scanning tools discover low-impact vulnerabilities in multiple subsystems of a system. Considered individually, none of them warrants immediate action,; yet when considered together, they constitute a significant attack pattern.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Interoperable, Change Managed, Agile, Supported, Assessed, Monitored

-
- -

Guidance: If multiple tools are not used, this control is not applicable.

+ + + + RA-5 (10) Additional FedRAMP Requirements and Guidance + + Guidance: +

If multiple tools are not used, this control is not applicable.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.

-

See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+ + + SA-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: CSP must use the same security standards regardless of where the system component or information system service is acquired.

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - - -

Included in FedRAMP Moderate Baseline, Rev 4

+ + + + + SA-4 (8) Additional FedRAMP Requirements and Guidance + + Guidance: +

CSP must use the same security standards regardless of where the system component or information system service is acquired.

+
+ + + + + + + + + - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

(e) Requirement: for JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.

+ + + SA-10 Additional FedRAMP Requirements and Guidance + + (e) Requirement: +

For JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+ + + + SA-11 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+ + + + SA-11 (8) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. High-impact systems warrant careful attention to scenarios associated with exfiltration of sensitive organizational information. Different systems and implementation will trigger different scenarios, but regardless of the specific system context, organizations are warranted in establishing this control for high-impact systems with subsystems deployed into shared-service environments.

-

ANALYSIS. Organizations should devote careful attention to design considerations relative to this control.

-

SAMPLE THREAT VECTORS. Authorized processes push very large volumes of data to external networks. Internal devices send address/status/security information to external networks.

-

RELEVANT SECURITY CONTROL ATTRIBUTES: Integrity-Assured, Absorptive, Survivable, Adaptive, Agile, Auditable, Monitored, Controlled, Data Controllable, Access-Controlled

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets.

-

Guidance: Examples include: information security tools, mechanisms, and support components such as, but not limited to PKI, patching infrastructure, cyber defense tools, special purpose gateway, vulnerability tracking systems, internet access points (IAPs); network element and data center administrative/management traffic; Demilitarized Zones (DMZs), Server farms/computing centers, centralized audit log servers etc.

+ + + + SC-7 (13) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets.

+
+ + Guidance: +

Examples include: information security tools, mechanisms, and support components such as, but not limited to PKI, patching infrastructure, cyber defense tools, special purpose gateway, vulnerability tracking systems, internet access points (IAPs); network element and data center administrative/management traffic; Demilitarized Zones (DMZs), Server farms/computing centers, centralized audit log servers etc.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. High-impact systems warrant careful attention to situations where specific sources or methods become suspect. Such situations can involve specific user accounts, messages, message payloads, data, applications, or even entire subsystems. Under these circumstances, a capability for dynamic segregation is highly justified.

-

ANALYSIS. Isolation techniques are well understood in the cyber market, and constantly evolving. Example techniques include honey pots and honey nets. Both techniques can isolate a user, an autonomous application, or an entire subsystem.

-

SAMPLE THREAT VECTORS. Anomalous user behavior is detected Messages arrive from suspect domains. Messages arrive with suspect attachments. Applications begin to behave anomalously. Subsystems begin moving data anomalously.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Integrity-Assured, Absorptive, Survivable, Adaptive, Agile, Auditable, Monitored, Controlled, Data Controllable, Access-Controlled

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: Federally approved cryptography

+ + + SC-12 Additional FedRAMP Requirements and Guidance + + Guidance: +

Federally approved and validated cryptography.

+
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Requirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+ + + SC-15 Additional FedRAMP Requirements and Guidance + + Requirement: +

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Rationale for Selection: Rationale for Selection for SA L1: At L1 this CE is only applicable to privileged user sessions.

-

Rationale for Selection L1-6: Best Practice; APT. This CE mitigates the threat/vulnerability inherant in authenticated sessions whereby If an adversary captures a session identifier that remains valid after the session is terminated, the adversary could use it to reinitiate the session thus gaining unauthorized access to CSP and CSP customer resources and information/data.

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: If an adversary captures a session identifier that remains valid after the session is terminated, the adversary could use it to reinitiate the session thus gaining unauthorized access to CSP and/or CSP customer resources and information/data. While unnessary for user sessions at L1, this enhancement is selected for System Administrator sessions.

-

Priority for adding to FedRAMP-M: High

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: The organization supports the capability to use cryptographic mechanisms to protect information at rest.

+ + + SC-28 Additional FedRAMP Requirements and Guidance + + Guidance: +

The organization supports the capability to use cryptographic mechanisms to protect information at rest.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: See US-CERT Incident Response Reporting Guidelines.

+ + + SI-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

See US-CERT Incident Response Reporting Guidelines.

+
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
- -

Guidance: In accordance with the incident response plan.

+ + + + SI-4 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

In accordance with the incident response plan.

+
- - - -

NEED. When a high-impact system is implemented in a shared-service environment, organizations should ensure their sensitive data is properly protected against classic threats to the confidentiality of its sensitive information. This control partially meets that need.

-

ANALYSIS. The tools and techniques for implementing this monitoring control are now well understood and embedded in COTS operating systems and software.

-

SAMPLE THREAT VECTORS. Large outbound file transfers execute without being detected. External malware network sites are accessed from within the organization without detection. Network sessions remain connected for long periods of time without detection. Esoteric protocols are active and undetected on ports not defined by the organization.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. When a high-impact system is implemented in a shared-service environment, organizations should ensure their sensitive data is properly protected against classic threats to the confidentiality of sensitive information. This control partially meets that need.

-

ANALYSIS. The tools and techniques for implementing this monitoring control are now well understood, and embedded in COTS operating systems and software.

-

SAMPLE THREAT VECTORS. Large outbound files are disguised to transfer without being detected. Communications with external malware network sites are embedded to avoid detection.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Substantiated Integrity, Monitored, Assessed

-
-
-
- - - -

Rationale for De-Selection L1-3: The information sensitivity at these levels does not seem to warrant implementation of this CE. The costs for instituting fine-grained monitoring per individual far may outweigh the risks

-

Rationale for selection L4-6: SP Insider Threat mitigation; The information sensitivity at these levels warrants implementation of this CE.Best business practice for the protection of the CSP and customer alike. This enhancement works in conjunction with AC-2 (13) account disablement for such individuals and IR-4 (6).

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: This enhancement works in conjunction with or opposite of AC-2 (13) which requires acount disablement within a specific time frame of discovering or identifying an individual posing a significant insider threat. In some instances the best action is not to terminate the individual's account, but rather to monitor their actions. This allows for the ability to collect evidence (for prosecution) and obtain insight into the TTPs that they may be using and others they may working with. Termination of the account is often best left as a final act.

-

Priority for adding to FedRAMP-M: Moderate

-
-
-
- - - -

Rationale for Selection: Best business practice for the protection of the CSP and customer alike. Given the scale of a cloud, the possible harm by an malicious insider is greatly magnified over normal systems.

-

ECSB Supplemental Guidance as the C/CE relates to CSPs: his CE is on a par with SI-4 (9), IR-4 (6) and the various other insider threat Cs/CEs. Supports the mitigation of insider threat from those that can do the most damage. While CSPs typically claim they only have privileged users in their infrastructure (other than customers), this CEadds value for privilege users that have higher privilege than others. These higher privileged users should be subject to additional monitoring.

-

Priority for adding to FedRAMP-M: High

-
-
-
- - - -

NEED. When a high-impact system is implemented across networks in a shared-service environment, organizations should monitor network services to protect against unauthorized services capable of exfiltrating sensitive information. This control meets that monitoring need.

-

ANALYSIS. The tools and techniques for implementing this monitoring control are well understood, and embedded in COTS operating systems and software.

-

SAMPLE THREAT VECTORS. Systems daemons and application services running in the background, exfiltrating sensitive information to external networks.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored, Assessed

-
-
-
- - - -

Included in FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

NEED. When a high-impact system is implemented across networks in a shared-service environment, organizations should aggressively monitor for symptoms that system integrity has been compromised. This control addresses that monitoring need.

-

ANALYSIS. The tools and techniques for implementing this monitoring control are no longer unusual, but their implementation still requires careful initial analysis of tools, standards, and sources for indicators of compromise (IOC) data. This capability is not a simple matter of installing COTS software and watching for alerts. Rather, it requires staff to maintain a keen understanding of the threat-scape in order to properly understand the alerts coming from the IOC subsystem.

-

SAMPLE THREAT VECTORS. Temporary files appear but are not associated with any known system processes; independent security services warn of new surveillance techniques appearing globally; evidence of those new techniques appears in an organization's event logs. Reports on the payload of a new botnet indicate that the system has been touched by the botnet.

-

RELEVANT SECURITY CONTROL ATTRIBUTES. Monitored, Assessed

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
- - - -

Included in NIST High Baseline, Rev 4 and FedRAMP Moderate Baseline, Rev 4

-
-
-
\ No newline at end of file diff --git a/src/content/fedramp.gov/xml/FedRAMP_LOW-baseline_profile.xml b/src/content/fedramp.gov/xml/FedRAMP_LOW-baseline_profile.xml index 9c4e2b7120..19b40b6141 100644 --- a/src/content/fedramp.gov/xml/FedRAMP_LOW-baseline_profile.xml +++ b/src/content/fedramp.gov/xml/FedRAMP_LOW-baseline_profile.xml @@ -16,7 +16,7 @@ - + @@ -45,6 +45,7 @@ + @@ -66,19 +67,19 @@ - - + + - - + + - - - - + + + + @@ -141,15 +142,20 @@ + - + - - + + + - + + + true + @@ -165,16 +171,13 @@ - not more than three + not more than three (3) - fifteen minutes - - - locks the account/node for thirty minutes + fifteen (15) minutes - locks the account/node for thirty minutes + thirty (30) minutes @@ -245,9 +248,6 @@ all information system and network components where audit capability is deployed/available - - all information system and network components where audit capability is deployed/available - at least every 3 years @@ -363,19 +363,10 @@ ninety days for user identifiers (See additional requirements and guidance) - - to include sixty (60) days for passwords - - - case sensitive, minimum of twelve characters, and at least one each of upper-case letters, lower-case letters, numbers, and special characters - at least one - - one day minimum, sixty day maximum - twenty four @@ -515,8 +506,7 @@ - PS-3 (b) [for national security clearances; a reinvestigation is required during the 5th year for top secret security clearance, the 10th year for secret security clearance, and 15th year for confidential security clearance -For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year There is no reinvestigation for other moderate risk positions or any low risk positions] + For national security clearances; a reinvestigation is required during the 5th year for top secret security clearance, the 10th year for secret security clearance, and 15th year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year. There is no reinvestigation for other moderate risk positions or any low risk positions. @@ -553,9 +543,6 @@ For moderate risk law enforcement and high impact public trust level, a reinvest at least every three (3) years or when a significant change occurs - - to include all Authoring Officials and FedRAMP ISSOs - at least every three (3) years or when a significant change occurs @@ -564,7 +551,7 @@ For moderate risk law enforcement and high impact public trust level, a reinvest monthly operating system/infrastructure; monthly web applications and databases - high-risk vulnerabilities mitigated within thirty days from date of discovery; moderate-risk vulnerabilities mitigated within ninety days from date of discovery + [high-risk vulnerabilities mitigated within thirty days from date of discovery; moderate-risk vulnerabilities mitigated within ninety days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery. @@ -643,11 +630,21 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB.

-

Requirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB.

-

Guidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided. AC-8 Requirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB.

+ + + AC-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

+
+ + Requirement: +

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

+
+ + Requirement: +

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

+
@@ -664,9 +661,13 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+ + + AU-2 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+
@@ -675,9 +676,13 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+ + + AU-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+
@@ -685,49 +690,88 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

+ + + AU-11 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

+
+ + + + CA-2 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/

+
+
+
+
- - - -

Requirement: Must use an accredited 3PAO for JAB authorization

+ + + + CA-2 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).

+
- - -

Guidance: Requirement: POA&Ms must be provided at least monthly.

+ + + CA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Plan of Action & Milestones (POA&M) must be provided at least monthly.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Plan of Action & Milestones (POA&M) Template Completion Guide https://www.fedramp.gov/documents/

+
- - -

-c. Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+ + + CA-6(c) Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+
- - -

Requirement: Operating System Scans: at least monthly Database and Web Application Scans: at least monthly All scans performed by Independent Assessor: at least annually

-

Guidance: CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

-

Operating System Scans: at least monthly

-

Database and Web Application Scans: at least monthly

-

All scans performed by Independent Assessor: at least annually

+ + + CA-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.

+
+ + Guidance: +

CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/

+
@@ -737,29 +781,50 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

(a) Requirement 1: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

-

(a) Requirement 2: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).

-

(a) Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

+ + + CM-6(a) Additional FedRAMP Requirements and Guidance + + Requirement 1: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

+
+ + Requirement 2: +

The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).

+
+ + Guidance: +

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

+
- - -

(b) Requirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

-

Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

-

(Partially derived from AC-17(8).)

+ + + CM-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

+
+ + Guidance: +

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc + Partially derived from AC-17(8).

+
- - -

Requirement: must be provided at least monthly or when there is a change.

+ + + CM-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

Must be provided at least monthly or when there is a change.

+
@@ -768,29 +833,50 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: For JAB authorizations the contingency lists include designated FedRAMP personnel.

+ + + CP-2 Additional FedRAMP Requirements and Guidance + + CP-2 Requirement: +

For JAB authorizations the contingency lists include designated FedRAMP personnel.

+
- - -

(a). Requirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+ + + CP-4(a) Additional FedRAMP Requirements and Guidance + + CP-4(a) Requirement: +

The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+
- - -

Requirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

-

(a) Requirement: The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.

-

(b) Requirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.

-

(c) Requirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.

+ + + CP-9 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

+
+ + CP-9(a) Requirement: +

The service provider maintains at least three backup copies of user-level information (at least one of which is available online).

+
+ + CP-9(b)Requirement: +

The service provider maintains at least three backup copies of system-level information (at least one of which is available online).

+
+ + CP-9(c)Requirement: +

The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online).

+
@@ -799,24 +885,57 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - - -

Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+ + + + IA-2 (12) Additional FedRAMP Requirements and Guidance + + Guidance: +

Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+
- - -

(e) Requirement: The service provider defines time period of inactivity for device identifiers.

-

Guidance: For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+ + + IA-4(e) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines the time period of inactivity for device identifiers.

+
+ + Guidance: +

For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+
+ + + + IA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 1. Link https://pages.nist.gov/800-63-3.

+
+
+
+
+ + + + IA-5 (1) (a) and (d) Additional FedRAMP Requirements and Guidance + + Guidance (a) (d): +

If password policies are compliant with NIST SP 800-63B Memorized Secret (Section 5.1.1) Guidance, the control may be considered compliant.

+
+
+
+
@@ -829,28 +948,43 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Requirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+ + + IR-4 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+
- - -

Requirement: Reports security incident information according to FedRAMP Incident Communications Procedure.

+ + + IR-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Report security incident information according to FedRAMP Incident Communications Procedure.

+
- - -

(b) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

-

(e) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+ + + IR-8 Additional FedRAMP Requirements and Guidance + + (b) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
+ + (e) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
@@ -871,9 +1005,13 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

(a). Requirements: The service provider measures temperature at server inlets and humidity levels by dew point.

+ + + PE-14(a) Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider measures temperature at server inlets and humidity levels by dew point.

+
@@ -894,18 +1032,39 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F.

+ + + RA-3 Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F

+
+ + RA-3 (d) Requirement: +

Include all Authorizing Officials; for JAB authorizations to include FedRAMP.

+
- - -

(a) Requirement: an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

-

(e) Requirement: to include the Risk Executive; for JAB authorizations to include FedRAMP

+ + + RA-5(a) Additional FedRAMP Requirements and Guidance + RA-5 (a)Requirement: +

An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

+
+ + RA-5(e) Additional FedRAMP Requirements and Guidance + RA-5 (e)Requirement: +

To include all Authorizing Officials; for JAB authorizations to include FedRAMP.

+
+ + RA-5 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

+
@@ -914,33 +1073,58 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Guidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.

-

See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+ + + SA-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+
+ + + + SA-9 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Continuous Monitoring Strategy Guide https://www.FedRAMP.gov/documents

+
+ + Guidance: +

Independent Assessors should assess the risk associated with the use of external services. See the FedRAMP page under Key Cloud Service Provider (CSP) Documents>FedRAMP Authorization Boundary Guidance

+
+
+
+
- - -

Guidance: Federally approved cryptography

+ + + SC-12 Additional FedRAMP Requirements and Guidance + + Guidance: +

Federally approved and validated cryptography.

+
- - -

Additional FedRAMP Requirements and Guidance:

-

Requirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+ + + SC-15 Additional FedRAMP Requirements and Guidance + + Requirement: +

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+
@@ -953,9 +1137,13 @@ For moderate risk law enforcement and high impact public trust level, a reinvest - - -

Guidance: See US-CERT Incident Response Reporting Guidelines.

+ + + SI-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

See US-CERT Incident Response Reporting Guidelines.

+
diff --git a/src/content/fedramp.gov/xml/FedRAMP_MODERATE-baseline_profile.xml b/src/content/fedramp.gov/xml/FedRAMP_MODERATE-baseline_profile.xml index 721000baa3..e62489295d 100644 --- a/src/content/fedramp.gov/xml/FedRAMP_MODERATE-baseline_profile.xml +++ b/src/content/fedramp.gov/xml/FedRAMP_MODERATE-baseline_profile.xml @@ -16,196 +16,236 @@ - + - - - - + + + + + + + + + + - - - - - + + + + + + - + - - - - + + + + + - + - + - - + + - + - + - + - - + + - + - + - + + - + + + - + + - + + + - - - + + + + + + + + - - + + + - - - + + + + - - - + + + + - + - - + + - - - + + + - - + + - + + - + - - - - - - + + + + + + + + - - - - + + + + + + + - - - - + + + + - + - + - + - + + + + + + + - - + + + - + + - + + - + - + - + + + - + - + + @@ -215,36 +255,54 @@ - - - + + + + + + - - - - + + + + + - + + + + + + + + + - - - - + + + + + + + + - + + + @@ -255,101 +313,49 @@ + - + + - - + + + - - - + + + + + + + + - - + + - - + + - + - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - + + + - + + + true + @@ -397,9 +403,6 @@ fifteen (15) minutes - - locks the account/node for thirty minutes - locks the account/node for thirty minutes @@ -428,7 +431,7 @@ - no greater than 15 minutes + fifteen 15 minutes @@ -471,7 +474,7 @@ - Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes + successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes organization-defined subset of the auditable events defined in AU-2 a to be audited continually for each identified event @@ -504,7 +507,7 @@ At least hourly - http://tfnistgov/tf-cgi/serverscgi + http://tf.nist.gov/tf-cgi/servers.cgi @@ -520,9 +523,6 @@ all information system and network components where audit capability is deployed/available - - all information system and network components where audit capability is deployed/available - at least every 3 years @@ -550,7 +550,7 @@ any FedRAMP Accredited 3PAO - the conditions of a Authorizing Official in the FedRAMP Repository + the conditions of the JAB/AO in the FedRAMP Repository @@ -567,7 +567,7 @@ - at least every three years or when a significant change occurs + at least every three (3) years or when a significant change occurs @@ -581,9 +581,6 @@ at least annually - - at least annually - @@ -736,18 +733,9 @@ contractors; foreign nationals - - to include sixty (60) days for passwords - - - case sensitive, minimum of twelve characters, and at least one each of upper-case letters, lower-case letters, numbers, and special characters - - case sensitive, minimum of twelve characters, and at least one IA-5 (1) (b) [at least one - - - one (1) day minimum, sixty (60) day maximum + at least one twenty four (24) @@ -853,7 +841,7 @@ all types of digital and non-digital media with sensitive information - FedRAMP Assignment: see additional FedRAMP requirements and guidance + see additional FedRAMP requirements and guidance @@ -866,7 +854,7 @@ - At least annually + at least annually @@ -1012,10 +1000,10 @@ - monthly operating system/infrastructure; monthly web applications and database + monthly operating system/infrastructure; monthly web applications and databases - high-risk vulnerabilities mitigated within thirty days from date of discovery; moderate-risk vulnerabilities mitigated within ninety days from date of discovery + high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery @@ -1065,11 +1053,11 @@ - All external systems where Federal information is processed or stored + all external systems where Federal information is processed or stored - All external systems where Federal information is processed or stored + all external systems where Federal information is processed or stored @@ -1232,36 +1220,55 @@ - - - -

Guidance: should use a shorter timeframe than AC-12.

+ + + + AC-2 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

Should use a shorter timeframe than AC-12.

+
- - - -

Required if shared/group accounts are deployed

+ + + + AC-2 (9) Additional FedRAMP Requirements and Guidance + + Requirement: +

Required if shared/group accounts are deployed

+
- - - -

Required if shared/group accounts are deployed

+ + + + AC-2 (10) Additional FedRAMP Requirements and Guidance + + Requirement: +

Required if shared/group accounts are deployed

+
- - - -

(a) Guidance: Required for privileged accounts.

-

(b) Guidance: Required for privileged accounts.

+ + + + AC-2 (12) Additional FedRAMP Requirements and Guidance + + (a) Guidance: +

Required for privileged accounts.

+
+ + (b) Guidance: +

Required for privileged accounts.

+
@@ -1270,20 +1277,27 @@ - - -

Additional FedRAMP Requirements and Guidance:

-

Guidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.

+ + + AC-5 Additional FedRAMP Requirements and Guidance + + Guidance: +

Guidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP.

+
- - - -

Guidance: Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

+ + + + AC-6 (2) Additional FedRAMP Requirements and Guidance + + Guidance: +

Examples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.

+
@@ -1293,11 +1307,21 @@ - - -

Requirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB.

-

Requirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB.

-

Guidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided. AC-8 Requirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB.

+ + + AC-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

+
+ + Requirement: +

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

+
+ + Requirement: +

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

+
@@ -1329,26 +1353,42 @@ - - -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+ + + AU-2 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.

+
- - - -

Guidance: Annually or whenever changes in the threat environment are communicated to the service provider by the JAB.

+ + + + AU-2 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.

+
- - - -

Requirement: The service provider defines audit record types. The audit record types are approved and accepted by the JAB/AO. Guidance: For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.

+ + + + AU-3 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines audit record types [FedRAMP Assignment: session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon; individual identities of group account users; full-text of privileged commands]. The audit record types are approved and accepted by the JAB/AO.

+
+ + Guidance: +

For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.

+
@@ -1356,9 +1396,13 @@ - - -

Requirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+ + + AU-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Coordination between service provider and consumer shall be documented and accepted by the JAB/AO. In multi-tennant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.

+
@@ -1368,12 +1412,22 @@ - - - -

Requirement: The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.

-

Requirement: The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.

-

Guidance: Synchronization of system clocks improves the accuracy of log analysis.

+ + + + AU-8 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.

+
+ + Requirement: +

The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.

+
+ + Guidance: +

Synchronization of system clocks improves the accuracy of log analysis.

+
@@ -1382,79 +1436,141 @@ - - -

Requirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

+ + + AU-11 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements.

+
+ + + + CA-2 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/

+
+
+
+
- - - -

Requirement: Must use an accredited 3PAO for JAB authorization

+ + + + CA-2 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).

+
- - - -

Requirement: To include 'announced', 'vulnerability scanning'

+ + + + CA-2 (2) Additional FedRAMP Requirements and Guidance + + Requirement: +

To include 'announced', 'vulnerability scanning'

+
- - - -

Guidance: Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference Architecture document.

+ + + + CA-3 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference Architecture document.

+
- - - -

For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing

+ + + + CA-3 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

For JAB Authorization, CSPs shall include details of this control in their Architecture Briefing

+
- - -

Guidance: Requirement: POA&Ms must be provided at least monthly.

+ + + CA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Plan of Action & Milestones (POA&M) must be provided at least monthly.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Plan of Action & Milestones (POA&M) Template Completion Guide https://www.fedramp.gov/documents/

+
- - -

-c. Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+ + + CA-6(c) Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F. The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.

+
- - -

Requirement: Operating System Scans: at least monthly Database and Web Application Scans: at least monthly All scans performed by Independent Assessor: at least annually

-

Guidance: CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

-

Operating System Scans: at least monthly

-

Database and Web Application Scans: at least monthly

-

All scans performed by Independent Assessor: at least annually

+ + + CA-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.

+
+ + Guidance: +

CSPs must provide evidence of closure and remediation of high vulnerabilities within the timeframe for standard POA&M updates.

+
+ + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/

+
+ + + + CA-8 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Penetration Test Guidance https://www.FedRAMP.gov/documents/

+
+
+
+
@@ -1465,10 +1581,17 @@ - - -

Requirement: The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.

-

-e Guidance: In accordance with record retention policies and procedures.

+ + + CM-3 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.

+
+ + (e) Guidance: +

In accordance with record retention policies and procedures.

+
@@ -1476,50 +1599,78 @@ - - - -

Guidance: If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized.

+ + + + CM-5 (3) Additional FedRAMP Requirements and Guidance + + Guidance: +

If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be utilized.

+
- - -

(a) Requirement 1: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

-

(a) Requirement 2: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) validated or SCAP compatible (if validated checklists are not available).

-

(a) Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

+ + + CM-6(a) Additional FedRAMP Requirements and Guidance + + Requirement 1: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available.

+
+ + Requirement 2: +

The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).

+
+ + Guidance: +

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

+
- - -

(b) Requirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

-

Guidance: Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc

-

(Partially derived from AC-17(8).)

+ + + CM-7 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available.

+
+ + Guidance: +

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc. Partially derived from AC-17(8).

+
- - - -

Guidance: This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.

+ + + + CM-7 (2) Additional FedRAMP Requirements and Guidance + + Guidance: +

This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e. white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.

+
- - -

Requirement: must be provided at least monthly or when there is a change.

+ + + CM-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

Must be provided at least monthly or when there is a change.

+
@@ -1533,9 +1684,13 @@ - - -

Requirement: For JAB authorizations the contingency lists include designated FedRAMP personnel.

+ + + CP-2 Additional FedRAMP Requirements and Guidance + + CP-2 Requirement: +

For JAB authorizations the contingency lists include designated FedRAMP personnel.

+
@@ -1546,9 +1701,13 @@ - - -

(a). Requirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+ + + CP-4(a) Additional FedRAMP Requirements and Guidance + + CP-4(a) Requirement: +

The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended); plans are approved by the JAB/AO prior to initiating testing.

+
@@ -1558,17 +1717,25 @@ - - -

(a). Requirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+ + + CP-7 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+
- - - -

Guidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.

+ + + + CP-7 (1) Additional FedRAMP Requirements and Guidance + + Guidance: +

The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber attack), the degree of separation between sites will be less relevant.

+
@@ -1576,9 +1743,13 @@ - - -

Requirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+ + + CP-8 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines a time period consistent with the recovery time objectives and business impact analysis.

+
@@ -1586,12 +1757,25 @@ - - -

Requirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

-

(a) Requirement: The service provider maintains at least three backup copies of user-level information (at least one of which is available online) or provides an equivalent alternative.

-

(b) Requirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online) or provides an equivalent alternative.

-

(c) Requirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online) or provides an equivalent alternative.

+ + + CP-9 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.

+
+ + CP-9(a) Requirement: +

The service provider maintains at least three backup copies of user-level information (at least one of which is available online).

+
+ + CP-9(b)Requirement: +

The service provider maintains at least three backup copies of system-level information (at least one of which is available online).

+
+ + CP-9(c)Requirement: +

The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online).

+
@@ -1607,41 +1791,82 @@ - - - -

Guidance: PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

+ + + + IA-2 (11) Additional FedRAMP Requirements and Guidance + + Guidance: +

PIV=separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials.

+
- - - -

Guidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+ + + + IA-2 (12) Additional FedRAMP Requirements and Guidance + + Guidance: +

Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.

+
- - -

(e) Requirement: The service provider defines time period of inactivity for device identifiers.

-

Guidance: For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+ + + IA-4(e) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines the time period of inactivity for device identifiers.

+
+ + Guidance: +

For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

+
+ + + + IA-5 Additional FedRAMP Requirements and Guidance + + Requirement: +

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3.

+
+
+
+
+ + + + IA-5 (1), (a) and (d) Additional FedRAMP Requirements and Guidance + + (a) (d) Guidance: +

If password policies are compliant with NIST SP 800-63B Memorized Secret (Section 5.1.1) Guidance, the control may be considered compliant.

+
+
+
+
- - - -

Additional FedRAMP Requirements and Guidance: Guidance: If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.

+ + + + IA-5 (4) Additional FedRAMP Requirements and Guidance + + Guidance: +

If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.

+
@@ -1659,20 +1884,27 @@ - - -

-2 Requirement 1: The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended).

-

-2 Requirement 2: For JAB Authorization, the service provider provides test plans to the JAB/AO annually.

-

-2 Requirement 3: Test plans are approved and accepted by the Authorizing Official (AO) prior to test commencing.

+ + + IR-3 Additional FedRAMP Requirements and Guidance + + IR-3 -2 Requirement: +

The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). For JAB authorization, the service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test commencing.

+
+
- - -

Requirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+ + + IR-4 Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.

+
@@ -1680,9 +1912,13 @@ - - -

Requirement: Reports security incident information according to FedRAMP Incident Communications Procedure.

+ + + IR-6 Additional FedRAMP Requirements and Guidance + + Requirement: +

Report security incident information according to FedRAMP Incident Communications Procedure.

+
@@ -1692,10 +1928,17 @@ - - -

(b) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

-

(e) Additional FedRAMP Requirements and Guidance: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+ + + IR-8 Additional FedRAMP Requirements and Guidance + + (b) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
+ + (e) Requirement: +

The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.

+
@@ -1714,10 +1957,14 @@ - - - -

Requirement: Only MA-5 (1)(a)(1) is required by FedRAMP Moderate Baseline

+ + + + MA-5 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

Only MA-5 (1)(a)(1) is required by FedRAMP Moderate Baseline

+
@@ -1726,36 +1973,51 @@ - - -

(b) Guidance: Second parameter not-applicable

+ + + MP-3 Additional FedRAMP Requirements and Guidance + + (b) Guidance: +

Second parameter not-applicable

+
- - -

(a) Additional FedRAMP Requirements and Guidance: Requirement: The service provider defines controlled areas within facilities where the information and information system reside.

+ + + MP-4 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines controlled areas within facilities where the information and information system reside.

+
- - -

(a) Additional FedRAMP Requirements and Guidance:

-

Requirement: The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB.

+ + + MP-5 Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB.

+
- - - -

Guidance: Equipment and procedures may be tested or validated for effectiveness

+ + + + MP-6 (2) Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

Equipment and procedures may be tested or validated for effectiveness

+
@@ -1778,9 +2040,13 @@ - - -

(a). Requirements: The service provider measures temperature at server inlets and humidity levels by dew point.

+ + + PE-14(a) Additional FedRAMP Requirements and Guidance + + (a) Requirement: +

The service provider measures temperature at server inlets and humidity levels by dew point.

+
@@ -1795,9 +2061,13 @@ - - -

(b) Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+ + + PL-8(b) Additional FedRAMP Requirements and Guidance + + (b) Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, page F-7.

+
@@ -1814,19 +2084,39 @@ - - -

Guidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F.

-

(d) Requirement: Include all Authoring Officials and FedRAMP ISSOs.

+ + + RA-3 Additional FedRAMP Requirements and Guidance + + Guidance: +

Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F

+
+ + RA-3 (d) Requirement: +

Include all Authorizing Officials; for JAB authorizations to include FedRAMP.

+
- - -

(a) Requirement: an accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

-

(e) Requirement: to include the Risk Executive; for JAB authorizations to include FedRAMP

+ + + RA-5(a) Additional FedRAMP Requirements and Guidance + RA-5 (a)Requirement: +

An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.

+
+ + RA-5(e) Additional FedRAMP Requirements and Guidance + RA-5 (e)Requirement: +

To include all Authorizing Officials; for JAB authorizations to include FedRAMP.

+
+ + RA-5 Additional FedRAMP Requirements and Guidance + + Guidance: +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

+
@@ -1835,18 +2125,30 @@ - - - -

Guidance: include in Continuous Monitoring ISSO digest/report to JAB/AO

+ + + + RA-5 (6) Additional FedRAMP Requirements and Guidance + + Guidance: +

Include in Continuous Monitoring ISSO digest/report to JAB/AO

+
- - - -

Requirements: This enhancement is required for all high vulnerability scan findings. Guidance: While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.

+ + + + RA-5 (8) Additional FedRAMP Requirements and Guidance + + Requirement: +

This enhancement is required for all high vulnerability scan findings.

+
+ + Guidance: +

While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.

+
@@ -1855,20 +2157,27 @@ - - -

Guidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.

-

See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+ + + SA-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.

+
- - - -

Guidance: CSP must use the same security standards regardless of where the system component or information system service is acquired.

+ + + + SA-4 (8) Additional FedRAMP Requirements and Guidance + + Guidance: +

CSP must use the same security standards regardless of where the system component or information system service is acquired.

+
@@ -1883,32 +2192,44 @@ - - -

(e) Requirement: for JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.

+ + + SA-10 Additional FedRAMP Requirements and Guidance + + (e) Requirement: +

For JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.

+
- - - -

Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+ + + + SA-11 (1) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+
- - - -

Requirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+ + + + SA-11 (8) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.

+
- + @@ -1921,10 +2242,14 @@ - - - -

Requirement: The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets.

+ + + + SC-7 (13) Additional FedRAMP Requirements and Guidance + + Requirement: +

The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets.

+
@@ -1934,9 +2259,13 @@ - - -

Guidance: Federally approved cryptography

+ + + SC-12 Additional FedRAMP Requirements and Guidance + + Guidance: +

Federally approved and validated cryptography.

+
@@ -1945,10 +2274,13 @@ - - -

Additional FedRAMP Requirements and Guidance:

-

Requirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+ + + SC-15 Additional FedRAMP Requirements and Guidance + + Requirement: +

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+
@@ -1961,9 +2293,13 @@ - - -

Guidance: The organization supports the capability to use cryptographic mechanisms to protect information at rest.

+ + + SC-28 Additional FedRAMP Requirements and Guidance + + Guidance: +

The organization supports the capability to use cryptographic mechanisms to protect information at rest.

+
@@ -1979,9 +2315,13 @@ - - -

Guidance: See US-CERT Incident Response Reporting Guidelines.

+ + + SI-4 Additional FedRAMP Requirements and Guidance + + Guidance: +

See US-CERT Incident Response Reporting Guidelines.

+
@@ -1989,10 +2329,14 @@ - - - -

Guidance: In accordance with the incident response plan.

+ + + + SI-4 (5) Additional FedRAMP Requirements and Guidance + + Guidance: +

In accordance with the incident response plan.

+
diff --git a/src/content/fedramp.gov/xml/FedRAMP_catalog.xml b/src/content/fedramp.gov/xml/FedRAMP_catalog.xml new file mode 100644 index 0000000000..0387cb5828 --- /dev/null +++ b/src/content/fedramp.gov/xml/FedRAMP_catalog.xml @@ -0,0 +1,97 @@ + + + + FedRAMP Additional Controls + 2019-07-23T13:20:00.000-04:00 + 1.0 + 1.0.0 + FedRAMP, Assurance, computer security, FISMA, Privacy Act, Risk Management Framework, security controls, security requirements + + Document creator + + + Contact + + + + Federal Risk and Authorization Management Program (FedRAMP) + info@fedramp.gov + https://fedramp.gov + + + +

No notes.

+
+
+ + Access Control + + System Use Notification + + AC-8 Additional FedRAMP Requirements and Guidance + AC-8 Req + + Requirement: +

The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.

+
+ + Requirement: +

The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.

+
+ + Requirement: +

If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.

+
+
+
+
+ + CA-7 Security Assessment and Authorization + + Continuous Monitoring + + Additional FedRAMP Requirements and Guidance + CA-7 Req + + Requirement 1 +

Operating System Scans: at least monthly

+
+ + Requirement 2 +

Database and Web Application Scans: at least monthly

+
+ + Requirement 3 +

All scans performed by Independent Assessor: at least annually

+
+ +

CSPs must provide evidence of closure and remediation of a high vulnerability within the timeframe for standard POA&M updates.

+
+ +

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents, Continuous Monitoring Strategy Guide https://www.FedRAMP.gov/documents/

+
+
+
+
+ + System and Communications Protection + + System and Communications Protection Policy and Procedures + + SC-15 Additional FedRAMP Requirements and Guidance + SC-15 Req + + Requirement +

The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.

+
+
+
+
+ + + + + +
\ No newline at end of file diff --git a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline_profile.xml b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline_profile.xml index d9c4c82332..e3bf8899da 100644 --- a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline_profile.xml +++ b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_HIGH-baseline_profile.xml @@ -33,260 +33,260 @@ - - - - - - - - + + + + + + + + - - - - - - + + + + + + - + - - - - + + + + - - - + + + - + - - + + - + - + - - + + - - + + - - - - + + + + - + - + - - - + + + - - + + - - + + - + - + - - - - + + + + - - + + - + - - - + + + - - + + - - - + + + - - - - - + + + + + - - - - - - + + + + + + - + - - + + - - - + + + - - - - + + + + - - - - + + + + - - - - + + + + - - + + - - - - - - - - + + + + + + + + - - - - + + + + - - - - + + + + - - + + - + - - + + - + - + - + - + - - - + + + - - + + - + - + - - - + + + - + - + - - + + - + - + - - - + + + - + - + - + - + @@ -295,22 +295,22 @@ - - - - + + + + - - - - + + + + - + @@ -323,18 +323,18 @@ - - - - - - - + + + + + + + - + - + @@ -349,27 +349,27 @@ - - + + - - + + - - - + + + - + - - - - - + + + + + - - + + diff --git a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_LOW-baseline_profile.xml b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_LOW-baseline_profile.xml index 028a5b9aed..41e8763164 100644 --- a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_LOW-baseline_profile.xml +++ b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_LOW-baseline_profile.xml @@ -79,19 +79,19 @@ - - + + - - + + - - - - + + + + @@ -136,7 +136,7 @@ - + diff --git a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml index e9143a3f59..4f29fa8759 100644 --- a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml +++ b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_MODERATE-baseline_profile.xml @@ -34,156 +34,156 @@ - - - - + + + + - - - - - + + + + + - + - - - - + + + + - + - + - - + + - + - + - + - - + + - + - + - + - + - + - + - - - + + + - + - - - + + + - - - + + + - - - + + + - + - - + + - - - + + + - - + + - + - + - - - - - - + + + + + + - - - - + + + + - - - - + + + + - + - + - + - + - - + + - + @@ -191,33 +191,33 @@ - + - + - + - + - + - + @@ -231,21 +231,21 @@ - - - + + + - - - - + + + + - + @@ -253,12 +253,12 @@ - - - - + + + + - + @@ -274,21 +274,21 @@ - + - - + + - - - + + + - - + + - - + + diff --git a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_catalog.xml b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_catalog.xml index 8886c2b410..7b6db83db8 100644 --- a/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_catalog.xml +++ b/src/content/nist.gov/SP800-53/rev4/xml/NIST_SP-800-53_rev4_catalog.xml @@ -1,9 +1,9 @@ - + + id="uuid-164e503d-1a64-4373-8926-7c51b8ba2913"> NIST Special Publication 800-53 Revision 4: Security and Privacy Controls for Federal Information Systems and Organizations @@ -486,7 +486,7 @@

automated mechanisms for implementing account management

- + Automated System Account Management AC-2(1) @@ -524,8 +524,8 @@

Automated mechanisms implementing account management functions

- - + + Removal of Temporary / Emergency Accounts @@ -2279,8 +2279,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Embedded Data Types @@ -2329,8 +2329,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Metadata @@ -2382,8 +2382,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + One-way Flow Mechanisms @@ -2430,8 +2430,8 @@

Hardware mechanisms implementing information flow enforcement policy

- - + + Security Policy Filters @@ -2488,8 +2488,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Human Reviews @@ -2548,8 +2548,8 @@

Automated mechanisms enforcing the use of human reviews

- - + + Enable / Disable Security Policy Filters @@ -2607,8 +2607,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Configuration of Security Policy Filters @@ -2659,8 +2659,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Data Type Identifiers @@ -2710,8 +2710,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Decomposition into Policy-relevant Subcomponents @@ -2760,8 +2760,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Security Policy Filter Constraints @@ -2812,8 +2812,8 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Detection of Unsanctioned Information @@ -2870,14 +2870,14 @@

Automated mechanisms implementing information flow enforcement policy

- - + + Information Transfers On Interconnected Systems AC-4(16) Withdrawn AC-4 - - + + Domain Authentication @@ -4338,8 +4338,8 @@

Automated mechanisms implementing access control policy for previous logon notification

- - + + Notification of Account Changes @@ -4391,8 +4391,8 @@

Automated mechanisms implementing access control policy for previous logon notification

-
- + + Additional Logon Information @@ -4440,7 +4440,7 @@

Automated mechanisms implementing access control policy for previous logon notification

-
+ Concurrent Session Control @@ -4564,7 +4564,7 @@

Automated mechanisms implementing access control policy for session lock

- + Pattern-hiding Displays AC-11(1) @@ -4601,7 +4601,7 @@

Information system session lock mechanisms

-
+
Session Termination @@ -4654,7 +4654,7 @@

Automated mechanisms implementing user session termination

- + User-initiated Logouts / Message Displays @@ -4720,7 +4720,7 @@

Information system session lock mechanisms

-
+
Supervision and Review - Access Control @@ -4788,12 +4788,12 @@

organizational personnel with information security responsibilities

- + Necessary Uses AC-14(1) Withdrawn AC-14 - +
Automated Marking @@ -4946,7 +4946,7 @@

Organizational capability supporting and maintaining the association of security attributes to information in storage, in process, and in transmission

- + Dynamic Attribute Association @@ -5002,8 +5002,8 @@

Automated mechanisms implementing dynamic association of security attributes to information

-
- +
+ Attribute Value Changes by Authorized Individuals AC-16(2) @@ -5043,8 +5043,8 @@

Automated mechanisms permitting changes to values of security attributes

- - +
+ Maintenance of Attribute Associations by Information System @@ -5097,8 +5097,8 @@

Automated mechanisms maintaining association and integrity of security attributes to information

- - +
+ Association of Attributes by Authorized Individuals @@ -5154,8 +5154,8 @@

Automated mechanisms supporting user associations of security attributes to information

- - +
+ Attribute Displays for Output Devices @@ -5211,8 +5211,8 @@

System output devices displaying security attributes in human-readable form on each object

- - +
+ Maintenance of Attribute Association by Organization @@ -5271,8 +5271,8 @@

Automated mechanisms supporting associations of security attributes to subjects and objects

- - +
+ Consistent Attribute Interpretation AC-16(7) @@ -5311,8 +5311,8 @@

Automated mechanisms implementing access enforcement and information flow enforcement functions

- - +
+ Association Techniques / Technologies @@ -5367,8 +5367,8 @@

Automated mechanisms implementing techniques or technologies associating security attributes to information

- - +
+ Attribute Reassignment @@ -5416,8 +5416,8 @@

Automated mechanisms implementing techniques or procedures for reassigning association of security attributes to information

- - +
+ Attribute Configuration by Authorized Individuals AC-16(10) @@ -5454,7 +5454,7 @@

Automated mechanisms implementing capability for defining or changing security attributes

- +
Remote Access @@ -5567,7 +5567,7 @@

Remote access management capability for the information system

- + Automated Monitoring / Control AC-17(1) @@ -5607,8 +5607,8 @@

Automated mechanisms monitoring and controlling remote access methods

-
- +
+ Protection of Confidentiality / Integrity Using Encryption AC-17(2) @@ -5649,8 +5649,8 @@

Cryptographic mechanisms protecting confidentiality and integrity of remote access sessions

- - +
+ Managed Access Control Points @@ -5699,8 +5699,8 @@

Automated mechanisms routing all remote accesses through managed network access control points

- - +
+ Privileged Commands / Access @@ -5764,14 +5764,14 @@

Automated mechanisms implementing remote access management

- - +
+ Monitoring for Unauthorized Connections AC-17(5) Withdrawn SI-4 - - + + Protection of Information AC-17(6) @@ -5801,20 +5801,20 @@

organizational personnel with information security responsibilities

- - +
+ Additional Protection for Security Function Access AC-17(7) Withdrawn AC-3 (10) - - + + Disable Nonsecure Network Protocols AC-17(8) Withdrawn CM-7 - - + + Disconnect / Disable Access @@ -5862,7 +5862,7 @@

Automated mechanisms implementing capability to disconnect or disable remote access to information system

- +
Wireless Access @@ -5946,7 +5946,7 @@

Wireless access management capability for the information system

- + Authentication and Encryption @@ -6430,7 +6430,7 @@

Encryption mechanisms protecting confidentiality and integrity of information on mobile devices

-
+
Use of External Information Systems @@ -6493,7 +6493,7 @@

Automated mechanisms implementing terms and conditions on use of external information systems

- + Limits On Authorized Use AC-20(1) @@ -6548,8 +6548,8 @@

Automated mechanisms implementing limits on use of external information systems

-
- +
+ Portable Storage Devices @@ -6639,8 +6639,8 @@

Automated mechanisms implementing restrictions on the use of non-organizationally owned systems/components/devices

- - +
+ Network Accessible Storage Devices @@ -6690,7 +6690,7 @@

Automated mechanisms prohibiting the use of network accessible storage devices in external information systems

- +
Information Sharing @@ -6767,7 +6767,7 @@

Automated mechanisms or manual process implementing access authorizations supporting information sharing/user collaboration decisions

- + Automated Decision Support AC-21(1) @@ -6811,8 +6811,8 @@

Automated mechanisms implementing access authorizations supporting information sharing/user collaboration decisions

-
- +
+ Information Search and Retrieval @@ -6860,7 +6860,7 @@

Information system search and retrieval services enforcing information sharing restrictions

- +
Publicly Accessible Content @@ -7058,7 +7058,7 @@

Automated mechanisms applying established access control decisions and procedures

- + Transmit Access Authorization Information @@ -7121,8 +7121,8 @@

Automated mechanisms implementing access enforcement functions

-
- +
+ No User or Process Identity @@ -7171,7 +7171,7 @@

Automated mechanisms implementing access enforcement functions

- +
Reference Monitor @@ -7460,7 +7460,7 @@

Automated mechanisms managing security awareness training

- + Practical Exercises AT-2(1) @@ -7501,8 +7501,8 @@

Automated mechanisms implementing cyber attack simulations in practical exercises

-
- +
+ Insider Threat AT-2(2) @@ -7537,7 +7537,7 @@

organizational personnel with information security responsibilities

- +
Role-based Security Training @@ -7621,7 +7621,7 @@

Automated mechanisms managing role-based security training

- + Environmental Controls @@ -7678,8 +7678,8 @@

organizational personnel with responsibilities for employing and operating environmental controls

-
- +
+ Physical Security Controls @@ -7736,8 +7736,8 @@

organizational personnel with responsibilities for employing and operating physical security controls

- - +
+ Practical Exercises AT-3(3) @@ -7767,8 +7767,8 @@

organizational personnel that participate in security awareness training

- - +
+ Suspicious Communications and Anomalous System Behavior @@ -7810,7 +7810,7 @@

organizational personnel that participate in security awareness training

- +
Security Training Records @@ -8162,19 +8162,19 @@

Automated mechanisms implementing information system auditing

- + Compilation of Audit Records from Multiple Sources AU-2(1) Withdrawn AU-12 - - +
+ Selection of Audit Events by Component AU-2(2) Withdrawn AU-12 - - + + Reviews and Updates @@ -8223,13 +8223,13 @@

Automated mechanisms supporting review and update of auditable events

- - +
+ Privileged Functions AU-2(4) Withdrawn AC-6 (9) - + Content of Audit Records @@ -8298,7 +8298,7 @@

Automated mechanisms implementing information system auditing of auditable events

- + Additional Audit Information @@ -8348,8 +8348,8 @@

Information system audit capability

-
- +
+ Centralized Management of Planned Audit Record Content @@ -8401,7 +8401,7 @@

Information system capability implementing centralized management and configuration of audit record content

- +
Audit Storage Capacity @@ -8460,7 +8460,7 @@

Audit record storage capacity and related configuration settings

- + Transfer to Alternate Storage @@ -8510,7 +8510,7 @@

Automated mechanisms supporting transfer of audit records onto a different system

-
+
Response to Audit Processing Failures @@ -8590,7 +8590,7 @@

Automated mechanisms implementing information system response to audit processing failures

- + Audit Storage Capacity @@ -8666,8 +8666,8 @@

Automated mechanisms implementing audit storage limit warnings

-
- +
+ Real-time Alerts @@ -8744,8 +8744,8 @@

Automated mechanisms implementing real-time audit alerts when organization-defined audit failure events occur

- - +
+ Configurable Traffic Volume Thresholds @@ -8886,7 +8886,7 @@

Information system capability invoking system shutdown or degraded operational mode in the event of an audit processing failure

- +
Audit Review, Analysis, and Reporting @@ -8988,7 +8988,7 @@

organizational personnel with information security responsibilities

- + Process Integration AU-6(1) @@ -9055,14 +9055,14 @@

Automated mechanisms integrating audit review, analysis, and reporting processes

-
- +
+ Automated Security Alerts AU-6(2) Withdrawn SI-4 - - + + Correlate Audit Repositories AU-6(3) @@ -9100,8 +9100,8 @@

Automated mechanisms supporting analysis and correlation of audit records

- - +
+ Central Review and Analysis AU-6(4) @@ -9141,8 +9141,8 @@

Information system capability to centralize review and analysis of audit records

- - +
+ Integration / Scanning and Monitoring Capabilities @@ -9314,8 +9314,8 @@

Automated mechanisms supporting permitted actions for review, analysis, and reporting of audit information

- - +
+ Full Text Analysis of Privileged Commands AU-6(8) @@ -9365,8 +9365,8 @@

Automated mechanisms implementing capability to perform a full text analysis of audited privilege commands

- - +
+ Correlation with Information from Nontechnical Sources AU-6(9) @@ -9404,8 +9404,8 @@

Automated mechanisms implementing capability to correlate information from non-technical sources

- - +
+ Audit Level Adjustment AU-6(10) @@ -9454,7 +9454,7 @@

Automated mechanisms supporting review, analysis, and reporting of audit information

- +
Audit Reduction and Report Generation @@ -9525,7 +9525,7 @@

Audit reduction and report generation capability

- + Automatic Processing @@ -9577,8 +9577,8 @@

Audit reduction and report generation capability

-
- +
+ Automatic Sort and Search @@ -9628,7 +9628,7 @@

Audit reduction and report generation capability

- +
Time Stamps @@ -9699,7 +9699,7 @@

Automated mechanisms implementing time stamp generation

- + Synchronization with Authoritative Time Source @@ -9781,8 +9781,8 @@

Automated mechanisms implementing internal information system clock synchronization

-
- +
+ Secondary Authoritative Time Source AU-8(2) @@ -9816,7 +9816,7 @@

Automated mechanisms implementing internal information system clock authoritative time sources

- +
Protection of Audit Information @@ -9896,7 +9896,7 @@

Automated mechanisms implementing audit information protection

- + Hardware Write-once Media AU-9(1) @@ -9939,8 +9939,8 @@

Information system media storing audit trails

-
- +
+ Audit Backup On Separate Physical Systems / Components @@ -9992,8 +9992,8 @@

Automated mechanisms implementing the backing up of audit records

- - +
+ Cryptographic Protection AU-9(3) @@ -10043,8 +10043,8 @@

Cryptographic mechanisms protecting integrity of audit information and tools

- - +
+ Access by Subset of Privileged Users @@ -10096,8 +10096,8 @@

Automated mechanisms managing access to audit functionality

- - +
+ Dual Authorization @@ -12323,7 +12323,7 @@

Automated mechanisms implementing restrictions on external system connections

- +
Security Certification @@ -12421,7 +12421,7 @@

Automated mechanisms for developing, implementing, and maintaining plan of action and milestones

- + Automation Support for Accuracy / Currency CA-5(1) @@ -12466,7 +12466,7 @@

Automated mechanisms for developing, implementing and maintaining plan of action and milestones

-
+
Security Authorization @@ -12749,7 +12749,7 @@

Mechanisms implementing continuous monitoring

- + Independent Assessment @@ -12793,14 +12793,14 @@

organizational personnel with information security responsibilities

-
- +
+ Types of Assessments CA-7(2) Withdrawn CA-2 - - + + Trend Analyses CA-7(3) @@ -12846,7 +12846,7 @@

organizational personnel with information security responsibilities

- +
Penetration Testing @@ -12905,7 +12905,7 @@

Automated mechanisms supporting penetration testing

- + Independent Penetration Agent or Team CA-8(1) @@ -12938,8 +12938,8 @@

organizational personnel with information security responsibilities

-
- +
+ Red Team Exercises @@ -12999,7 +12999,7 @@

Automated mechanisms supporting employment of red team exercises

- +
Internal System Connections @@ -13084,7 +13084,7 @@

organizational personnel with information security responsibilities

- + Security Compliance Checks CA-9(1) @@ -13125,7 +13125,7 @@

Automated mechanisms supporting compliance checks

-
+
@@ -13337,7 +13337,7 @@

automated mechanisms supporting configuration control of the baseline configuration

- + Reviews and Updates @@ -13426,8 +13426,8 @@

automated mechanisms supporting review and update of the baseline configuration

-
- + + Automation Support for Accuracy / Currency CM-2(2) @@ -13485,8 +13485,8 @@

automated mechanisms implementing baseline configuration maintenance

-
- + + Retention of Previous Configurations @@ -13535,20 +13535,20 @@

Organizational processes for managing baseline configurations

-
- + + Unauthorized Software CM-2(4) Withdrawn CM-7 - - + + Authorized Software CM-2(5) Withdrawn CM-7 - - + + Development and Test Environments CM-2(6) @@ -13590,8 +13590,8 @@

automated mechanisms implementing separate baseline configurations for development, test, and operational environments

-
- + + Configure Systems, Components, or Devices for High-risk Areas @@ -13677,7 +13677,7 @@

Organizational processes for managing baseline configurations

-
+ Configuration Change Control @@ -13828,7 +13828,7 @@

automated mechanisms that implement configuration change control

- + Automated Document / Notification / Prohibition of Changes @@ -13954,8 +13954,8 @@

automated mechanisms implementing configuration change control activities

-
- +
+ Test / Validate / Document Changes CM-3(2) @@ -14010,8 +14010,8 @@

automated mechanisms supporting and/or implementing testing, validating, and documenting information system changes

- - +
+ Automated Change Implementation CM-3(3) @@ -14058,8 +14058,8 @@

automated mechanisms implementing changes to current information system baseline

- - +
+ Security Representative @@ -14105,8 +14105,8 @@

Organizational processes for configuration change control

- - +
+ Automated Security Response @@ -14160,8 +14160,8 @@

automated mechanisms implementing security responses to changes to the baseline configurations

- - +
+ Cryptography Management @@ -14213,7 +14213,7 @@

cryptographic mechanisms implementing organizational security safeguards

- +
Security Impact Analysis @@ -14263,7 +14263,7 @@

Organizational processes for security impact analysis

- + Separate Test Environments CM-4(1) @@ -14332,8 +14332,8 @@

automated mechanisms supporting and/or implementing security impact analysis of changes

-
- +
+ Verification of Security Functions CM-4(2) @@ -14386,7 +14386,7 @@

automated mechanisms supporting and/or implementing verification of security functions

- +
Access Restrictions for Change @@ -14468,7 +14468,7 @@

automated mechanisms supporting/implementing/enforcing access restrictions associated with changes to the information system

- + Automated Access Enforcement / Auditing CM-5(1) @@ -14521,8 +14521,8 @@

automated mechanisms supporting auditing of enforcement actions

-
- +
+ Review System Changes @@ -14590,8 +14590,8 @@

automated mechanisms supporting/implementing information system reviews to determine whether unauthorized changes have occurred

- - +
+ Signed Components @@ -14648,8 +14648,8 @@

automated mechanisms preventing installation of software and firmware components not signed with an organization-recognized and approved certificate

- - +
+ Dual Authorization @@ -14704,8 +14704,8 @@

automated mechanisms implementing dual authorization enforcement

- - +
+ Limit Production / Operational Privileges @@ -14777,8 +14777,8 @@

automated mechanisms supporting and/or implementing access restrictions for change

- - +
+ Limit Library Privileges CM-5(6) @@ -14819,13 +14819,13 @@

automated mechanisms supporting and/or implementing access restrictions for change

- - +
+ Automatic Implementation of Security Safeguards CM-5(7) Withdrawn SI-7 - + Configuration Settings @@ -14986,7 +14986,7 @@

automated mechanisms that identify and/or document deviations from established configuration settings

- + Automated Central Management / Application / Verification @@ -15064,8 +15064,8 @@

automated mechanisms implemented to centrally manage, apply, and verify information system configuration settings

-
- +
+ Respond to Unauthorized Changes @@ -15128,19 +15128,19 @@

automated mechanisms supporting and/or implementing security safeguards for response to unauthorized changes

- - +
+ Unauthorized Change Detection CM-6(3) Withdrawn SI-7 - - + + Conformance Demonstration CM-6(4) Withdrawn CM-4 - + Least Functionality @@ -15246,7 +15246,7 @@

automated mechanisms implementing restrictions or prohibition of functions, ports, protocols, and/or services

- + Periodic Review @@ -15394,8 +15394,8 @@

automated mechanisms implementing review and disabling of nonsecure functions, ports, protocols, and/or services

-
- +
+ Prevent Program Execution @@ -16144,8 +16144,8 @@

automated mechanisms implementing the information system component inventory

- - +
+ No Duplicate Accounting of Components CM-8(5) @@ -16184,8 +16184,8 @@

automated mechanisms implementing the information system component inventory

- - +
+ Assessed Configurations / Approved Deviations CM-8(6) @@ -16235,8 +16235,8 @@

automated mechanisms implementing the information system component inventory

- - +
+ Centralized Repository CM-8(7) @@ -16273,8 +16273,8 @@

Automated mechanisms implementing the information system component inventory in a centralized repository

- - +
+ Automated Location Tracking CM-8(8) @@ -16315,8 +16315,8 @@

automated mechanisms supporting tracking of information system components by geographic location

- - +
+ Assignment of Components to Systems @@ -16388,7 +16388,7 @@

automated mechanisms implementing acknowledgment of assignment of acquired components to the information system

- +
Configuration Management Plan @@ -16506,7 +16506,7 @@

automated mechanisms for protecting the configuration management plan

- + Assignment of Responsibility CM-9(1) @@ -16535,7 +16535,7 @@

organizational personnel with information security responsibilities

-
+
Software Usage Restrictions @@ -16608,7 +16608,7 @@

automated mechanisms implementing and controlling the use of peer-to-peer files sharing technology

- + Open Source Software @@ -16656,7 +16656,7 @@

automated mechanisms implementing restrictions on the use of open source software

-
+
User-installed Software @@ -16765,7 +16765,7 @@

automated mechanisms monitoring policy compliance

- + Alerts for Unauthorized Installations @@ -16819,8 +16819,8 @@

automated mechanisms for alerting personnel/roles when unauthorized installation of software is detected

-
- +
+ Prohibit Installation Without Privileged Status CM-11(2) @@ -16861,7 +16861,7 @@

automated mechanisms for prohibiting installation of software without privileged status (e.g., access controls)

- +
@@ -17244,7 +17244,7 @@

automated mechanisms for developing, reviewing, updating and/or protecting the contingency plan

- + Coordinate with Related Plans CP-2(1) @@ -17282,8 +17282,8 @@

personnel with responsibility for related plans

-
- + + Capacity Planning CP-2(2) @@ -17324,8 +17324,8 @@

organizational personnel with information security responsibilities

-
- + + Resume Essential Missions / Business Functions @@ -17374,8 +17374,8 @@

Organizational processes for resumption of missions and business functions

-
- + + Resume All Missions / Business Functions @@ -17424,8 +17424,8 @@

Organizational processes for resumption of missions and business functions

-
- + + Continue Essential Missions / Business Functions CP-2(5) @@ -17475,8 +17475,8 @@

Organizational processes for continuing missions and business functions

-
- + + Alternate Processing / Storage Site CP-2(6) @@ -17524,8 +17524,8 @@

Organizational processes for transfer of essential missions and business functions to alternate processing/storage sites

-
- + + Coordinate with External Service Providers CP-2(7) @@ -17560,8 +17560,8 @@

organizational personnel with information security responsibilities

-
- + + Identify Critical Assets CP-2(8) @@ -17593,7 +17593,7 @@

organizational personnel with information security responsibilities

-
+ Contingency Training @@ -17684,7 +17684,7 @@

Organizational processes for contingency training

- + Simulated Events CP-3(1) @@ -17718,8 +17718,8 @@

automated mechanisms for simulating contingency events

-
- +
+ Automated Training Environments CP-3(2) @@ -17753,7 +17753,7 @@

automated mechanisms for providing contingency training environments

- +
Contingency Plan Testing @@ -17841,7 +17841,7 @@

automated mechanisms supporting the contingency plan and/or contingency plan testing

- + Coordinate with Related Plans CP-4(1) @@ -17883,8 +17883,8 @@

organizational personnel with information security responsibilities

-
- +
+ Alternate Processing Site CP-4(2) @@ -17941,8 +17941,8 @@

automated mechanisms supporting the contingency plan and/or contingency plan testing

- - +
+ Automated Testing CP-4(3) @@ -17980,8 +17980,8 @@

automated mechanisms supporting contingency plan testing

- - +
+ Full Recovery / Reconstitution CP-4(4) @@ -18029,7 +18029,7 @@

automated mechanisms supporting recovery and reconstitution of the information system

- +
Contingency Plan Update @@ -18097,7 +18097,7 @@

automated mechanisms supporting and/or implementing storage and retrieval of information system backup information at the alternate storage site

- + Separation from Primary Site CP-6(1) @@ -18130,8 +18130,8 @@

organizational personnel with information security responsibilities

-
- +
+ Recovery Time / Point Objectives CP-6(2) @@ -18167,8 +18167,8 @@

automated mechanisms supporting recovery time/point objectives

- - +
+ Accessibility CP-6(3) @@ -18210,7 +18210,7 @@

organizational personnel with information security responsibilities

- +
Alternate Processing Site @@ -18307,7 +18307,7 @@

automated mechanisms supporting and/or implementing recovery at the alternate processing site

- + Separation from Primary Site CP-7(1) @@ -18340,8 +18340,8 @@

organizational personnel with information security responsibilities

-
- +
+ Accessibility CP-7(2) @@ -18382,8 +18382,8 @@

organizational personnel with information security responsibilities

- - +
+ Priority of Service CP-7(3) @@ -18415,8 +18415,8 @@

organizational personnel with responsibility for acquisitions/contractual agreements

- - +
+ Preparation for Use CP-7(4) @@ -18456,14 +18456,14 @@

Automated mechanisms supporting and/or implementing recovery at the alternate processing site

- - +
+ Equivalent Information Security Safeguards CP-7(5) Withdrawn CP-7 - - + + Inability to Return to Primary Site CP-7(6) @@ -18491,7 +18491,7 @@

organizational personnel with information security responsibilities

- +
Telecommunications Services @@ -18554,7 +18554,7 @@

Automated mechanisms supporting telecommunications

- + Priority of Service Provisions CP-8(1) @@ -18608,8 +18608,8 @@

Automated mechanisms supporting telecommunications

-
- +
+ Single Points of Failure CP-8(2) @@ -18637,8 +18637,8 @@

organizational personnel with information security responsibilities

- - +
+ Separation of Primary / Alternate Providers CP-8(3) @@ -18671,8 +18671,8 @@

organizational personnel with information security responsibilities

- - +
+ Provider Contingency Plan @@ -18749,8 +18749,8 @@

organizational personnel with responsibility for acquisitions/contractual agreements

- - +
+ Alternate Telecommunication Service Testing @@ -18795,7 +18795,7 @@

Automated mechanisms supporting testing alternate telecommunications services

- +
Information System Backup @@ -18902,7 +18902,7 @@

automated mechanisms supporting and/or implementing information system backups

- + Testing for Reliability / Integrity @@ -18951,8 +18951,8 @@

automated mechanisms supporting and/or implementing information system backups

-
- +
+ Test Restoration Using Sampling CP-9(2) @@ -18991,8 +18991,8 @@

automated mechanisms supporting and/or implementing information system backups

- - +
+ Separate Storage for Critical Information @@ -19044,14 +19044,14 @@

organizational personnel with information security responsibilities

- - +
+ Protection from Unauthorized Modification CP-9(4) Withdrawn CP-9 - - + + Transfer to Alternate Storage Site @@ -19105,8 +19105,8 @@

automated mechanisms supporting and/or implementing information transfer to the alternate storage site

- - +
+ Redundant Secondary System CP-9(6) @@ -19157,8 +19157,8 @@

automated mechanisms supporting and/or implementing information transfer to a redundant secondary system

- - +
+ Dual Authorization @@ -19210,7 +19210,7 @@

automated mechanisms supporting and/or implementing deletion/destruction of backup information

- +
Information System Recovery and Reconstitution @@ -19294,13 +19294,13 @@

automated mechanisms supporting and/or implementing information system recovery and reconstitution operations

- + Contingency Plan Testing CP-10(1) Withdrawn CP-4 - - +
+ Transaction Recovery CP-10(2) @@ -19340,14 +19340,14 @@

Automated mechanisms supporting and/or implementing transaction recovery capability

- - +
+ Compensating Security Controls CP-10(3) Withdrawn Chapter 3 - - + + Restore Within Time Period @@ -19398,14 +19398,14 @@

Automated mechanisms supporting and/or implementing recovery/reconstitution of information system information

- - +
+ Failover Capability CP-10(5) Withdrawn SI-13 - - + + Component Protection CP-10(6) @@ -19461,7 +19461,7 @@

automated mechanisms supporting and/or implementing protection of backup and restoration hardware, firmware, and software

- +
Alternate Communications Protocols @@ -19855,7 +19855,7 @@

automated mechanisms supporting and/or implementing identification and authentication capability

- + Network Access to Privileged Accounts IA-2(1) @@ -19895,8 +19895,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

-
- +
+ Network Access to Non-privileged Accounts IA-2(2) @@ -19933,8 +19933,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

- - +
+ Local Access to Privileged Accounts IA-2(3) @@ -19974,8 +19974,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

- - +
+ Local Access to Non-privileged Accounts IA-2(4) @@ -20012,8 +20012,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

- - +
+ Group Authentication IA-2(5) @@ -20053,8 +20053,8 @@

Automated mechanisms supporting and/or implementing authentication capability for group accounts

- - +
+ Network Access to Privileged Accounts - Separate Device @@ -20109,8 +20109,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

- - +
+ Network Access to Non-privileged Accounts - Separate Device @@ -20162,8 +20162,8 @@

Automated mechanisms supporting and/or implementing multifactor authentication capability

- - +
+ Network Access to Privileged Accounts - Replay Resistant IA-2(8) @@ -20204,8 +20204,8 @@

automated mechanisms supporting and/or implementing replay resistant authentication mechanisms

- - +
+ Network Access to Non-privileged Accounts - Replay Resistant IA-2(9) @@ -20246,8 +20246,8 @@

automated mechanisms supporting and/or implementing replay resistant authentication mechanisms

- - +
+ Single Sign-on @@ -20300,8 +20300,8 @@

automated mechanisms supporting and/or implementing single sign-on capability for information system accounts and services

- - +
+ Remote Access - Separate Device @@ -20369,8 +20369,8 @@

Automated mechanisms supporting and/or implementing identification and authentication capability

- - +
+ Acceptance of PIV Credentials IA-2(12) @@ -20423,8 +20423,8 @@

Automated mechanisms supporting and/or implementing acceptance and verification of PIV credentials

- - +
+ Out-of-band Authentication @@ -20485,7 +20485,7 @@

Automated mechanisms supporting and/or implementing out-of-band authentication capability

- +
Device Identification and Authentication @@ -20574,7 +20574,7 @@

Automated mechanisms supporting and/or implementing device identification and authentication capability

- + Cryptographic Bidirectional Authentication @@ -20659,14 +20659,14 @@

cryptographically based bidirectional authentication mechanisms

-
- +
+ Cryptographic Bidirectional Network Authentication IA-3(2) Withdrawn IA-3 (1) - - + + Dynamic Address Allocation @@ -20748,8 +20748,8 @@

automated mechanisms supporting and/or implanting auditing of lease information

- - +
+ Device Attestation @@ -20802,7 +20802,7 @@

cryptographic mechanisms supporting device attestation

- +
Identifier Management @@ -20989,7 +20989,7 @@

Automated mechanisms supporting and/or implementing identifier management

- + Prohibit Account Identifiers as Public Identifiers IA-4(1) @@ -21028,8 +21028,8 @@

Automated mechanisms supporting and/or implementing identifier management

-
- +
+ Supervisor Authorization IA-4(2) @@ -21065,8 +21065,8 @@

Automated mechanisms supporting and/or implementing identifier management

- - +
+ Multiple Forms of Certification IA-4(3) @@ -21103,8 +21103,8 @@

Automated mechanisms supporting and/or implementing identifier management

- - +
+ Identify User Status @@ -21152,8 +21152,8 @@

Automated mechanisms supporting and/or implementing identifier management

- - +
+ Dynamic Management IA-4(5) @@ -21193,8 +21193,8 @@

Automated mechanisms supporting and/or implementing dynamic identifier management

- - +
+ Cross-organization Management @@ -21240,8 +21240,8 @@

Automated mechanisms supporting and/or implementing identifier management

- - +
+ In-person Registration IA-4(7) @@ -21272,7 +21272,7 @@

organizational personnel with information security responsibilities

- +
Authenticator Management @@ -21479,7 +21479,7 @@

Automated mechanisms supporting and/or implementing authenticator management capability

- + Password-based Authentication @@ -21634,8 +21634,8 @@

Automated mechanisms supporting and/or implementing password-based authenticator management capability

-
- +
+ Pki-based Authentication IA-5(2) @@ -21723,8 +21723,8 @@

Automated mechanisms supporting and/or implementing PKI-based, authenticator management capability

- - +
+ In-person or Trusted Third-party Registration @@ -21796,8 +21796,8 @@

organizational personnel with information security responsibilities

- - +
+ Automated Support for Password Strength Determination @@ -21850,8 +21850,8 @@

automated tools for determining password strength

- - +
+ Change Authenticators Prior to Delivery IA-5(5) @@ -21897,8 +21897,8 @@

Automated mechanisms supporting and/or implementing authenticator management capability

- - +
+ Protection of Authenticators IA-5(6) @@ -21938,8 +21938,8 @@

automated mechanisms protecting authenticators

- - +
+ No Embedded Unencrypted Static Authenticators IA-5(7) @@ -21991,8 +21991,8 @@

automated mechanisms implementing authentication in applications

- - +
+ Multiple Information System Accounts @@ -22040,8 +22040,8 @@

Automated mechanisms supporting and/or implementing safeguards for authenticator management

- - +
+ Cross-organization Credential Management @@ -22089,8 +22089,8 @@

Automated mechanisms supporting and/or implementing safeguards for authenticator management

- - +
+ Dynamic Credential Association IA-5(10) @@ -22130,8 +22130,8 @@

automated mechanisms implementing dynamic provisioning of identifiers

- - +
+ Hardware Token-based Authentication @@ -22183,8 +22183,8 @@

Automated mechanisms supporting and/or implementing hardware token-based authenticator management capability

- - +
+ Biometric-based Authentication @@ -22236,8 +22236,8 @@

Automated mechanisms supporting and/or implementing biometric-based authenticator management capability

- - +
+ Expiration of Cached Authenticators @@ -22284,8 +22284,8 @@

Automated mechanisms supporting and/or implementing authenticator management capability

- - +
+ Managing Content of PKI Trust Stores IA-5(14) @@ -22340,8 +22340,8 @@

automated mechanisms supporting and/or implementing the PKI trust store capability

- - +
+ Ficam-approved Products and Services IA-5(15) @@ -22381,7 +22381,7 @@

automated mechanisms supporting and/or implementing identification and authentication management capability for the information system

- +
Authenticator Feedback @@ -22524,7 +22524,7 @@

Automated mechanisms supporting and/or implementing identification and authentication capability

- + Acceptance of PIV Credentials from Other Agencies IA-8(1) @@ -22578,8 +22578,8 @@

automated mechanisms that accept and verify PIV credentials

-
- +
+ Acceptance of Third-party Credentials IA-8(2) @@ -22624,8 +22624,8 @@

automated mechanisms that accept FICAM-approved credentials

- - +
+ Use of Ficam-approved Products @@ -22683,8 +22683,8 @@

Automated mechanisms supporting and/or implementing identification and authentication capability

- - +
+ Use of Ficam-issued Profiles IA-8(4) @@ -22730,8 +22730,8 @@

automated mechanisms supporting and/or implementing conformance with FICAM-issued profiles

- - +
+ Acceptance of PIV-I Credentials IA-8(5) @@ -22783,7 +22783,7 @@

automated mechanisms that accept and verify PIV-I credentials

- +
Service Identification and Authentication @@ -22844,7 +22844,7 @@

Security safeguards implementing service identification and authentication capability

- + Information Exchange IA-9(1) @@ -22892,8 +22892,8 @@

Automated mechanisms implementing service identification and authentication capabilities

-
- +
+ Transmission of Decisions @@ -22946,7 +22946,7 @@

Automated mechanisms implementing service identification and authentication capabilities

- +
Adaptive Identification and Authentication @@ -23304,7 +23304,7 @@

organizational personnel with information security responsibilities

- + Simulated Events IR-2(1) @@ -23338,8 +23338,8 @@

Automated mechanisms that support and/or implement simulated events for incident response training

-
- +
+ Automated Training Environments IR-2(2) @@ -23374,7 +23374,7 @@

Automated mechanisms that provide a thorough and realistic incident response training environment

- +
Incident Response Testing @@ -23433,7 +23433,7 @@

organizational personnel with information security responsibilities

- + Automated Testing IR-3(1) @@ -23476,8 +23476,8 @@

Automated mechanisms that more thoroughly and effectively test the incident response capability

-
- +
+ Coordination with Related Plans IR-3(2) @@ -23516,7 +23516,7 @@

organizational personnel with information security responsibilities

- +
Incident Handling @@ -23646,7 +23646,7 @@

Incident handling capability for the organization

- + Automated Incident Handling Processes IR-4(1) @@ -23685,8 +23685,8 @@

Automated mechanisms that support and/or implement the incident handling process

-
- +
+ Dynamic Reconfiguration @@ -23743,8 +23743,8 @@

Automated mechanisms that support and/or implement dynamic reconfiguration of components as part of incident response

- - +
+ Continuity of Operations @@ -23799,8 +23799,8 @@

Automated mechanisms that support and/or implement continuity of operations

- - +
+ Information Correlation IR-4(4) @@ -23847,8 +23847,8 @@

automated mechanisms that support and or implement correlation of incident response information with individual incident responses

- - +
+ Automatic Disabling of Information System @@ -23896,8 +23896,8 @@

automated mechanisms supporting and/or implementing automatic disabling of the information system

- - +
+ Insider Threats - Specific Capabilities IR-4(6) @@ -23936,8 +23936,8 @@

Incident handling capability for the organization

- - +
+ Insider Threats - Intra-organization Coordination @@ -23984,8 +23984,8 @@

Organizational processes for coordinating incident handling

- - +
+ Correlation with External Organizations @@ -24041,8 +24041,8 @@

Organizational processes for coordinating incident handling information with external organizations

- - +
+ Dynamic Response Capability @@ -24094,8 +24094,8 @@

automated mechanisms supporting and/or implementing the dynamic response capability for the organization

- - +
+ Supply Chain Coordination IR-4(10) @@ -24128,7 +24128,7 @@

organizational personnel with supply chain responsibilities

- +
Incident Monitoring @@ -24184,7 +24184,7 @@

automated mechanisms supporting and/or implementing tracking and documenting of system security incidents

- + Automated Tracking / Data Collection / Analysis IR-5(1) @@ -24237,7 +24237,7 @@

Automated mechanisms assisting in tracking of security incidents and in the collection and analysis of incident information

-
+
Incident Reporting @@ -24319,7 +24319,7 @@

automated mechanisms supporting and/or implementing incident reporting

- + Automated Reporting IR-6(1) @@ -24358,8 +24358,8 @@

automated mechanisms supporting and/or implementing reporting of security incidents

-
- +
+ Vulnerabilities Related to Incidents @@ -24406,8 +24406,8 @@

automated mechanisms supporting and/or implementing reporting of vulnerabilities associated with security incidents

- - +
+ Coordination with Supply Chain IR-6(3) @@ -24447,7 +24447,7 @@

automated mechanisms supporting and/or implementing reporting of incident information involved in the supply chain

- +
Incident Response Assistance @@ -24499,7 +24499,7 @@

automated mechanisms supporting and/or implementing incident response assistance

- + Automation Support for Availability of Information / Support IR-7(1) @@ -24539,8 +24539,8 @@

automated mechanisms supporting and/or implementing an increase in the availability of incident response information and support

-
- +
+ Coordination with External Providers IR-7(2) @@ -24588,7 +24588,7 @@

organizational personnel with information security responsibilities

- +
Incident Response Plan @@ -24933,7 +24933,7 @@

automated mechanisms supporting and/or implementing information spillage response actions and related communications

- + Responsible Personnel @@ -24970,8 +24970,8 @@

organizational personnel with information security responsibilities

-
- +
+ Training @@ -25010,8 +25010,8 @@

organizational personnel with information security responsibilities

- - +
+ Post-spill Operations @@ -25057,8 +25057,8 @@

Organizational processes for post-spill operations

- - +
+ Exposure to Unauthorized Personnel @@ -25106,7 +25106,7 @@

automated mechanisms supporting and/or implementing safeguards for personnel exposed to information not within assigned access authorizations

- +
Integrated Information Security Analysis Team @@ -25461,13 +25461,13 @@

automated mechanisms implementing sanitization of information system components

- + Record Content MA-2(1) Withdrawn MA-2 - - +
+ Automated Maintenance Activities MA-2(2) @@ -25552,7 +25552,7 @@

automated mechanisms supporting and/or implementing production of records of maintenance and repair actions

- +
Maintenance Tools @@ -25606,7 +25606,7 @@

automated mechanisms supporting and/or implementing approval, control, and/or monitoring of maintenance tools

- + Inspect Tools MA-3(1) @@ -25644,8 +25644,8 @@

automated mechanisms supporting and/or implementing inspection of maintenance tools

-
- +
+ Inspect Media MA-3(2) @@ -25682,8 +25682,8 @@

automated mechanisms supporting and/or implementing inspection of media used for maintenance

- - +
+ Prevent Unauthorized Removal @@ -25770,8 +25770,8 @@

automated mechanisms supporting verification of media sanitization

- - +
+ Restricted Tool Use MA-3(4) @@ -25813,7 +25813,7 @@

automated mechanisms supporting and/or implementing restricted use of maintenance tools

- +
Nonlocal Maintenance @@ -25942,7 +25942,7 @@

automated mechanisms for terminating nonlocal maintenance sessions and network connections

- + Auditing and Review @@ -26014,8 +26014,8 @@

automated mechanisms supporting and/or implementing audit and review of nonlocal maintenance

-
- +
+ Document Nonlocal Maintenance MA-4(2) @@ -26051,8 +26051,8 @@

organizational personnel with information security responsibilities

- - +
+ Comparable Security / Sanitization MA-4(3) @@ -26129,8 +26129,8 @@

automated mechanisms supporting and/or implementing component sanitization and inspection

- - +
+ Authentication / Separation of Maintenance Sessions @@ -26217,8 +26217,8 @@

automated mechanisms implementing logically separated/encrypted communications paths

- - +
+ Approvals and Notifications @@ -26296,8 +26296,8 @@

automated mechanisms supporting notification and approval of nonlocal maintenance

- - +
+ Cryptographic Protection MA-4(6) @@ -26339,8 +26339,8 @@

Cryptographic mechanisms protecting nonlocal maintenance and diagnostic communications

- - +
+ Remote Disconnect Verification MA-4(7) @@ -26382,7 +26382,7 @@

Automated mechanisms implementing remote disconnect verifications of terminated nonlocal maintenance and diagnostic sessions

- +
Maintenance Personnel @@ -26461,7 +26461,7 @@

automated mechanisms supporting and/or implementing authorization of maintenance personnel

- + Individuals Without Appropriate Access MA-5(1) @@ -26568,8 +26568,8 @@

automated mechanisms supporting and/or implementing information storage component sanitization

-
- +
+ Security Clearances for Classified Systems MA-5(2) @@ -26625,8 +26625,8 @@

Organizational processes for managing security clearances for maintenance personnel

- - +
+ Citizenship Requirements for Classified Systems MA-5(3) @@ -26659,8 +26659,8 @@

organizational personnel with information security responsibilities

- - +
+ Foreign Nationals MA-5(4) @@ -26728,8 +26728,8 @@

Organizational processes for managing foreign national maintenance personnel

- - +
+ Nonsystem-related Maintenance MA-5(5) @@ -26764,7 +26764,7 @@

organizational personnel with information security responsibilities

- +
Timely Maintenance @@ -26835,7 +26835,7 @@

Organizational processes for ensuring timely maintenance

- + Preventive Maintenance @@ -26893,8 +26893,8 @@

automated mechanisms supporting and/or implementing preventive maintenance

-
- +
+ Predictive Maintenance @@ -26952,8 +26952,8 @@

automated mechanisms supporting and/or implementing predictive maintenance

- - +
+ Automated Support for Predictive Maintenance MA-6(3) @@ -26993,7 +26993,7 @@

operations of the computer maintenance management system

- +
@@ -27212,18 +27212,18 @@

automated mechanisms supporting and/or implementing media access restrictions

- + Automated Restricted Access MP-2(1) Withdrawn MP-4 (2) - - + + Cryptographic Protection MP-2(2) Withdrawn SC-28 (1) - + Media Marking @@ -27398,13 +27398,13 @@

automated mechanisms supporting and/or implementing secure media storage/media protection

- + Cryptographic Protection MP-4(1) Withdrawn SC-28 (1) - - +
+ Automated Restricted Access MP-4(2) @@ -27463,7 +27463,7 @@

automated mechanisms auditing access attempts and access granted to media storage areas

- +
Media Transport @@ -27564,19 +27564,19 @@

automated mechanisms supporting and/or implementing media storage/media protection

- + Protection Outside of Controlled Areas MP-5(1) Withdrawn MP-5 - - +
+ Documentation of Activities MP-5(2) Withdrawn MP-5 - - + + Custodians MP-5(3) @@ -27606,8 +27606,8 @@

organizational personnel with information security responsibilities

- - +
+ Cryptographic Protection MP-5(4) @@ -27645,7 +27645,7 @@

Cryptographic mechanisms protecting information on digital media during transportation outside controlled areas

- +
Media Sanitization @@ -27752,7 +27752,7 @@

automated mechanisms supporting and/or implementing media sanitization

- + Review / Approve / Track / Document / Verify MP-6(1) @@ -27814,8 +27814,8 @@

automated mechanisms supporting and/or implementing media sanitization

-
- +
+ Equipment Testing @@ -27863,8 +27863,8 @@

automated mechanisms supporting and/or implementing media sanitization

- - +
+ Nondestructive Techniques @@ -27913,26 +27913,26 @@

automated mechanisms supporting and/or implementing media sanitization

- - +
+ Controlled Unclassified Information MP-6(4) Withdrawn MP-6 - - + + Classified Information MP-6(5) Withdrawn MP-6 - - + + Media Destruction MP-6(6) Withdrawn MP-6 - - + + Dual Authorization @@ -27985,8 +27985,8 @@

automated mechanisms supporting and/or implementing dual authorization

- - +
+ Remote Purging / Wiping of Information @@ -28051,7 +28051,7 @@

automated mechanisms supporting and/or implementing purge/wipe capabilities

- +
Media Use @@ -28145,7 +28145,7 @@

automated mechanisms restricting or prohibiting use of information system media on information systems or system components

- + Prohibit Use Without Owner MP-7(1) @@ -28187,8 +28187,8 @@

automated mechanisms prohibiting use of media on information systems or system components

-
- +
+ Prohibit Use of Sanitization-resistant Media MP-7(2) @@ -28226,7 +28226,7 @@

automated mechanisms prohibiting use of media on information systems or system components

- +
Media Downgrading @@ -28327,7 +28327,7 @@

automated mechanisms supporting and/or implementing media downgrading

- + Documentation of Process MP-8(1) @@ -28364,8 +28364,8 @@

automated mechanisms supporting and/or implementing media downgrading

-
- +
+ Equipment Testing @@ -28424,8 +28424,8 @@

automated mechanisms supporting and/or implementing tests for downgrading equipment

- - +
+ Controlled Unclassified Information @@ -28470,8 +28470,8 @@

automated mechanisms supporting and/or implementing media downgrading

- - +
+ Classified Information MP-8(4) @@ -28509,7 +28509,7 @@

automated mechanisms supporting and/or implementing media downgrading

- +
@@ -28759,7 +28759,7 @@

automated mechanisms supporting and/or implementing physical access authorizations

- + Access by Position / Role PE-2(1) @@ -28799,8 +28799,8 @@

automated mechanisms supporting and/or implementing physical access authorizations

-
- + + Two Forms of Identification @@ -28853,8 +28853,8 @@

automated mechanisms supporting and/or implementing physical access authorizations

-
- + + Restrict Unescorted Access @@ -30617,7 +30617,7 @@

the alternate power supply

-
+ Emergency Lighting @@ -30665,7 +30665,7 @@

Automated mechanisms supporting and/or implementing emergency lighting capability

- + Essential Missions / Business Functions PE-12(1) @@ -30699,7 +30699,7 @@

Automated mechanisms supporting and/or implementing emergency lighting capability

-
+
Fire Protection @@ -30745,7 +30745,7 @@

Automated mechanisms supporting and/or implementing fire suppression/detection devices/systems

- + Detection Devices / Systems @@ -30816,8 +30816,8 @@

automated notifications

-
- +
+ Suppression Devices / Systems @@ -30883,8 +30883,8 @@

automated notifications

- - +
+ Automatic Fire Suppression PE-13(3) @@ -30920,8 +30920,8 @@

activation of fire suppression devices/systems (simulated)

- - +
+ Inspections @@ -30973,7 +30973,7 @@

organizational personnel with information security responsibilities

- +
Temperature and Humidity Controls @@ -31066,7 +31066,7 @@

Automated mechanisms supporting and/or implementing maintenance and monitoring of temperature and humidity levels

- + Automatic Controls PE-14(1) @@ -31108,8 +31108,8 @@

Automated mechanisms supporting and/or implementing temperature and humidity levels

-
- +
+ Monitoring with Alarms / Notifications PE-14(2) @@ -31158,7 +31158,7 @@

Automated mechanisms supporting and/or implementing temperature and humidity monitoring

- +
Water Damage Protection @@ -31211,7 +31211,7 @@

organizational process for activating master water-shutoff

- + Automation Support @@ -31263,7 +31263,7 @@

Automated mechanisms supporting and/or implementing water detection capability and alerts for the information system

-
+
Delivery and Removal @@ -31484,7 +31484,7 @@

Organizational processes for positioning information system components

- + Facility Site PE-18(1) @@ -31536,7 +31536,7 @@

Organizational processes for site planning

-
+
Information Leakage @@ -31575,7 +31575,7 @@

Automated mechanisms supporting and/or implementing protection from information leakage due to electromagnetic signals emanations

- + National Emissions / Tempest Policies and Procedures PE-19(1) @@ -31618,7 +31618,7 @@

Information system components for compliance with national emissions and TEMPEST policies and procedures

-
+
Asset Monitoring and Tracking @@ -32067,19 +32067,19 @@

automated mechanisms supporting the information system security plan

- + Concept of Operations PL-2(1) Withdrawn PL-7 - - +
+ Functional Architecture PL-2(2) Withdrawn PL-8 - - + + Plan / Coordinate with Other Organizational Entities @@ -32125,7 +32125,7 @@

organizational personnel with information security responsibilities

- +
System Security Plan Update @@ -32239,7 +32239,7 @@

automated mechanisms supporting and/or implementing the establishment, review, dissemination, and update of rules of behavior

- + Social Media and Networking Restrictions PL-4(1) @@ -32283,7 +32283,7 @@

automated mechanisms supporting and/or implementing the establishment of rules of behavior

-
+
Privacy Impact Assessment @@ -32482,7 +32482,7 @@

automated mechanisms supporting and/or implementing the development, review, and update of the information security architecture

- + Defense-in-depth @@ -32558,8 +32558,8 @@

automated mechanisms supporting and/or implementing the design of the information security architecture

-
- +
+ Supplier Diversity @@ -32617,7 +32617,7 @@

Organizational processes for obtaining information security safeguards from different suppliers

- +
Central Management @@ -32974,7 +32974,7 @@

Organizational processes for personnel screening

- + Classified Information PS-3(1) @@ -33017,8 +33017,8 @@

Organizational processes for clearing and indoctrinating personnel for access to classified information

-
- +
+ Formal Indoctrination PS-3(2) @@ -33054,8 +33054,8 @@

Organizational processes for formal indoctrination for all relevant types of information to which personnel have access

- - +
+ Information with Special Protection Measures @@ -33120,7 +33120,7 @@

organizational process for additional personnel screening for information requiring special protection

- +
Personnel Termination @@ -33253,7 +33253,7 @@

automated mechanisms for disabling information system access/revoking authenticators

- + Post-employment Requirements PS-4(1) @@ -33306,8 +33306,8 @@

Organizational processes for post-employment requirements

-
- +
+ Automated Notification @@ -33356,7 +33356,7 @@

automated mechanisms supporting and/or implementing personnel termination notifications

- +
Personnel Transfer @@ -33578,13 +33578,13 @@

automated mechanisms supporting access agreements

- + Information Requiring Special Protection PS-6(1) Withdrawn PS-3 - - +
+ Classified Information Requiring Special Protection PS-6(2) @@ -33649,8 +33649,8 @@

Organizational processes for access to classified information requiring special protection

- - +
+ Post-employment Requirements PS-6(3) @@ -33706,7 +33706,7 @@

automated mechanisms supporting notifications and individual acknowledgements of post-employment requirements

- +
Third-party Personnel Security @@ -34487,7 +34487,7 @@

automated mechanisms supporting and/or implementing vulnerability scanning, analysis, remediation, and information sharing

- + Update Tool Capability RA-5(1) @@ -34527,8 +34527,8 @@

automated mechanisms/tools supporting and/or implementing vulnerability scanning

-
- +
+ Update by Frequency / Prior to New Scan / When Identified @@ -35570,8 +35570,8 @@

automated mechanisms supporting and/or implementing development of system design details

- - +
+ Development Methods / Techniques / Practices @@ -35653,14 +35653,14 @@

Organizational processes for development methods, techniques, and processes

- - +
+ Assignment of Components to Systems SA-4(4) Withdrawn CM-8 (9) - - + + System / Component / Service Configurations @@ -35729,8 +35729,8 @@

Automated mechanisms used to verify that the configuration of the information system, component, or service, as delivered, is as specified

- - +
+ Use of Information Assurance Products SA-4(6) @@ -35791,8 +35791,8 @@

Organizational processes for selecting and employing evaluated and/or validated information assurance products and services that compose an NSA-approved solution to protect classified information

- - +
+ Niap-approved Protection Profiles SA-4(7) @@ -35851,8 +35851,8 @@

Organizational processes for selecting and employing products/services evaluated against a NIAP-approved protection profile or FIPS-validated products

- - +
+ Continuous Monitoring Plan @@ -35907,8 +35907,8 @@

automated mechanisms supporting and/or implementing developer continuous monitoring

- - +
+ Functions / Ports / Protocols / Services in Use SA-4(9) @@ -35964,8 +35964,8 @@

organizational personnel with information security responsibilities

- - +
+ Use of Approved PIV Products SA-4(10) @@ -36005,7 +36005,7 @@

Organizational processes for selecting and employing FIPS 201-approved products

- +
Information System Documentation @@ -36192,36 +36192,36 @@

Organizational processes for obtaining, protecting, and distributing information system administrator and user documentation

- + Functional Properties of Security Controls SA-5(1) Withdrawn SA-4 (1) - - +
+ Security-relevant External System Interfaces SA-5(2) Withdrawn SA-4 (2) - - + + High-level Design SA-5(3) Withdrawn SA-4 (2) - - + + Low-level Design SA-5(4) Withdrawn SA-4 (2) - - + + Source Code SA-5(5) Withdrawn SA-4 (2) - + Software Usage Restrictions @@ -36402,7 +36402,7 @@

automated mechanisms for monitoring security control compliance by external service providers on an ongoing basis

- + Risk Assessments / Organizational Approvals @@ -36474,8 +36474,8 @@

automated mechanisms supporting and/or implementing approval processes

-
- +
+ Identification of Functions / Ports / Protocols / Services @@ -36537,8 +36537,8 @@

external providers of information system services

- - +
+ Establish / Maintain Trust Relationship with Providers @@ -36595,8 +36595,8 @@

external providers of information system services

- - +
+ Consistent Interests of Consumers and Providers @@ -36656,8 +36656,8 @@

automated mechanisms supporting and/or implementing safeguards to ensure consistent interests with external service providers

- - +
+ Processing, Storage, and Service Location @@ -38357,8 +38357,8 @@

automated mechanisms supporting and/or implementing the analysis/testing of supply chain elements, processes, and actors

- - +
+ Inter-organizational Agreements SA-12(12) @@ -38404,8 +38404,8 @@

Organizational processes for establishing inter-organizational agreements and procedures with supply chain entities

- - +
+ Critical Information System Components @@ -38461,8 +38461,8 @@

automated mechanisms supporting and/or implementing the security safeguards that ensure an adequate supply of critical information system components

- - +
+ Identity and Traceability @@ -38523,8 +38523,8 @@

automated mechanisms supporting and/or implementing the definition, establishment, and retention of unique identification for supply chain elements, processes, and actors

- - +
+ Processes to Address Weaknesses or Deficiencies SA-12(15) @@ -38562,7 +38562,7 @@

automated mechanisms supporting and/or implementing the addressing of weaknesses or deficiencies in supply chain elements

- +
Trustworthiness @@ -38706,12 +38706,12 @@

organizational personnel with responsibilities for performing criticality analysis for the information system

- + Critical Components with No Viable Alternative Sourcing SA-14(1) Withdrawn SA-20 - +
Development Process, Standards, and Tools @@ -38850,7 +38850,7 @@

system developer

- + Quality Metrics @@ -39970,8 +39970,8 @@

organizational personnel with security architecture and design responsibilities

-
- +
+ Conceptually Simple Design SA-17(5) @@ -40027,8 +40027,8 @@

organizational personnel with security architecture and design responsibilities

- - +
+ Structure for Testing SA-17(6) @@ -40066,8 +40066,8 @@

organizational personnel with security architecture and design responsibilities

- - +
+ Structure for Least Privilege SA-17(7) @@ -40106,7 +40106,7 @@

organizational personnel with security architecture and design responsibilities

- +
Tamper Resistance and Detection @@ -40149,7 +40149,7 @@

automated mechanisms supporting and/or implementing the tamper protection program

- + Multiple Phases of SDLC SA-18(1) @@ -40210,8 +40210,8 @@

automated mechanisms supporting and/or implementing anti-tamper technologies

-
- +
+ Inspection of Information Systems, Components, or Devices @@ -40293,7 +40293,7 @@

automated mechanisms supporting and/or implementing tampering detection

- +
Component Authenticity @@ -40391,7 +40391,7 @@

automated mechanisms supporting and/or implementing anti-counterfeit detection, prevention, and reporting

- + Anti-counterfeit Training @@ -40438,8 +40438,8 @@

Organizational processes for anti-counterfeit training

-
- +
+ Configuration Control for Component Service / Repair @@ -40496,8 +40496,8 @@

automated mechanisms supporting and/or implementing configuration management

- - +
+ Component Disposal @@ -40548,8 +40548,8 @@

automated mechanisms supporting and/or implementing system component disposal

- - +
+ Anti-counterfeit Scanning @@ -40597,7 +40597,7 @@

automated mechanisms supporting and/or implementing anti-counterfeit scanning

- +
Customized Development of Critical Components @@ -40736,7 +40736,7 @@

automated mechanisms supporting developer screening

- + Validation of Screening @@ -40789,7 +40789,7 @@

automated mechanisms supporting developer screening

-
+
Unsupported System Components @@ -40854,7 +40854,7 @@

automated mechanisms supporting and/or implementing replacement of unsupported system components

- + Alternative Sources for Continued Support @@ -43168,8 +43168,8 @@

organizational processes for defining and implementing alternative physical safeguards

-
- +
+ Pre / Post Transmission Handling @@ -43665,8 +43665,8 @@

Automated mechanisms supporting and/or implementing symmetric cryptographic key establishment and management

- - +
+ Asymmetric Keys @@ -46145,8 +46145,8 @@

automated mechanisms supporting and/or implementing the capability to reduce the bandwidth of covert channels

- - +
+ Measure Bandwidth in Operational Environments @@ -46198,7 +46198,7 @@

automated mechanisms supporting and/or implementing the capability to measure the bandwidth of covert channels

- +
Information System Partitioning @@ -46353,7 +46353,7 @@

automated mechanisms supporting and/or implementing loading and executing applications from hardware-enforced, read-only media

- + No Writable Storage @@ -46407,8 +46407,8 @@

automated mechanisms supporting and/or implementing persistent non-writeable storage across component restart and power on/off

-
- +
+ Integrity Protection / Read-only Media SC-34(2) @@ -46465,8 +46465,8 @@

Automated mechanisms supporting and/or implementing capability for protecting information integrity on read-only media prior to storage and after information has been recorded onto the media

- - +
+ Hardware-based Protection @@ -46541,7 +46541,7 @@

automated mechanisms supporting and/or implementing hardware-based, write-protection for firmware

- +
Honeyclients @@ -46646,7 +46646,7 @@

automated mechanisms supporting and/or implementing capability for distributing processing and storage across multiple physical locations

- + Polling Techniques @@ -46698,7 +46698,7 @@

Automated mechanisms supporting and/or implementing polling techniques

-
+
Out-of-band Channels @@ -46783,7 +46783,7 @@

automated mechanisms supporting and/or implementing use of out-of-band channels

- + Ensure Delivery / Transmission @@ -46855,7 +46855,7 @@

automated mechanisms supporting/implementing safeguards to ensure delivery of designated information, system components, or devices

-
+
Operations Security @@ -46957,7 +46957,7 @@

Automated mechanisms supporting and/or implementing separate execution domains for each executing process

- + Hardware Separation SC-39(1) @@ -46998,8 +46998,8 @@

Information system capability implementing underlying hardware separation mechanisms for process separation

-
- +
+ Thread Isolation @@ -47049,7 +47049,7 @@

Information system capability implementing a separate execution domain for each thread in multi-threaded processing

- +
Wireless Link Protection @@ -47123,7 +47123,7 @@

Automated mechanisms supporting and/or implementing protection of wireless links

- + Electromagnetic Interference @@ -47180,8 +47180,8 @@

Cryptographic mechanisms enforcing protections against effects of intentional electromagnetic interference

-
- +
+ Reduce Detection Potential @@ -47238,8 +47238,8 @@

Cryptographic mechanisms enforcing protections to reduce detection of wireless links

- - +
+ Imitative or Manipulative Communications Deception SC-40(3) @@ -47291,8 +47291,8 @@

Cryptographic mechanisms enforcing wireless link protections against imitative or manipulative communications deception

- - +
+ Signal Parameter Identification @@ -47347,7 +47347,7 @@

Cryptographic mechanisms preventing the identification of wireless transmitters

- +
Port and I/O Device Access @@ -47484,7 +47484,7 @@

automated mechanisms implementing capability to indicate sensor use

- + Reporting to Authorized Individuals or Roles @@ -47537,8 +47537,8 @@

sensor data collection and reporting capability for the information system

-
- +
+ Authorized Use @@ -47598,8 +47598,8 @@

sensor information collection capability for the information system

- - +
+ Prohibit Use of Devices @@ -47653,7 +47653,7 @@

organizational personnel with responsibility for sensor capability

- +
Usage Restrictions @@ -48073,7 +48073,7 @@

automated mechanisms supporting and/or implementing testing software and firmware updates

- + Central Management SI-2(1) @@ -48113,8 +48113,8 @@

automated mechanisms supporting and/or implementing central management of the flaw remediation process

-
- +
+ Automated Flaw Remediation Status @@ -48165,8 +48165,8 @@

Automated mechanisms used to determine the state of information system components with regard to flaw remediation

- - +
+ Time to Remediate Flaws / Benchmarks for Corrective Actions @@ -48234,14 +48234,14 @@

automated mechanisms used to measure the time between flaw identification and flaw remediation

- - +
+ Automated Patch Management Tools SI-2(4) Withdrawn SI-2 - - + + Automatic Software / Firmware Updates @@ -48320,8 +48320,8 @@

Automated mechanisms implementing automatic software/firmware updates

- - +
+ Removal of Previous Versions of Software / Firmware @@ -48386,7 +48386,7 @@

Automated mechanisms supporting and/or implementing removal of previous versions of software/firmware

- +
Malicious Code Protection @@ -48565,7 +48565,7 @@

automated mechanisms supporting and/or implementing malicious code scanning and subsequent actions

- + Central Management SI-3(1) @@ -48607,8 +48607,8 @@

automated mechanisms supporting and/or implementing central management of malicious code protection mechanisms

-
- +
+ Automatic Updates SI-3(2) @@ -48649,14 +48649,14 @@

Automated mechanisms supporting and/or implementing automatic updates to malicious code protection capability

- - +
+ Non-privileged Users SI-3(3) Withdrawn AC-6 (10) - - + + Updates Only by Privileged Users SI-3(4) @@ -48699,14 +48699,14 @@

Automated mechanisms supporting and/or implementing malicious code protection capability

- - +
+ Portable Storage Devices SI-3(5) Withdrawn MP-7 - - + + Testing / Verification @@ -48783,8 +48783,8 @@

Automated mechanisms supporting and/or implementing testing and verification of malicious code protection capability

- - +
+ Nonsignature-based Detection SI-3(7) @@ -48825,8 +48825,8 @@

Automated mechanisms supporting and/or implementing nonsignature-based malicious code protection capability

- - +
+ Detect Unauthorized Commands @@ -48906,8 +48906,8 @@

automated mechanisms supporting and/or implementing detection of unauthorized operating system commands through the kernel application programming interface

- - +
+ Authenticate Remote Commands @@ -48971,8 +48971,8 @@

automated mechanisms supporting and/or implementing security safeguards to authenticate remote commands

- - +
+ Malicious Code Analysis @@ -49048,7 +49048,7 @@

tools and techniques for analysis of malicious code characteristics and behavior

- +
Information System Monitoring @@ -49292,7 +49292,7 @@

automated mechanisms supporting and/or implementing information system monitoring capability

- + System-wide Intrusion Detection System SI-4(1) @@ -49338,8 +49338,8 @@

automated mechanisms supporting and/or implementing intrusion detection capability

-
- +
+ Automated Tools for Real-time Analysis SI-4(2) @@ -49382,8 +49382,8 @@

automated mechanisms/tools supporting and/or implementing analysis of events

- - +
+ Automated Tool Integration SI-4(3) @@ -49432,8 +49432,8 @@

automated mechanisms/tools supporting and/or implementing integration of intrusion detection tools into access/flow control mechanisms

- - +
+ Inbound and Outbound Communications Traffic @@ -49503,8 +49503,8 @@

automated mechanisms supporting and/or implementing monitoring of inbound/outbound communications traffic

- - +
+ System-generated Alerts @@ -49567,14 +49567,14 @@

automated mechanisms supporting and/or implementing alerts for compromise indicators

- - +
+ Restrict Non-privileged Users SI-4(6) Withdrawn AC-6 (10) - - + + Automated Response to Suspicious Events @@ -49642,14 +49642,14 @@

automated mechanisms supporting and/or implementing actions to terminate suspicious events

- - +
+ Protection of Monitoring Information SI-4(8) Withdrawn SI-4 - - + + Testing of Monitoring Tools @@ -49700,8 +49700,8 @@

automated mechanisms supporting and/or implementing testing of intrusion-monitoring tools

- - +
+ Visibility of Encrypted Communications @@ -49761,8 +49761,8 @@

automated mechanisms supporting and/or implementing visibility of encrypted communications traffic to monitoring tools

- - +
+ Analyze Communications Traffic Anomalies @@ -49825,8 +49825,8 @@

automated mechanisms supporting and/or implementing analysis of communications traffic

- - +
+ Automated Alerts @@ -49885,8 +49885,8 @@

automated mechanisms supporting and/or implementing automated alerts to security personnel

- - +
+ Analyze Traffic / Event Patterns SI-4(13) @@ -49954,8 +49954,8 @@

automated mechanisms supporting and/or implementing analysis of communications traffic/event patterns

- - +
+ Wireless Intrusion Detection SI-4(14) @@ -50011,8 +50011,8 @@

automated mechanisms supporting and/or implementing wireless intrusion detection capability

- - +
+ Wireless to Wireline Communications SI-4(15) @@ -50055,8 +50055,8 @@

automated mechanisms supporting and/or implementing wireless intrusion detection capability

- - +
+ Correlate Monitoring Information SI-4(16) @@ -50100,8 +50100,8 @@

automated mechanisms supporting and/or implementing correlation of information from monitoring tools

- - +
+ Integrated Situational Awareness SI-4(17) @@ -50157,8 +50157,8 @@

automated mechanisms supporting and/or implementing correlation of information from monitoring tools

- - +
+ Analyze Traffic / Covert Exfiltration @@ -50221,8 +50221,8 @@

automated mechanisms supporting and/or implementing analysis of outbound communications traffic

- - +
+ Individuals Posing Greater Risk @@ -50281,8 +50281,8 @@

automated mechanisms supporting and/or implementing system monitoring capability

- - +
+ Privileged Users @@ -50332,8 +50332,8 @@

automated mechanisms supporting and/or implementing system monitoring capability

- - +
+ Probationary Periods @@ -50389,8 +50389,8 @@

automated mechanisms supporting and/or implementing system monitoring capability

- - +
+ Unauthorized Network Services @@ -50472,8 +50472,8 @@

automated mechanisms for providing alerts

- - +
+ Host-based Devices @@ -50534,8 +50534,8 @@

automated mechanisms supporting and/or implementing host-based monitoring capability

- - +
+ Indicators of Compromise SI-4(24) @@ -50595,7 +50595,7 @@

automated mechanisms supporting and/or implementing the discovery, collection, distribution, and use of indicators of compromise

- +
Security Alerts, Advisories, and Directives @@ -50730,7 +50730,7 @@

automated mechanisms supporting and/or implementing security directives

- + Automated Alerts and Advisories SI-5(1) @@ -50772,7 +50772,7 @@

automated mechanisms supporting and/or implementing dissemination of security alerts and advisories

-
+
Security Function Verification @@ -50935,13 +50935,13 @@

automated mechanisms supporting and/or implementing security function verification capability

- + Notification of Failed Security Tests SI-6(1) Withdrawn SI-6 - - +
+ Automation Support for Distributed Testing SI-6(2) @@ -50980,8 +50980,8 @@

automated mechanisms supporting and/or implementing the management of distributed security testing

- - +
+ Report Verification Results @@ -51033,7 +51033,7 @@

automated mechanisms supporting and/or implementing the reporting of security function verification results

- +
Software, Firmware, and Information Integrity @@ -51114,7 +51114,7 @@

Software, firmware, and information integrity verification tools

- + Integrity Checks @@ -51233,8 +51233,8 @@

Software, firmware, and information integrity verification tools

-
- +
+ Automated Notifications of Integrity Violations @@ -51286,8 +51286,8 @@

automated mechanisms providing integrity discrepancy notifications

- - +
+ Centrally-managed Integrity Tools SI-7(3) @@ -51326,14 +51326,14 @@

Automated mechanisms supporting and/or implementing central management of integrity verification tools

- - +
+ Tamper-evident Packaging SI-7(4) Withdrawn SA-12 - - + + Automated Response to Integrity Violations @@ -51614,8 +51614,8 @@

automated mechanisms supporting and/or implementing alerts about potential integrity violations

- - +
+ Verify Boot Process @@ -51667,8 +51667,8 @@

automated mechanisms supporting and/or implementing integrity verification of the boot process

- - +
+ Protection of Boot Firmware @@ -51728,8 +51728,8 @@

safeguards implementing protection of the integrity of boot firmware

- - +
+ Confined Environments with Limited Privileges @@ -51778,8 +51778,8 @@

automated mechanisms supporting and/or implementing limited privileges in the confined environment

- - +
+ Integrity Verification @@ -51828,8 +51828,8 @@

automated mechanisms supporting and/or implementing verification of the integrity of user-installed software prior to execution

- - +
+ Code Execution in Protected Environments @@ -51888,8 +51888,8 @@

automated mechanisms supporting and/or implementing approvals for execution of binary or machine-executable code

- - +
+ Binary or Machine Executable Code SI-7(14) @@ -51962,8 +51962,8 @@

Automated mechanisms supporting and/or implementing prohibition of the execution of binary or machine-executable code

- - +
+ Code Authentication @@ -52027,8 +52027,8 @@

Cryptographic mechanisms authenticating software/firmware prior to installation

- - +
+ Time Limit On Process Execution w/o Supervision @@ -52078,7 +52078,7 @@

automated mechanisms supporting and/or implementing time limits on process execution without supervision

- +
Spam Protection @@ -52160,7 +52160,7 @@

automated mechanisms supporting and/or implementing spam protection

- + Central Management SI-8(1) @@ -52202,8 +52202,8 @@

automated mechanisms supporting and/or implementing central management of spam protection

-
- +
+ Automatic Updates SI-8(2) @@ -52241,8 +52241,8 @@

automated mechanisms supporting and/or implementing automatic updates to spam protection mechanisms

- - +
+ Continuous Learning Capability SI-8(3) @@ -52282,7 +52282,7 @@

automated mechanisms supporting and/or implementing spam protection mechanisms with a learning capability

- +
Information Input Restrictions @@ -52346,7 +52346,7 @@

Automated mechanisms supporting and/or implementing validity checks on information inputs

- + Manual Override Capability @@ -52436,8 +52436,8 @@

automated mechanisms supporting and/or implementing auditing of the use of manual override capability

-
- +
+ Review / Resolution of Errors @@ -52490,8 +52490,8 @@

automated mechanisms supporting and/or implementing review and resolution of input validation errors

- - +
+ Predictable Behavior SI-10(3) @@ -52529,8 +52529,8 @@

Automated mechanisms supporting and/or implementing predictable behavior when invalid inputs are received

- - +
+ Review / Timing Interactions SI-10(4) @@ -52569,8 +52569,8 @@

automated mechanisms supporting and/or implementing responses to invalid inputs

- - +
+ Restrict Inputs to Trusted Sources and Approved Formats @@ -52637,7 +52637,7 @@

automated mechanisms supporting and/or implementing restriction of information inputs

- +
Error Handling @@ -52850,7 +52850,7 @@

Organizational processes for managing MTTF

- + Transferring Component Responsibilities @@ -52897,14 +52897,14 @@

automated mechanisms supporting and/or implementing transfer of component responsibilities to substitute components

-
- +
+ Time Limit On Process Execution Without Supervision SI-13(2) Withdrawn SI-7 (16) - - + + Manual Transfer Between Components @@ -52957,8 +52957,8 @@

Organizational processes for managing MTTF and conducting the manual transfer between active and standby components

- - +
+ Standby Component Installation / Notification @@ -53051,8 +53051,8 @@

automated mechanisms supporting and/or implementing alarms or system shutdown if component failures are detected

- - +
+ Failover Capability