Side-by-side Presentation of
NIST Special Publication 800-53 Revision 4
and the
DISA FSO Control Correlation Identifier (CCI) List
This table presents the security controls from NIST 800-53 next to their rewritten form in the DISA FSO CCI list. This table is designed to foster conversation about how to use the security controls.
Discussion topics include: Appendix H of NIST 800-53 describes high-level intentions while this table is designed to facilitate coordination and implementation between organizations.
NIST ID NIST Text CCI Identifiers and Text
AC-1 ACCESS CONTROL : ACCESS CONTROL POLICY AND PROCEDURES
AC-1 The organization:
AC-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
AC-1a.1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
AC-1 a 1
(CCI-000001)
The organization develops an access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
AC-1 a 1
(CCI-000002)
The organization disseminates the access control policy to organization-defined personnel or roles.
AC-1 a 1
(CCI-002106)
The organization documents the access control policy.
AC-1 a 1
(CCI-002107)
The organization defines the personnel or roles to be recipients of the access control policy necessary to facilitate the implementation of the access control policy and associated access controls.
AC-1 a 1
(CCI-002108)
The organization defines the personnel or roles to be recipients of the procedures necessary to facilitate the implementation of the access control policy and associated access controls.
AC-1a.2. Procedures to facilitate the implementation of the access control policy and associated access controls; and
AC-1 a 2
(CCI-000004)
The organization develops procedures to facilitate the implementation of the access control policy and associated access controls.
AC-1 a 2
(CCI-000005)
The organization disseminates the procedures to facilitate access control policy and associated access controls to the organization-defined personnel or roles.
AC-1 a 2
(CCI-002109)
The organization documents procedures to facilitate the implementation of the access control policy and associated access controls.
AC-1b. Reviews and updates the current:
AC-1b.1. Access control policy [Assignment: organization-defined frequency]; and
AC-1 b 1
(CCI-001545)
The organization defines a frequency for reviewing and updating the access control policy.
AC-1 b 1
(CCI-000003)
The organization reviews and updates the access control policy in accordance with organization-defined frequency.
AC-1b.2. Access control procedures [Assignment: organization-defined frequency].
AC-1 b 2
(CCI-001546)
The organization defines a frequency for reviewing and updating the access control procedures.
AC-1 b 2
(CCI-000006)
The organization reviews and updates the access control procedures in accordance with organization-defined frequency.
AC-2 ACCESS CONTROL : ACCOUNT MANAGEMENT
AC-2 The organization:
AC-2a. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
AC-2 a
(CCI-002110)
The organization defines the information system account types that support the organizational missions/business functions.
AC-2 a
(CCI-002111)
The organization identifies and selects the organization-defined information system account types of information system accounts which support organizational missions/business functions.
AC-2b. Assigns account managers for information system accounts;
AC-2 b
(CCI-002112)
The organization assigns account managers for information system accounts.
AC-2c. Establishes conditions for group and role membership;
AC-2 c
(CCI-000008)
The organization establishes conditions for group membership.
AC-2 c
(CCI-002113)
The organization establishes conditions for role membership.
AC-2d. Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;
AC-2 d
(CCI-002114)
The organization specifies authorized users of the information system for each account.
AC-2 d
(CCI-002115)
The organization specifies authorized users of the information system.
AC-2 d
(CCI-002116)
The organization specifies authorized group membership on the information system.
AC-2 d
(CCI-002117)
The organization specifies authorized role membership on the information system.
AC-2 d
(CCI-002118)
The organization specifies access authorizations (i.e., privileges) for each account on the information system.
AC-2 d
(CCI-002119)
The organization specifies other attributes for each account on the information system.
AC-2e. Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;
AC-2 e
(CCI-000010)
The organization requires approvals by organization-defined personnel or roles for requests to create information system accounts.
AC-2 e
(CCI-002120)
The organization defines the personnel or roles authorized to approve the creation of information system accounts.
AC-2f. Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions];
AC-2 f
(CCI-000011)
The organization creates, enables, modifies, disables, and removes information system accounts in accordance with organization-defined procedures or conditions.
AC-2 f
(CCI-002121)
The organization defines the procedures or conditions to be employed when creating, enabling, modifying, disabling, and removing information system accounts.
AC-2g. Monitors the use of information system accounts;
AC-2 g
(CCI-002122)
The organization monitors the use of information system accounts.
AC-2h. Notifies account managers:
AC-2h.1. When accounts are no longer required;
AC-2 h 1
(CCI-002123)
The organization notifies account managers when accounts are no longer required.
AC-2h.2. When users are terminated or transferred; and
AC-2 h 2
(CCI-002124)
The organization notifies account managers when users are terminated or transferred.
AC-2h.3. When individual information system usage or need-to-know changes;
AC-2 h 3
(CCI-002125)
The organization notifies account managers when individual information system usage or need-to-know changes.
AC-2i. Authorizes access to the information system based on:
AC-2i.1. A valid access authorization;
AC-2i.2. Intended system usage; and
AC-2i.3. Other attributes as required by the organization or associated missions/business functions;
AC-2j. Reviews accounts for compliance with account management requirements [Assignment: organization-defined frequency]; and
AC-2 j
(CCI-001547)
The organization defines the frequency on which it will review information system accounts for compliance with account management requirements.
AC-2 j
(CCI-000012)
The organization reviews information system accounts for compliance with account management requirements per organization-defined frequency.
AC-2k. Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
AC-2 k
(CCI-002129)
The organization establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
AUTOMATED SYSTEM ACCOUNT MANAGEMENT
AC-2 (1) The organization employs automated mechanisms to support the management of information system accounts.
AC-2 (1)
(CCI-000015)
The organization employs automated mechanisms to support the information system account management functions.
REMOVAL OF TEMPORARY / EMERGENCY ACCOUNTS
AC-2 (2) The information system automatically [Selection: removes; disables] temporary and emergency accounts after [Assignment: organization-defined time period for each type of account].
AC-2 (2)
(CCI-000016)
The information system automatically removes or disables temporary accounts after an organization-defined time period for each type of account.
AC-2 (2)
(CCI-001361)
The organization defines a time period after which temporary accounts are automatically terminated.
AC-2 (2)
(CCI-001365)
The organization defines a time period after which emergency accounts are automatically terminated.
AC-2 (2)
(CCI-001682)
The information system automatically removes or disables emergency accounts after an organization-defined time period for each type of account.
DISABLE INACTIVE ACCOUNTS
AC-2 (3) The information system automatically disables inactive accounts after [Assignment: organization-defined time period].
AC-2 (3)
(CCI-000017)
The information system automatically disables inactive accounts after an organization-defined time period.
AC-2 (3)
(CCI-000217)
The organization defines a time period after which inactive accounts are automatically disabled.
AUTOMATED AUDIT ACTIONS
AC-2 (4) The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies [Assignment: organization-defined personnel or roles].
AC-2 (4)
(CCI-000018)
The information system automatically audits account creation actions.
AC-2 (4)
(CCI-001403)
The information system automatically audits account modification actions.
AC-2 (4)
(CCI-001404)
The information system automatically audits account disabling actions.
AC-2 (4)
(CCI-001405)
The information system automatically audits account removal actions.
AC-2 (4)
(CCI-001683)
The information system notifies organization-defined personnel or roles for account creation actions.
AC-2 (4)
(CCI-001684)
The information system notifies organization-defined personnel or roles for account modification actions.
AC-2 (4)
(CCI-001685)
The information system notifies organization-defined personnel or roles for account disabling actions.
AC-2 (4)
(CCI-001686)
The information system notifies organization-defined personnel or roles for account removal actions.
AC-2 (4)
(CCI-002130)
The information system automatically audits account enabling actions.
AC-2 (4)
(CCI-002131)
The organization defines the personnel or roles to be notified on account creation, modification, enabling, disabling, and removal actions.
AC-2 (4)
(CCI-002132)
The information system notifies organization-defined personnel or roles for account enabling actions.
INACTIVITY LOGOUT
AC-2 (5) The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].
AC-2 (5)
(CCI-000019)
The organization requires that users log out in accordance with the organization-defined time period of inactivity or description of when to log out.
AC-2 (5)
(CCI-001406)
The organization defines a time period of expected inactivity when users are required to log out.
AC-2 (5)
(CCI-002133)
The organization defines other conditions when users are required to log out.
DYNAMIC PRIVILEGE MANAGEMENT
AC-2 (6) The information system implements the following dynamic privilege management capabilities: [Assignment: organization-defined list of dynamic privilege management capabilities].
AC-2 (6)
(CCI-002134)
The organization defines a list of dynamic privilege management capabilities to be implemented by the information system.
AC-2 (6)
(CCI-002135)
The information system implements the organization-defined list of dynamic privilege management capabilities.
ROLE-BASED SCHEMES
AC-2 (7) The organization:
AC-2 (7)(a) Establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles;
AC-2 (7) (a)
(CCI-001407)
The organization administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles.
AC-2 (7) (a)
(CCI-001358)
The organization establishes privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles.
AC-2 (7)(b) Monitors privileged role assignments; and
AC-2 (7) (b)
(CCI-001360)
The organization monitors privileged role assignments.
AC-2 (7)(c) Takes [Assignment: organization-defined actions] when privileged role assignments are no longer appropriate.
AC-2 (7) (c)
(CCI-002136)
The organization defines the actions to be taken when privileged role assignments are no longer appropriate.
AC-2 (7) (c)
(CCI-002137)
The organization takes organization-defined actions when privileged role assignments are no longer appropriate.
DYNAMIC ACCOUNT CREATION
AC-2 (8) The information system creates [Assignment: organization-defined information system accounts] dynamically.
AC-2 (8)
(CCI-002138)
The organization defines the information system accounts that can be dynamically created.
AC-2 (8)
(CCI-002139)
The information system creates organization-defined information system accounts dynamically.
RESTRICTIONS ON USE OF SHARED GROUPS / ACCOUNTS
AC-2 (9) The organization only permits the use of shared/group accounts that meet [Assignment: organization-defined conditions for establishing shared/group accounts].
AC-2 (9)
(CCI-002140)
The organization defines the conditions for establishing shared/group accounts.
AC-2 (9)
(CCI-002141)
The organization only permits the use of shared/group accounts that meet organization-defined conditions for establishing shared/group accounts.
SHARED / GROUP ACCOUNT CREDENTIAL TERMINATION
AC-2 (10) The information system terminates shared/group account credentials when members leave the group.
AC-2 (10)
(CCI-002142)
The information system terminates shared/group account credentials when members leave the group.
USAGE CONDITIONS
AC-2 (11) The information system enforces [Assignment: organization-defined circumstances and/or usage conditions] for [Assignment: organization-defined information system accounts].
AC-2 (11)
(CCI-002143)
The organization defines the circumstances and/or usage conditions that are to be enforced for organization-defined information system accounts.
AC-2 (11)
(CCI-002144)
The organization defines the information system accounts that are to be subject to the enforcement of organization-defined circumstances and/or usage conditions.
AC-2 (11)
(CCI-002145)
The information system enforces organization-defined circumstances and/or usage conditions for organization-defined information system accounts.
ACCOUNT MONITORING / ATYPICAL USAGE
AC-2 (12) The organization:
AC-2 (12)(a) Monitors information system accounts for [Assignment: organization-defined atypical use]; and
AC-2 (12) (a)
(CCI-002146)
The organization defines atypical usage for which the information system accounts are to be monitored.
AC-2 (12) (a)
(CCI-002147)
The organization monitors information system accounts for organization-defined atypical use.
AC-2 (12)(b) Reports atypical usage of information system accounts to [Assignment: organization-defined personnel or roles].
AC-2 (12) (b)
(CCI-002148)
The organization defines the personnel or roles to whom atypical usage of information system accounts are to be reported.
AC-2 (12) (b)
(CCI-002149)
The organization reports atypical usage of information system accounts to organization-defined personnel or roles.
DISABLE ACCOUNTS FOR HIGH-RISK INDIVIDUALS
AC-2 (13) The organization disables accounts of users posing a significant risk within [Assignment: organization-defined time period] of discovery of the risk.
AC-2 (13)
(CCI-002150)
The organization defines the time period within which the accounts of users posing a significant risk are to be disabled after discovery of the risk.
AC-2 (13)
(CCI-002151)
The organization disables accounts of users posing a significant risk within an organization-defined time period of discovery of the risk.
AC-3 ACCESS CONTROL : ACCESS ENFORCEMENT
AC-3 The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
AC-3
(CCI-000213)
The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.
RESTRICTED ACCESS TO PRIVILEGED FUNCTIONS
AC-3 (1) [Withdrawn: Incorporated into AC-6].
DUAL AUTHORIZATION
AC-3 (2) The information system enforces dual authorization for [Assignment: organization-defined privileged commands and/or other organization-defined actions].
AC-3 (2)
(CCI-000021)
The information system enforces dual authorization for organization-defined privileged commands and/or other organization-defined actions.
AC-3 (2)
(CCI-001408)
The organization defines privileged commands for which dual authorization is to be enforced.
AC-3 (2)
(CCI-002152)
The organization defines other actions necessary for which dual authorization is to be enforced.
MANDATORY ACCESS CONTROL
AC-3 (3) The information system enforces [Assignment: organization-defined mandatory access control policies] over all subjects and objects where the policy specifies that:
AC-3 (3)
(CCI-002153)
The organization defines the mandatory access control policies that are to be enforced over all subjects and objects.
AC-3 (3)
(CCI-003014)
The information system enforces organization-defined mandatory access control policies over all subjects and objects.
AC-3 (3)(a) The policy is uniformly enforced across all subjects and objects within the boundary of the information system;
AC-3 (3) (a)
(CCI-002154)
The mandatory access control policy specifies that the policy is uniformly enforced across all subjects and objects within the boundary of the information system.
AC-3 (3)(b) A subject that has been granted access to information is constrained from doing any of the following;
AC-3 (3)(b)(1) Passing the information to unauthorized subjects or objects;
AC-3 (3) (b) (1)
(CCI-002155)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from passing the information to unauthorized subjects or objects.
AC-3 (3)(b)(2) Granting its privileges to other subjects;
AC-3 (3) (b) (2)
(CCI-002156)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from granting its privileges to other subjects.
AC-3 (3)(b)(3) Changing one or more security attributes on subjects, objects, the information system, or information system components;
AC-3 (3) (b) (3)
(CCI-002157)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from changing one or more security attributes on subjects, objects, the information system, or information system components.
AC-3 (3)(b)(4) Choosing the security attributes and attribute values to be associated with newly created or modified objects; or
AC-3 (3) (b) (4)
(CCI-002158)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from choosing the security attributes to be associated with newly created or modified objects.
AC-3 (3) (b) (4)
(CCI-002159)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from choosing the attribute values to be associated with newly created or modified objects.
AC-3 (3)(b)(5) Changing the rules governing access control; and
AC-3 (3) (b) (5)
(CCI-002160)
The mandatory access control policy specifies that a subject that has been granted access to information is constrained from changing the rules governing access control.
AC-3 (3)(c) [Assignment: Organized-defined subjects] may explicitly be granted [Assignment: organization-defined privileges (i.e., they are trusted subjects)] such that they are not limited by some or all of the above constraints.
AC-3 (3) (c)
(CCI-002161)
The organization defines subjects which may explicitly be granted organization-defined privileges such that they are not limited by some or all of the mandatory access control constraints.
AC-3 (3) (c)
(CCI-002162)
The organization defines the privileges that may explicitly be granted to organization-defined subjects such that they are not limited by some or all of the mandatory access control constraints.
AC-3 (3) (c)
(CCI-003015)
The mandatory access control policy specifies that organization-defined subjects may explicitly be granted organization-defined privileges such that they are not limited by some or all of the mandatory access control constraints.
DISCRETIONARY ACCESS CONTROL
AC-3 (4) The information system enforces [Assignment: organization-defined discretionary access control policies] over defined subjects and objects where the policy specifies that a subject that has been granted access to information can do one or more of the following:
AC-3 (4)
(CCI-002163)
The organization defines the discretionary access control policies the information system is to enforce over subjects and objects.
AC-3 (4)
(CCI-002165)
The information system enforces organization-defined discretionary access control policies over defined subjects and objects.
AC-3 (4)(a) Pass the information to any other subjects or objects;
AC-3 (4)(b) Grant its privileges to other subjects;
AC-3 (4)(c) Change security attributes on subjects, objects, the information system, or the information system�s components;
AC-3 (4)(d) Choose the security attributes to be associated with newly created or revised objects; or
AC-3 (4)(e) Change the rules governing access control.
SECURITY-RELEVANT INFORMATION
AC-3 (5) The information system prevents access to [Assignment: organization-defined security-relevant information] except during secure, non-operable system states.
AC-3 (5)
(CCI-000024)
The information system prevents access to organization-defined security-relevant information except during secure, non-operable system states.
AC-3 (5)
(CCI-001411)
The organization defines security-relevant information to which the information system prevents access except during secure, non-operable system states.
PROTECTION OF USER AND SYSTEM INFORMATION
AC-3 (6) [Withdrawn: Incorporated into MP-4 and SC-28].
ROLE-BASED ACCESS CONTROL
AC-3 (7) The information system enforces a role-based access control policy over defined subjects and objects and controls access based upon [Assignment: organization-defined roles and users authorized to assume such roles].
AC-3 (7)
(CCI-002166)
The organization defines the role-based access control policies the information system is to enforce over all subjects and objects.
AC-3 (7)
(CCI-002167)
The organization defines the subjects over which the information system will enforce a role-based access control policy.
AC-3 (7)
(CCI-002168)
The organization defines the objects over which the information system will enforce a role-based access control policy.
AC-3 (7)
(CCI-002169)
The information system enforces a role-based access control policy over defined subjects and objects.
AC-3 (7)
(CCI-002170)
The information system controls access based upon organization-defined roles and users authorized to assume such roles.
AC-3 (7)
(CCI-002171)
The information system enforces a role-based access control policy over organization-defined subjects.
AC-3 (7)
(CCI-002172)
The information system enforces a role-based access control policy over organization-defined objects.
AC-3 (7)
(CCI-002173)
The organization defines the roles for which the information system will control access based upon the organization-defined role-based access control policy.
AC-3 (7)
(CCI-002174)
The organization defines the users for which the information system will control access based upon the organization-defined role-based access control policy.
AC-3 (7)
(CCI-002175)
The information system controls access based upon organization-defined roles authorized to assume such roles, employing the organization-defined role-based access control policy.
AC-3 (7)
(CCI-002176)
The information system controls access based upon organization-defined users authorized to assume such roles, employing the organization-defined role-based access control policy.
REVOCATION OF ACCESS AUTHORIZATIONS
AC-3 (8) The information system enforces the revocation of access authorizations resulting from changes to the security attributes of subjects and objects based on [Assignment: organization-defined rules governing the timing of revocations of access authorizations].
AC-3 (8)
(CCI-002177)
The organization defines the rules which will govern the timing of revocation of access authorizations.
AC-3 (8)
(CCI-002178)
The information system enforces the revocation of access authorizations resulting from changes to the security attributes of subjects based on organization-defined rules governing the timing of revocations of access authorizations.
AC-3 (8)
(CCI-002179)
The information system enforces the revocation of access authorizations resulting from changes to the security attributes of objects based on organization-defined rules governing the timing of revocations of access authorizations.
CONTROLLED RELEASE
AC-3 (9) The information system does not release information outside of the established system boundary unless:
AC-3 (9)(a) The receiving [Assignment: organization-defined information system or system component] provides [Assignment: organization-defined security safeguards]; and
AC-3 (9) (a)
(CCI-002180)
The organization defines the security safeguards the organization-defined information system or system component is to provide to protect information released outside the established system boundary.
AC-3 (9) (a)
(CCI-002181)
The organization defines information systems or system components that are to provide organization-defined security safeguards to protect information received outside the established system boundary.
AC-3 (9) (a)
(CCI-002182)
The information system does not release information outside of the established system boundary unless the receiving organization-defined information system or system component provides organization-defined security safeguards.
AC-3 (9)(b) [Assignment: organization-defined security safeguards] are used to validate the appropriateness of the information designated for release.
AC-3 (9) (b)
(CCI-002183)
The organization defines the security safeguards to be used to validate the appropriateness of the information designated for release.
AC-3 (9) (b)
(CCI-002184)
The information system does not release information outside of the established system boundary unless organization-defined security safeguards are used to validate the appropriateness of the information designated for release.
AUDITED OVERRIDE OF ACCESS CONTROL MECHANISMS
AC-3 (10) The organization employs an audited override of automated access control mechanisms under [Assignment: organization-defined conditions].
AC-3 (10)
(CCI-002185)
The organization defines the conditions on which it will employ an audited override of automated access control mechanisms.
AC-3 (10)
(CCI-002186)
The organization employs an audited override of automated access control mechanisms under organization-defined conditions.
AC-4 ACCESS CONTROL : INFORMATION FLOW ENFORCEMENT
AC-4 The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on [Assignment: organization-defined information flow control policies].
AC-4
(CCI-001548)
The organization defines the information flow control policies for controlling the flow of information within the system.
AC-4
(CCI-001549)
The organization defines the information flow control policies for controlling the flow of information between interconnected systems.
AC-4
(CCI-001550)
The organization defines approved authorizations for controlling the flow of information within the system.
AC-4
(CCI-001551)
The organization defines approved authorizations for controlling the flow of information between interconnected systems.
AC-4
(CCI-001414)
The information system enforces approved authorizations for controlling the flow of information between interconnected systems based on organization-defined information flow control policies.
AC-4
(CCI-001368)
The information system enforces approved authorizations for controlling the flow of information within the system based on organization-defined information flow control policies.
OBJECT SECURITY ATTRIBUTES
AC-4 (1) The information system uses [Assignment: organization-defined security attributes] associated with [Assignment: organization-defined information, source, and destination objects] to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
AC-4 (1)
(CCI-002187)
The organization defines the security attributes to be used to enforce organization-defined information flow control policies.
AC-4 (1)
(CCI-002188)
The organization defines the information, source, and destination objects with which the organization-defined security attributes are to be associated.
AC-4 (1)
(CCI-002189)
The organization defines the information flow control policies to be enforced for flow control decisions.
AC-4 (1)
(CCI-002190)
The information system uses organization-defined security attributes associated with organization-defined information, source, and destination objects to enforce organization-defined information flow control policies as a basis for flow control decisions.
PROCESSING DOMAINS
AC-4 (2) The information system uses protected processing domains to enforce [Assignment: organization-defined information flow control policies] as a basis for flow control decisions.
AC-4 (2)
(CCI-000026)
The information system uses protected processing domains to enforce organization-defined information flow control policies as a basis for flow control decisions.
AC-4 (2)
(CCI-002191)
The organization defines the information flow control policies to be enforced by the information system using protected processing domains.
DYNAMIC INFORMATION FLOW CONTROL
AC-4 (3) The information system enforces dynamic information flow control based on [Assignment: organization-defined policies].
AC-4 (3)
(CCI-000027)
The information system enforces dynamic information flow control based on organization-defined policies.
AC-4 (3)
(CCI-002192)
The organization defines the policies the information system is to enforce to achieve dynamic information flow control.
CONTENT CHECK ENCRYPTED INFORMATION
AC-4 (4) The information system prevents encrypted information from bypassing content-checking mechanisms by [Selection (one or more): decrypting the information; blocking the flow of the encrypted information; terminating communications sessions attempting to pass encrypted information; [Assignment: organization-defined procedure or method]].
AC-4 (4)
(CCI-000028)
The information system prevents encrypted information from bypassing content-checking mechanisms by employing organization-defined procedures or methods.
AC-4 (4)
(CCI-002193)
The organization defines procedures or methods to be employed by the information system to prevent encrypted information from bypassing content-checking mechanisms, such as decrypting the information, blocking the flow of the encrypted information, and/or terminating communications sessions attempting to pass encrypted information.
EMBEDDED DATA TYPES
AC-4 (5) The information system enforces [Assignment: organization-defined limitations] on embedding data types within other data types.
AC-4 (5)
(CCI-000029)
The information system enforces organization-defined limitations on the embedding of data types within other data types.
AC-4 (5)
(CCI-001415)
The organization defines limitations for the embedding of data types within other data types.
METADATA
AC-4 (6) The information system enforces information flow control based on [Assignment: organization-defined metadata].
AC-4 (6)
(CCI-000030)
The information system enforces information flow control based on organization-defined metadata.
AC-4 (6)
(CCI-002194)
The organization defines the metadata the information system uses to enforce information flow control.
ONE-WAY FLOW MECHANISMS
AC-4 (7) The information system enforces [Assignment: organization-defined one-way flows] using hardware mechanisms.
AC-4 (7)
(CCI-000031)
The information system enforces organization-defined one-way flows using hardware mechanisms.
AC-4 (7)
(CCI-001416)
The organization defines one-way information flows to be enforced by the information system.
SECURITY POLICY FILTERS
AC-4 (8) The information system enforces information flow control using [Assignment: organization-defined security policy filters] as a basis for flow control decisions for [Assignment: organization-defined information flows].
AC-4 (8)
(CCI-000032)
The information system enforces information flow control using organization-defined security policy filters as a basis for flow control decisions for organization-defined information flows.
AC-4 (8)
(CCI-001417)
The organization defines security policy filters to be enforced by the information system and used as a basis for flow control decisions.
AC-4 (8)
(CCI-002195)
The organization defines the information flows against which the organization-defined security policy filters are to be enforced.
HUMAN REVIEWS
AC-4 (9) The information system enforces the use of human reviews for [Assignment: organization-defined information flows] under the following conditions: [Assignment: organization-defined conditions].
AC-4 (9)
(CCI-002196)
The organization defines the information flows for which the information system will enforce the use of human reviews under organization-defined conditions.
AC-4 (9)
(CCI-002197)
The organization defines the conditions which will require the use of human reviews of organization-defined information flows.
AC-4 (9)
(CCI-002198)
The information system enforces the use of human reviews for organization-defined information flows under organization-defined conditions.
ENABLE / DISABLE SECURITY POLICY FILTERS
AC-4 (10) The information system provides the capability for privileged administrators to enable/disable [Assignment: organization-defined security policy filters] under the following conditions: [Assignment: organization-defined conditions].
AC-4 (10)
(CCI-001553)
The organization defines the security policy filters that privileged administrators have the capability to enable/disable.
AC-4 (10)
(CCI-000034)
The information system provides the capability for a privileged administrator to enable/disable organization-defined security policy filters under organization-defined conditions.
AC-4 (10)
(CCI-002199)
The organization defines the conditions under which the information system provides the capability for privileged administrators to enable/disable organization-defined security policy filters.
CONFIGURATION OF SECURITY POLICY FILTERS
AC-4 (11) The information system provides the capability for privileged administrators to configure [Assignment: organization-defined security policy filters] to support different security policies.
AC-4 (11)
(CCI-001554)
The organization defines the security policy filters that privileged administrators have the capability to configure.
AC-4 (11)
(CCI-000035)
The information system provides the capability for privileged administrators to configure the organization-defined security policy filters to support different security policies.
DATA TYPE IDENTIFIERS
AC-4 (12) The information system, when transferring information between different security domains, uses [Assignment: organization-defined data type identifiers] to validate data essential for information flow decisions.
AC-4 (12)
(CCI-002200)
The organization defines the data type identifiers to be used to validate data being transferred between different security domains.
AC-4 (12)
(CCI-002201)
The information system, when transferring information between different security domains, uses organization-defined data type identifiers to validate data essential for information flow decisions.
DECOMPOSITION INTO POLICY-RELEVANT SUBCOMPONENTS
AC-4 (13) The information system, when transferring information between different security domains, decomposes information into [Assignment: organization-defined policy-relevant subcomponents] for submission to policy enforcement mechanisms.
AC-4 (13)
(CCI-000219)
The information system, when transferring information between different security domains, decomposes information into organization-defined policy-relevant subcomponents for submission to policy enforcement mechanisms.
AC-4 (13)
(CCI-002202)
The organization defines the policy-relevant subcomponents into which information being transferred between different security domains is to be decomposed for submission to policy enforcement mechanisms.
SECURITY POLICY FILTER CONSTRAINTS
AC-4 (14) The information system, when transferring information between different security domains, implements [Assignment: organization-defined security policy filters] requiring fully enumerated formats that restrict data structure and content.
AC-4 (14)
(CCI-001371)
The organization defines information security policy filters requiring fully enumerated formats which are to be implemented when transferring information between different security domains.
AC-4 (14)
(CCI-001372)
The information system, when transferring information between different security domains, implements organization-defined security policy filters requiring fully enumerated formats that restrict data structure and content.
DETECTION OF UNSANCTIONED INFORMATION
AC-4 (15) The information system, when transferring information between different security domains, examines the information for the presence of [Assignment: organized-defined unsanctioned information] and prohibits the transfer of such information in accordance with the [Assignment: organization-defined security policy].
AC-4 (15)
(CCI-001373)
The information system, when transferring information between different security domains, examines the information for the presence of organization-defined unsanctioned information.
AC-4 (15)
(CCI-001374)
The information system, when transferring information between different security domains, prohibits the transfer of organization-defined unsanctioned information in accordance with the organization-defined security policy.
AC-4 (15)
(CCI-002203)
The organization defines the unsanctioned information the information system is to examine when transferring information between different security domains.
AC-4 (15)
(CCI-002204)
The organization defines a security policy which prohibits the transfer of unsanctioned information between different security domains.
INFORMATION TRANSFERS ON INTERCONNECTED SYSTEMS
AC-4 (16) [Withdrawn: Incorporated into AC-4].
DOMAIN AUTHENTICATION
AC-4 (17) The information system uniquely identifies and authenticates source and destination points by [Selection (one or more): organization, system, application, individual] for information transfer.
AC-4 (17)
(CCI-002205)
The information system uniquely identifies and authenticates source by organization, system, application, and/or individual for information transfer.
AC-4 (17)
(CCI-002206)
The information system uniquely authenticates source by organization, system, application, and/or individual for information transfer.
AC-4 (17)
(CCI-002207)
The information system uniquely identifies and authenticates destination by organization, system, application, and/or individual for information transfer.
AC-4 (17)
(CCI-002208)
The information system uniquely authenticates destination by organization, system, application, and/or individual for information transfer.
SECURITY ATTRIBUTE BINDING
AC-4 (18) The information system binds security attributes to information using [Assignment: organization-defined binding techniques] to facilitate information flow policy enforcement.
AC-4 (18)
(CCI-002209)
The organization defines the techniques to be used to bind security attributes to information.
AC-4 (18)
(CCI-002210)
The information system binds security attributes to information using organization-defined binding techniques to facilitate information flow policy enforcement.
VALIDATION OF METADATA
AC-4 (19) The information system, when transferring information between different security domains, applies the same security policy filtering to metadata as it applies to data payloads.
AC-4 (19)
(CCI-002211)
The information system, when transferring information between different security domains, applies the same security policy filtering to metadata as it applies to data payloads.
APPROVED SOLUTIONS
AC-4 (20) The organization employs [Assignment: organization-defined solutions in approved configurations] to control the flow of [Assignment: organization-defined information] across security domains.
AC-4 (20)
(CCI-002212)
The organization defines the solutions in approved configurations to be employed to control the flow of organization-defined information across security domains.
AC-4 (20)
(CCI-002213)
The organization defines the information to be subjected to flow control across security domains.
AC-4 (20)
(CCI-002214)
The organization employs organization-defined solutions in approved configurations to control the flow of organization-defined information across security domains.
PHYSICAL / LOGICAL SEPARATION OF INFORMATION FLOWS
AC-4 (21) The information system separates information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].
AC-4 (21)
(CCI-002215)
The organization defines the mechanisms and/or techniques to be used to logically or physically separate information flows.
AC-4 (21)
(CCI-002216)
The organization defines the types of information required to accomplish logical or physical separation of information flows.
AC-4 (21)
(CCI-002217)
The information system separates information flows logically or physically using organization-defined mechanisms and/or techniques to accomplish organization-defined required separations by types of information.
ACCESS ONLY
AC-4 (22) The information system provides access from a single device to computing platforms, applications, or data residing on multiple different security domains, while preventing any information flow between the different security domains.
AC-4 (22)
(CCI-002218)
The information system provides access from a single device to computing platforms, applications, or data residing on multiple different security domains, while preventing any information flow between the different security domains.
AC-5 ACCESS CONTROL : SEPARATION OF DUTIES
AC-5 The organization:
AC-5a. Separates [Assignment: organization-defined duties of individuals];
AC-5 a
(CCI-000036)
The organization separates organization-defined duties of individuals.
AC-5 a
(CCI-002219)
The organization defines the duties of individuals that are to be separated.
AC-5b. Documents separation of duties of individuals; and
AC-5 b
(CCI-001380)
The organization documents separation of duties of individuals.
AC-5c. Defines information system access authorizations to support separation of duties.
AC-5 c
(CCI-002220)
The organization defines information system access authorizations to support separation of duties.
AC-6 ACCESS CONTROL : LEAST PRIVILEGE
AC-6 The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
AC-6
(CCI-000225)
The organization employs the concept of least privilege, allowing only authorized accesses for users (and processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.
AUTHORIZE ACCESS TO SECURITY FUNCTIONS
AC-6 (1) The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].
AC-6 (1)
(CCI-001558)
The organization defines the security functions (deployed in hardware, software, and firmware) for which access must be explicitly authorized.
AC-6 (1)
(CCI-002221)
The organization defines the security-relevant information for which access must be explicitly authorized.
AC-6 (1)
(CCI-002222)
The organization explicitly authorizes access to organization-defined security functions.
AC-6 (1)
(CCI-002223)
The organization explicitly authorizes access to organization-defined security-relevant information.
NON-PRIVILEGED ACCESS FOR NONSECURITY FUNCTIONS
AC-6 (2) The organization requires that users of information system accounts, or roles, with access to [Assignment: organization-defined security functions or security-relevant information], use non-privileged accounts or roles, when accessing nonsecurity functions.
AC-6 (2)
(CCI-000039)
The organization requires that users of information system accounts or roles, with access to organization-defined security functions or security-relevant information, use non-privileged accounts, or roles, when accessing nonsecurity functions.
AC-6 (2)
(CCI-001419)
The organization defines the security functions or security-relevant information to which users of information system accounts, or roles, have access.
NETWORK ACCESS TO PRIVILEGED COMMANDS
AC-6 (3) The organization authorizes network access to [Assignment: organization-defined privileged commands] only for [Assignment: organization-defined compelling operational needs] and documents the rationale for such access in the security plan for the information system.
AC-6 (3)
(CCI-000041)
The organization authorizes network access to organization-defined privileged commands only for organization-defined compelling operational needs.
AC-6 (3)
(CCI-000042)
The organization documents the rationale for authorized network access to organization-defined privileged commands in the security plan for the information system.
AC-6 (3)
(CCI-001420)
The organization defines the privileged commands to which network access is to be authorized only for organization-defined compelling operational needs.
AC-6 (3)
(CCI-002224)
The organization defines the compelling operational needs that must be met in order to be authorized network access to organization-defined privileged commands.
SEPARATE PROCESSING DOMAINS
AC-6 (4) The information system provides separate processing domains to enable finer-grained allocation of user privileges.
AC-6 (4)
(CCI-002225)
The information system provides separate processing domains to enable finer-grained allocation of user privileges.
PRIVILEGED ACCOUNTS
AC-6 (5) The organization restricts privileged accounts on the information system to [Assignment: organization-defined personnel or roles].
AC-6 (5)
(CCI-002226)
The organization defines the personnel or roles to whom privileged accounts are to be restricted on the information system.
AC-6 (5)
(CCI-002227)
The organization restricts privileged accounts on the information system to organization-defined personnel or roles.
PRIVILEGED ACCESS BY NON-ORGANIZATIONAL USERS
AC-6 (6) The organization prohibits privileged access to the information system by non-organizational users.
AC-6 (6)
(CCI-001422)
The organization prohibits privileged access to the information system by non-organizational users.
REVIEW OF USER PRIVILEGES
AC-6 (7) The organization:
AC-6 (7)(a) Reviews [Assignment: organization-defined frequency] the privileges assigned to [Assignment: organization-defined roles or classes of users] to validate the need for such privileges; and
AC-6 (7) (a)
(CCI-002228)
The organization defines the frequency on which it conducts reviews of the privileges assigned to organization-defined roles or classes of users.
AC-6 (7) (a)
(CCI-002229)
The organization defines the roles or classes of users that are to have their privileges reviewed on an organization-defined frequency.
AC-6 (7) (a)
(CCI-002230)
The organization reviews the privileges assigned to organization-defined roles or classes of users on an organization-defined frequency to validate the need for such privileges.
AC-6 (7)(b) Reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs.
AC-6 (7) (b)
(CCI-002231)
The organization reassigns or removes privileges, if necessary, to correctly reflect organizational mission/business needs.
PRIVILEGE LEVELS FOR CODE EXECUTION
AC-6 (8) The information system prevents [Assignment: organization-defined software] from executing at higher privilege levels than users executing the software.
AC-6 (8)
(CCI-002232)
The organization defines software that is restricted from executing at a higher privilege than users executing the software.
AC-6 (8)
(CCI-002233)
The information system prevents organization-defined software from executing at higher privilege levels than users executing the software.
AUDITING USE OF PRIVILEGED FUNCTIONS
AC-6 (9) The information system audits the execution of privileged functions.
AC-6 (9)
(CCI-002234)
The information system audits the execution of privileged functions.
PROHIBIT NON-PRIVILEGED USERS FROM EXECUTING PRIVILEGED FUNCTIONS
AC-6 (10) The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
AC-6 (10)
(CCI-002235)
The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.
AC-7 ACCESS CONTROL : UNSUCCESSFUL LOGON ATTEMPTS
AC-7 The information system:
AC-7
(CCI-000043)
The organization defines the maximum number of consecutive invalid logon attempts to the information system by a user during an organization-defined time period.
AC-7
(CCI-001423)
The organization defines the time period in which the organization-defined maximum number of consecutive invalid logon attempts occur.
AC-7a. Enforces a limit of [Assignment: organization-defined number] consecutive invalid logon attempts by a user during a [Assignment: organization-defined time period]; and
AC-7 a
(CCI-000044)
The information system enforces the organization-defined limit of consecutive invalid logon attempts by a user during the organization-defined time period.
AC-7b. Automatically [Selection: locks the account/node for an [Assignment: organization-defined time period]; locks the account/node until released by an administrator; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
AC-7 b
(CCI-002236)
The organization defines the time period the information system will automatically lock the account or node when the maximum number of unsuccessful logon attempts is exceeded.
AC-7 b
(CCI-002237)
The organization defines the delay algorithm to be employed by the information system to delay the next logon prompt when the maximum number of unsuccessful logon attempts is exceeded.
AC-7 b
(CCI-002238)
The information system automatically locks the account or node for either an organization-defined time period, until the locked account or node is released by an administrator, or delays the next logon prompt according to the organization-defined delay algorithm when the maximum number of unsuccessful logon attempts is exceeded.
AUTOMATIC ACCOUNT LOCK
AC-7 (1) [Withdrawn: Incorporated into AC-7].
PURGE / WIPE MOBILE DEVICE
AC-7 (2) The information system purges/wipes information from [Assignment: organization-defined mobile devices] based on [Assignment: organization-defined purging/wiping requirements/techniques] after [Assignment: organization-defined number] consecutive, unsuccessful device logon attempts.
AC-7 (2)
(CCI-002239)
The organization defines the mobile devices that are to be purged/wiped by the information system after an organization-defined number of consecutive, unsuccessful device logon attempts.
AC-7 (2)
(CCI-002240)
The organization defines the purging/wiping requirements/techniques to be used by the information system on organization-defined mobile devices after an organization-defined number of consecutive, unsuccessful device logon attempts.
AC-7 (2)
(CCI-002241)
The organization defines the number of consecutive, unsuccessful device logon attempts after which the information system will purge/wipe organization-defined mobile devices.
AC-7 (2)
(CCI-002242)
The information system purges/wipes information from organization-defined mobile devices based on organization-defined purging/wiping requirements/techniques after an organization-defined number of consecutive, unsuccessful device logon attempts.
AC-8 ACCESS CONTROL : SYSTEM USE NOTIFICATION
AC-8 The information system:
AC-8a. Displays to users [Assignment: organization-defined system use notification message or banner] before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:
AC-8 a
(CCI-000048)
The information system displays an organization-defined system use notification message or banner before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
AC-8 a
(CCI-002247)
The organization defines the use notification message or banner the information system displays to users before granting access to the system.
AC-8a.1. Users are accessing a U.S. Government information system;
AC-8 a 1
(CCI-002243)
The organization-defined information system use notification message or banner is to state that users are accessing a U.S. Government information system.
AC-8a.2. Information system usage may be monitored, recorded, and subject to audit;
AC-8 a 2
(CCI-002244)
The organization-defined information system use notification message or banner is to state that information system usage may be monitored, recorded, and subject to audit.
AC-8a.3. Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and
AC-8 a 3
(CCI-002245)
The organization-defined information system use notification message or banner is to state that unauthorized use of the information system is prohibited and subject to criminal and civil penalties.
AC-8a.4. Use of the information system indicates consent to monitoring and recording;
AC-8 a 4
(CCI-002246)
The organization-defined information system use notification message or banner is to state that use of the information system indicates consent to monitoring and recording.
AC-8b. Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and
AC-8 b
(CCI-000050)
The information system retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system.
AC-8c. For publicly accessible systems:
AC-8c.1. Displays system use information [Assignment: organization-defined conditions], before granting further access;
AC-8 c 1
(CCI-001384)
The information system, for publicly accessible systems, displays system use information organization-defined conditions before granting further access.
AC-8 c 1
(CCI-002248)
The organization defines the conditions of use which are to be displayed to users of the information system before granting further access.
AC-8c.2. Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and
AC-8 c 2
(CCI-001385)
The information system, for publicly accessible systems, displays references, if any, to monitoring that are consistent with privacy accommodations for such systems that generally prohibit those activities.
AC-8 c 2
(CCI-001386)
The information system, for publicly accessible systems, displays references, if any, to recording that are consistent with privacy accommodations for such systems that generally prohibit those activities.
AC-8 c 2
(CCI-001387)
The information system, for publicly accessible systems, displays references, if any, to auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities.
AC-8c.3. Includes a description of the authorized uses of the system.
AC-8 c 3
(CCI-001388)
The information system, for publicly accessible systems, includes a description of the authorized uses of the system.
AC-9 ACCESS CONTROL : PREVIOUS LOGON (ACCESS) NOTIFICATION
AC-9 The information system notifies the user, upon successful logon (access) to the system, of the date and time of the last logon (access).
AC-9
(CCI-000052)
The information system notifies the user, upon successful logon (access) to the system, of the date and time of the last logon (access).
UNSUCCESSFUL LOGONS
AC-9 (1) The information system notifies the user, upon successful logon/access, of the number of unsuccessful logon/access attempts since the last successful logon/access.
AC-9 (1)
(CCI-000053)
The information system notifies the user, upon successful logon/access, of the number of unsuccessful logon/access attempts since the last successful logon/access.
SUCCESSFUL / UNSUCCESSFUL LOGONS
AC-9 (2) The information system notifies the user of the number of [Selection: successful logons/accesses; unsuccessful logon/access attempts; both] during [Assignment: organization-defined time period].
AC-9 (2)
(CCI-001389)
The organization defines the time period that the information system notifies the user of the number of successful logon/access attempts.
AC-9 (2)
(CCI-001390)
The organization defines the time period that the information system notifies the user of the number of unsuccessful logon/access attempts.
AC-9 (2)
(CCI-001391)
The information system notifies the user of the number of successful logins/accesses that occur during the organization-defined time period.
AC-9 (2)
(CCI-001392)
The information system notifies the user of the number of unsuccessful login/access attempts that occur during organization-defined time period.
NOTIFICATION OF ACCOUNT CHANGES
AC-9 (3) The information system notifies the user of changes to [Assignment: organization-defined security-related characteristics/parameters of the user�s account] during [Assignment: organization-defined time period].
AC-9 (3)
(CCI-001393)
The organization defines the security-related characteristics/parameters of the user's account which, when changed, will result in a notification being provided to the user during the organization-defined time period.
AC-9 (3)
(CCI-001394)
The organization defines the time period during which organization-defined security-related changes to the user's account are to be tracked.
AC-9 (3)
(CCI-001395)
The information system notifies the user of changes to organization-defined security-related characteristics/parameters of the user's account that occur during the organization-defined time period.
ADDITIONAL LOGON INFORMATION
AC-9 (4) The information system notifies the user, upon successful logon (access), of the following additional information: [Assignment: organization-defined information to be included in addition to the date and time of the last logon (access)].
AC-9 (4)
(CCI-002249)
The organization defines the information, in addition to the date and time of the last logon (access), to be included in the notification to the user upon successful logon (access).
AC-9 (4)
(CCI-002250)
The information system notifies the user, upon successful logon (access), of the organization-defined information to be included in addition to the date and time of the last logon (access).
AC-9 (4)
(CCI-002251)
The information system notifies the user, upon successful logon (access), of the date and time of the last logon (access).
AC-10 ACCESS CONTROL : CONCURRENT SESSION CONTROL
AC-10 The information system limits the number of concurrent sessions for each [Assignment: organization-defined account and/or account type] to [Assignment: organization-defined number].
AC-10
(CCI-000054)
The information system limits the number of concurrent sessions for each organization-defined account and/or account type to an organization-defined number of sessions.
AC-10
(CCI-000055)
The organization defines the maximum number of concurrent sessions to be allowed for each organization-defined account and/or account type.
AC-10
(CCI-002252)
The organization defines the accounts and/or account types for which the information system will limit the number of concurrent sessions.
AC-10
(CCI-002253)
The organization defines the account types for which the information system will limit the number of concurrent sessions.
AC-11 ACCESS CONTROL : SESSION LOCK
AC-11 The information system:
AC-11a. Prevents further access to the system by initiating a session lock after [Assignment: organization-defined time period] of inactivity or upon receiving a request from a user; and
AC-11 a
(CCI-000057)
The information system initiates a session lock after the organization-defined time period of inactivity.
AC-11 a
(CCI-000058)
The information system provides the capability for users to directly initiate session lock mechanisms.
AC-11 a
(CCI-000059)
The organization defines the time period of inactivity after which the information system initiates a session lock.
AC-11b. Retains the session lock until the user reestablishes access using established identification and authentication procedures.
AC-11 b
(CCI-000056)
The information system retains the session lock until the user reestablishes access using established identification and authentication procedures.
PATTERN-HIDING DISPLAYS
AC-11 (1) The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image.
AC-11 (1)
(CCI-000060)
The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image.
AC-12 ACCESS CONTROL : SESSION TERMINATION
AC-12 The information system automatically terminates a user session after [Assignment: organization-defined conditions or trigger events requiring session disconnect].
AC-12
(CCI-002254)
The organization defines the conditions or trigger events requiring session disconnect to be employed by the information system when automatically terminating a user session.
AC-12
(CCI-002360)
The organization defines the conditions or trigger events requiring session disconnect to be employed by the information system when automatically terminating a user session.
AC-12
(CCI-002361)
The information system automatically terminates a user session after organization-defined conditions or trigger events requiring session disconnect.
USER-INITIATED LOGOUTS / MESSAGE DISPLAYS
AC-12 (1) The information system:
AC-12 (1)
(CCI-002362)
The organization defines the resources requiring information system authentication in order to gain access.
AC-12 (1)
(CCI-002363)
The information system provides a logout capability for user-initiated communications sessions whenever authentication is used to gain access to organization-defined information resources.
AC-12 (1)
(CCI-002364)
The information system displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
AC-12 (1)(a) Provides a logout capability for user-initiated communications sessions whenever authentication is used to gain access to [Assignment: organization-defined information resources]; and
AC-12 (1)(b) Displays an explicit logout message to users indicating the reliable termination of authenticated communications sessions.
AC-13 ACCESS CONTROL : SUPERVISION AND REVIEW � ACCESS CONTROL
AC-13 [Withdrawn: Incorporated into AC-2 and AU-6].
AC-14 ACCESS CONTROL : PERMITTED ACTIONS WITHOUT IDENTIFICATION OR AUTHENTICATION
AC-14 The organization:
AC-14a. Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and
AC-14 a
(CCI-000061)
The organization identifies and defines organization-defined user actions that can be performed on the information system without identification or authentication consistent with organizational missions/business functions.
AC-14 a
(CCI-002255)
The organization defines the user actions that can be performed on the information system without identification and authentication.
AC-14b. Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
AC-14 b
(CCI-000232)
The organization documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification and authentication.
NECESSARY USES
AC-14 (1) [Withdrawn: Incorporated into AC-14].
AC-15 ACCESS CONTROL : AUTOMATED MARKING
AC-15 [Withdrawn: Incorporated into MP-3].
AC-16 ACCESS CONTROL : SECURITY ATTRIBUTES
AC-16 The organization:
AC-16a. Provides the means to associate [Assignment: organization-defined types of security attributes] having [Assignment: organization-defined security attribute values] with information in storage, in process, and/or in transmission;
AC-16 a
(CCI-002256)
The organization defines security attributes having organization-defined types of security attribute values which are associated with information in storage.
AC-16 a
(CCI-002257)
The organization defines security attributes having organization-defined types of security attribute values which are associated with information in process.
AC-16 a
(CCI-002258)
The organization defines security attributes, having organization-defined types of security attribute values, which are associated with information in transmission.
AC-16 a
(CCI-002259)
The organization defines security attribute values associated with organization-defined types of security attributes for information in storage.
AC-16 a
(CCI-002260)
The organization defines security attribute values associated with organization-defined types of security attributes for information in process.
AC-16 a
(CCI-002261)
The organization defines security attribute values associated with organization-defined types of security attributes for information in transmission.
AC-16 a
(CCI-002262)
The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in storage.
AC-16 a
(CCI-002263)
The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in process.
AC-16 a
(CCI-002264)
The organization provides the means to associate organization-defined types of security attributes having organization-defined security attribute values with information in transmission.
AC-16b. Ensures that the security attribute associations are made and retained with the information;
AC-16 b
(CCI-002265)
The organization ensures that the security attribute associations are made with the information.
AC-16 b
(CCI-002266)
The organization ensures that the security attribute associations are retained with the information.
AC-16c. Establishes the permitted [Assignment: organization-defined security attributes] for [Assignment: organization-defined information systems]; and
AC-16 c
(CCI-002267)
The organization defines the security attributes that are permitted for organization-defined information systems.
AC-16 c
(CCI-002268)
The organization defines the information systems for which permitted organization-defined attributes are to be established.
AC-16 c
(CCI-002269)
The organization establishes the permitted organization-defined security attributes for organization-defined information systems.
AC-16d. Determines the permitted [Assignment: organization-defined values or ranges] for each of the established security attributes.
AC-16 d
(CCI-002270)
The organization defines the values or ranges permitted for each of the established security attributes.
AC-16 d
(CCI-002271)
The organization determines the permitted organization-defined values or ranges for each of the established security attributes.
DYNAMIC ATTRIBUTE ASSOCIATION
AC-16 (1) The information system dynamically associates security attributes with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security policies] as information is created and combined.
AC-16 (1)
(CCI-001424)
The information system dynamically associates security attributes with organization-defined subjects in accordance with organization-defined security policies as information is created and combined.
AC-16 (1)
(CCI-002272)
The information system dynamically associates security attributes with organization-defined objects in accordance with organization-defined security policies as information is created and combined.
AC-16 (1)
(CCI-002273)
The organization defines the security policies the information system is to adhere to when dynamically associating security attributes with organization-defined subjects and objects.
AC-16 (1)
(CCI-002274)
The organization defines the subjects with which the information system is to dynamically associate security attributes as information is created and combined.
AC-16 (1)
(CCI-002275)
The organization defines the objects with which the information system is to dynamically associate security attributes as information is created and combined.
ATTRIBUTE VALUE CHANGES BY AUTHORIZED INDIVIDUALS
AC-16 (2) The information system provides authorized individuals (or processes acting on behalf of individuals) the capability to define or change the value of associated security attributes.
AC-16 (2)
(CCI-001559)
The organization identifies the individuals authorized to change the value of associated security attributes.
AC-16 (2)
(CCI-001425)
The information system provides authorized individuals (or processes acting on behalf of individuals) the capability to change the value of associated security attributes.
AC-16 (2)
(CCI-002276)
The organization identifies the individuals authorized to define the value of associated security attributes.
AC-16 (2)
(CCI-002277)
The information system provides authorized individuals (or processes acting on behalf of individuals) the capability to define the value of associated security attributes.
MAINTENANCE OF ATTRIBUTE ASSOCIATIONS BY INFORMATION SYSTEM
AC-16 (3) The information system maintains the association and integrity of [Assignment: organization-defined security attributes] to [Assignment: organization-defined subjects and objects].
AC-16 (3)
(CCI-002278)
The organization defines security attributes for which the association and integrity to organization-defined subjects and objects is maintained by the information system.
AC-16 (3)
(CCI-002279)
The organization defines subjects for which the association and integrity of organization-defined security attributes is maintained by the information system.
AC-16 (3)
(CCI-002280)
The organization defines objects for which the association and integrity of organization-defined security attributes is maintained by the information system.
AC-16 (3)
(CCI-002281)
The information system maintains the association of organization-defined security attributes to organization-defined subjects.
AC-16 (3)
(CCI-002282)
The information system maintains the association of organization-defined security attributes to organization-defined objects.
AC-16 (3)
(CCI-002283)
The information system maintains the integrity of organization-defined security attributes associated with organization-defined subjects.
AC-16 (3)
(CCI-002284)
The information system maintains the integrity of organization-defined security attributes associated with organization-defined objects.
ASSOCIATION OF ATTRIBUTES BY AUTHORIZED INDIVIDUALS
AC-16 (4) The information system supports the association of [Assignment: organization-defined security attributes] with [Assignment: organization-defined subjects and objects] by authorized individuals (or processes acting on behalf of individuals).
AC-16 (4)
(CCI-001560)
The organization identifies individuals (or processes acting on behalf of individuals) authorized to associate organization-defined security attributes with organization-defined objects.
AC-16 (4)
(CCI-002285)
The organization identifies individuals (or processes acting on behalf of individuals) authorized to associate organization-defined security attributes with organization-defined subjects.
AC-16 (4)
(CCI-002286)
The organization defines the subjects with which organization-defined security attributes may be associated by authorized individuals (or processes acting on behalf of individuals).
AC-16 (4)
(CCI-002287)
The organization defines the objects with which organization-defined security attributes may be associated by authorized individuals (or processes acting on behalf of individuals).
AC-16 (4)
(CCI-002288)
The organization defines the security attributes authorized individuals (or processes acting on behalf of individuals) are permitted to associate with organization-defined subjects and objects.
AC-16 (4)
(CCI-002289)
The information system supports the association of organization-defined security attributes with organization-defined subjects by authorized individuals (or processes acting on behalf of individuals).
AC-16 (4)
(CCI-002290)
The information system supports the association of organization-defined security attributes with organization-defined objects by authorized individuals (or processes acting on behalf of individuals).
ATTRIBUTE DISPLAYS FOR OUTPUT DEVICES
AC-16 (5) The information system displays security attributes in human-readable form on each object that the system transmits to output devices to identify [Assignment: organization-identified special dissemination, handling, or distribution instructions] using [Assignment: organization-identified human-readable, standard naming conventions].
AC-16 (5)
(CCI-001428)
The information system displays security attributes in human-readable form on each object that the system transmits to output devices to identify organization-identified special dissemination, handling, or distribution instructions using organization-identified human-readable, standard naming conventions.
AC-16 (5)
(CCI-001429)
The organization identifies special dissemination, handling, or distribution instructions for identifying security attributes on output.
AC-16 (5)
(CCI-001430)
The organization identifies human-readable, standard naming conventions for identifying security attributes on output.
MAINTENANCE OF ATTRIBUTE ASSOCIATION BY ORGANIZATION
AC-16 (6) The organization allows personnel to associate, and maintain the association of [Assignment: organization-defined security attributes] with [Assignment: organization-defined subjects and objects] in accordance with [Assignment: organization-defined security policies].
AC-16 (6)
(CCI-002291)
The organization defines the security policies to be followed by personnel when associating organization-defined security attributes with organization-defined subjects and objects.
AC-16 (6)
(CCI-002292)
The organization defines the security attributes which are to be associated with organization-defined subjects and objects.
AC-16 (6)
(CCI-002293)
The organization defines the subjects to be associated, and that association maintained, with organization-defined security attributes in accordance with organization-defined security policies.
AC-16 (6)
(CCI-002294)
The organization defines the objects to be associated, and that association maintained, with organization-defined security attributes in accordance with organization-defined security policies.
AC-16 (6)
(CCI-002295)
The organization allows personnel to associate organization-defined security attributes with organization-defined subjects in accordance with organization-defined security policies.
AC-16 (6)
(CCI-002296)
The organization allows personnel to associate organization-defined security attributes with organization-defined objects in accordance with organization-defined security policies.
AC-16 (6)
(CCI-002297)
The organization allows personnel to maintain the association of organization-defined security attributes with organization-defined subjects in accordance with organization-defined security policies.
AC-16 (6)
(CCI-002298)
The organization allows personnel to maintain the association of organization-defined security attributes with organization-defined objects in accordance with organization-defined security policies.
CONSISTENT ATTRIBUTE INTERPRETATION
AC-16 (7) The organization provides a consistent interpretation of security attributes transmitted between distributed information system components.
AC-16 (7)
(CCI-002299)
The organization provides a consistent interpretation of security attributes transmitted between distributed information system components.
ASSOCIATION TECHNIQUES / TECHNOLOGIES
AC-16 (8) The information system implements [Assignment: organization-defined techniques or technologies] with [Assignment: organization-defined level of assurance] in associating security attributes to information.
AC-16 (8)
(CCI-002300)
The organization defines the techniques or technologies to be implemented when associating security attributes with information.
AC-16 (8)
(CCI-002301)
The organization defines the level of assurance to be provided when implementing organization-defined techniques or technologies in associating security attributes to information.
AC-16 (8)
(CCI-002302)
The information system implements organization-defined techniques or technologies with an organization-defined level of assurance in associating security attributes to information.
ATTRIBUTE REASSIGNMENT
AC-16 (9) The organization ensures that security attributes associated with information are reassigned only via re-grading mechanisms validated using [Assignment: organization-defined techniques or procedures].
AC-16 (9)
(CCI-002303)
The organization defines the techniques or procedures to be employed to validate re-grading mechanisms.
AC-16 (9)
(CCI-002304)
The organization ensures security attributes associated with information are reassigned only via re-grading mechanisms validated using organization-defined techniques or procedures.
ATTRIBUTE CONFIGURATION BY AUTHORIZED INDIVIDUALS
AC-16 (10) The information system provides authorized individuals the capability to define or change the type and value of security attributes available for association with subjects and objects.
AC-16 (10)
(CCI-002305)
The organization identifies individuals authorized to define or change the type and value of security attributes available for association with subjects and objects.
AC-16 (10)
(CCI-002306)
The information system provides authorized individuals the capability to define or change the type of security attributes available for association with subjects.
AC-16 (10)
(CCI-002307)
The information system provides authorized individuals the capability to define or change the value of security attributes available for association with subjects.
AC-16 (10)
(CCI-002308)
The information system provides authorized individuals the capability to define or change the type of security attributes available for association with objects.
AC-16 (10)
(CCI-002309)
The information system provides authorized individuals the capability to define or change the value of security attributes available for association with objects.
AC-17 ACCESS CONTROL : REMOTE ACCESS
AC-17 The organization:
AC-17a. Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
AC-17 a
(CCI-000063)
The organization defines allowed methods of remote access to the information system.
AC-17 a
(CCI-002310)
The organization establishes and documents usage restrictions for each type of remote access allowed.
AC-17 a
(CCI-002311)
The organization establishes and documents configuration/connection requirements for each type of remote access allowed.
AC-17 a
(CCI-002312)
The organization establishes and documents implementation guidance for each type of remote access allowed.
AC-17b. Authorizes remote access to the information system prior to allowing such connections.
AC-17 b
(CCI-000065)
The organization authorizes remote access to the information system prior to allowing such connections.
AUTOMATED MONITORING / CONTROL
AC-17 (1) The information system monitors and controls remote access methods.
AC-17 (1)
(CCI-000067)
The information system monitors remote access methods.
AC-17 (1)
(CCI-002313)
The information system controls remote access methods.
AC-17 (1)
(CCI-002314)
The information system controls remote access methods.
PROTECTION OF CONFIDENTIALITY / INTEGRITY USING ENCRYPTION
AC-17 (2) The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.
AC-17 (2)
(CCI-000068)
The information system implements cryptographic mechanisms to protect the confidentiality of remote access sessions.
AC-17 (2)
(CCI-001453)
The information system implements cryptographic mechanisms to protect the integrity of remote access sessions.
MANAGED ACCESS CONTROL POINTS
AC-17 (3) The information system routes all remote accesses through [Assignment: organization-defined number] managed network access control points.
AC-17 (3)
(CCI-001561)
The organization defines managed access control points for remote access to the information system.
AC-17 (3)
(CCI-000069)
The information system routes all remote accesses through an organization-defined number of managed network access control points.
AC-17 (3)
(CCI-002315)
The organization defines the number of managed network access control points through which the information system routes all remote access.
PRIVILEGED COMMANDS / ACCESS
AC-17 (4) The organization:
AC-17 (4)(a) Authorizes the execution of privileged commands and access to security-relevant information via remote access only for [Assignment: organization-defined needs]; and
AC-17 (4) (a)
(CCI-000070)
The organization authorizes the execution of privileged commands via remote access only for organization-defined needs.
AC-17 (4) (a)
(CCI-002316)
The organization authorizes access to security-relevant information via remote access only for organization-defined needs.
AC-17 (4) (a)
(CCI-002317)
The organization defines the operational needs for when the execution of privileged commands via remote access is to be authorized.
AC-17 (4) (a)
(CCI-002318)
The organization defines the operational needs for when access to security-relevant information via remote access is to be authorized.
AC-17 (4)(b) Documents the rationale for such access in the security plan for the information system.
AC-17 (4) (b)
(CCI-002319)
The organization documents in the security plan for the information system the rationale for authorization of the execution of privilege commands via remote access.
AC-17 (4) (b)
(CCI-002320)
The organization documents in the security plan for the information system the rationale for authorization of access to security-relevant information via remote access.
MONITORING FOR UNAUTHORIZED CONNECTIONS
AC-17 (5) [Withdrawn: Incorporated into SI-4].
PROTECTION OF INFORMATION
AC-17 (6) The organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
AC-17 (6)
(CCI-000072)
The organization ensures that users protect information about remote access mechanisms from unauthorized use and disclosure.
ADDITIONAL PROTECTION FOR SECURITY FUNCTION ACCESS
AC-17 (7) [Withdrawn: Incorporated into AC-3 (10)].
DISABLE NONSECURE NETWORK PROTOCOLS
AC-17 (8) [Withdrawn: Incorporated into CM-7].
DISCONNECT / DISABLE ACCESS
AC-17 (9) The organization provides the capability to expeditiously disconnect or disable remote access to the information system within [Assignment: organization-defined time period].
AC-17 (9)
(CCI-002321)
The organization defines the time period within which it disconnects or disables remote access to the information system.
AC-17 (9)
(CCI-002322)
The organization provides the capability to expeditiously disconnect or disable remote access to the information system within the organization-defined time period.
AC-18 ACCESS CONTROL : WIRELESS ACCESS
AC-18 The organization:
AC-18a. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
AC-18 a
(CCI-001438)
The organization establishes usage restrictions for wireless access.
AC-18 a
(CCI-001439)
The organization establishes implementation guidance for wireless access.
AC-18 a
(CCI-002323)
The organization establishes configuration/connection requirements for wireless access.
AC-18b. Authorizes wireless access to the information system prior to allowing such connections.
AC-18 b
(CCI-001441)
The organization authorizes wireless access to the information system prior to allowing such connections.
AUTHENTICATION AND ENCRYPTION
AC-18 (1) The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.
AC-18 (1)
(CCI-001443)
The information system protects wireless access to the system using authentication of users and/or devices.
AC-18 (1)
(CCI-001444)
The information system protects wireless access to the system using encryption.
MONITORING UNAUTHORIZED CONNECTIONS
AC-18 (2) [Withdrawn: Incorporated into SI-4].
DISABLE WIRELESS NETWORKING
AC-18 (3) The organization disables, when not intended for use, wireless networking capabilities internally embedded within information system components prior to issuance and deployment.
AC-18 (3)
(CCI-001449)
The organization disables, when not intended for use, wireless networking capabilities internally embedded within information system components prior to issuance and deployment.
RESTRICT CONFIGURATIONS BY USERS
AC-18 (4) The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
AC-18 (4)
(CCI-002324)
The organization identifies and explicitly authorizes users allowed to independently configure wireless networking capabilities.
ANTENNAS / TRANSMISSION POWER LEVELS
AC-18 (5) The organization selects radio antennas and calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries.
AC-18 (5)
(CCI-001451)
The organization selects radio antennas and calibrates transmission power levels to reduce the probability that usable signals can be received outside of organization-controlled boundaries.
AC-19 ACCESS CONTROL : ACCESS CONTROL FOR MOBILE DEVICES
AC-19 The organization:
AC-19a. Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and
AC-19 a
(CCI-000082)
The organization establishes usage restrictions for organization-controlled mobile devices.
AC-19 a
(CCI-000083)
The organization establishes implementation guidance for organization-controlled mobile devices.
AC-19 a
(CCI-002325)
The organization establishes configuration requirements for organization-controlled mobile devices.
AC-19 a
(CCI-002326)
The organization establishes connection requirements for organization-controlled mobile devices.
AC-19b. Authorizes the connection of mobile devices to organizational information systems.
AC-19 b
(CCI-000084)
The organization authorizes connection of mobile devices to organizational information systems.
USE OF WRITABLE / PORTABLE STORAGE DEVICES
AC-19 (1) [Withdrawn: Incorporated into MP-7].
USE OF PERSONALLY OWNED PORTABLE STORAGE DEVICES
AC-19 (2) [Withdrawn: Incorporated into MP-7].
USE OF PORTABLE STORAGE DEVICES WITH NO IDENTIFIABLE OWNER
AC-19 (3) [Withdrawn: Incorporated into MP-7].
RESTRICTIONS FOR CLASSIFIED INFORMATION
AC-19 (4) The organization:
AC-19 (4)(a) Prohibits the use of unclassified mobile devices in facilities containing information systems processing, storing, or transmitting classified information unless specifically permitted by the authorizing official; and
AC-19 (4) (a)
(CCI-001330)
The organization prohibits the use of unclassified mobile devices in facilities containing information systems processing, storing, or transmitting classified information unless specifically permitted by the authorizing official.
AC-19 (4)(b) Enforces the following restrictions on individuals permitted by the authorizing official to use unclassified mobile devices in facilities containing information systems processing, storing, or transmitting classified information:
AC-19 (4)(b)(1) Connection of unclassified mobile devices to classified information systems is prohibited;
AC-19 (4) (b) (1)
(CCI-001331)
The organization prohibits connection of unclassified mobile devices to classified information systems.
AC-19 (4)(b)(2) Connection of unclassified mobile devices to unclassified information systems requires approval from the authorizing official;
AC-19 (4) (b) (2)
(CCI-001332)
The organization requires approval from the authorizing official for the connection of unclassified mobile devices to unclassified information systems.
AC-19 (4)(b)(3) Use of internal or external modems or wireless interfaces within the unclassified mobile devices is prohibited; and
AC-19 (4) (b) (3)
(CCI-001333)
The organization prohibits use of internal or external modems or wireless interfaces within unclassified mobile devices in facilities containing information systems processing, storing, or transmitting classified information.
AC-19 (4)(b)(4) Unclassified mobile devices and the information stored on those devices are subject to random reviews and inspections by [Assignment: organization-defined security officials], and if classified information is found, the incident handling policy is followed.
AC-19 (4) (b) (4)
(CCI-001458)
The organization requires that if classified information is found on mobile devices, the incident handling policy be followed.
AC-19 (4) (b) (4)
(CCI-001334)
The organization requires that unclassified mobile devices used in facilities containing information systems processing, storing, or transmitting classified information and the information stored on those devices be subject to random reviews and inspections by organization-defined security officials.
AC-19 (4) (b) (4)
(CCI-001335)
The organization defines security officials to perform reviews and inspections of unclassified mobile devices in facilities containing information systems processing, storing, or transmitting classified information.
AC-19 (4)(c) Restricts the connection of classified mobile devices to classified information systems in accordance with [Assignment: organization-defined security policies].
AC-19 (4) (c)
(CCI-002327)
The organization defines the security policies which restrict the connection of classified mobile devices to classified information systems.
AC-19 (4) (c)
(CCI-002328)
The organization restricts the connection of classified mobile devices to classified information systems in accordance with organization-defined security policies.
FULL DEVICE / CONTAINER-BASED ENCRYPTION
AC-19 (5) The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].
AC-19 (5)
(CCI-002329)
The organization defines the mobile devices that are to employ full-device or container encryption to protect the confidentiality and integrity of the information on the device.
AC-19 (5)
(CCI-002330)
The organization employs full-device encryption or container encryption to protect the confidentiality of information on organization-defined mobile devices.
AC-19 (5)
(CCI-002331)
The organization employs full-device encryption or container encryption to protect the integrity of information on organization-defined mobile devices.
AC-20 ACCESS CONTROL : USE OF EXTERNAL INFORMATION SYSTEMS
AC-20 The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:
AC-20a. Access the information system from external information systems; and
AC-20 a
(CCI-000093)
The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to access the information system from the external information systems.
AC-20b. Process, store, or transmit organization-controlled information using external information systems.
AC-20 b
(CCI-002332)
The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to process, store, or transmit organization-controlled information using the external information systems.
LIMITS ON AUTHORIZED USE
AC-20 (1) The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:
AC-20 (1)(a) Verifies the implementation of required security controls on the external system as specified in the organization�s information security policy and security plan; or
AC-20 (1) (a)
(CCI-002333)
The organization permits authorized individuals to use an external information system to access the information system only when the organization verifies the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
AC-20 (1) (a)
(CCI-002334)
The organization permits authorized individuals to use an external information system to process organization-controlled information only when the organization verifies the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
AC-20 (1) (a)
(CCI-002335)
The organization permits authorized individuals to use an external information system to store organization-controlled information only when the organization verifies the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
AC-20 (1) (a)
(CCI-002336)
The organization permits authorized individuals to use an external information system to transmit organization-controlled information only when the organization verifies the implementation of required security controls on the external system as specified in the organization's information security policy and security plan.
AC-20 (1)(b) Retains approved information system connection or processing agreements with the organizational entity hosting the external information system.
AC-20 (1) (b)
(CCI-002337)
The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization retains approved information system connection or processing agreements with the organizational entity hosting the external information system.
PORTABLE STORAGE DEVICES
AC-20 (2) The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.
AC-20 (2)
(CCI-000097)
The organization restricts or prohibits the use of organization-controlled portable storage devices by authorized individuals on external information systems.
NON-ORGANIZATIONALLY OWNED SYSTEMS / COMPONENTS / DEVICES
AC-20 (3) The organization [Selection: restricts; prohibits] the use of non-organizationally owned information systems, system components, or devices to process, store, or transmit organizational information.
AC-20 (3)
(CCI-002338)
The organization restricts or prohibits the use of non-organizationally owned information systems, system components, or devices to process, store, or transmit organizational information.
NETWORK ACCESSIBLE STORAGE DEVICES
AC-20 (4) The organization prohibits the use of [Assignment: organization-defined network accessible storage devices] in external information systems.
AC-20 (4)
(CCI-002339)
The organization defines the network accessible storage devices that are to be prohibited from being used in external information systems.
AC-20 (4)
(CCI-002340)
The organization prohibits the use of organization-defined network accessible storage devices in external information systems.
AC-21 ACCESS CONTROL : INFORMATION SHARING
AC-21 The organization:
AC-21a. Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and
AC-21 a
(CCI-000098)
The organization facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for organization-defined information circumstances where user discretion is required.
AC-21 a
(CCI-001470)
The organization defines information sharing circumstances where user discretion is required.
AC-21b. Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.
AC-21 b
(CCI-001471)
The organization employs organization-defined automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
AC-21 b
(CCI-001472)
The organization defines the automated mechanisms or manual processes required to assist users in making information sharing/collaboration decisions.
AUTOMATED DECISION SUPPORT
AC-21 (1) The information system enforces information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.
AC-21 (1)
(CCI-000099)
The information system enforces information-sharing decisions by authorized users based on access authorizations of sharing partners and access restrictions on information to be shared.
INFORMATION SEARCH AND RETRIEVAL
AC-21 (2) The information system implements information search and retrieval services that enforce [Assignment: organization-defined information sharing restrictions].
AC-21 (2)
(CCI-002341)
The organization defines the information sharing restrictions to be enforced by the information system for information search and retrieval services.
AC-21 (2)
(CCI-002342)
The information system implements information search and retrieval services that enforce organization-defined information sharing restrictions.
AC-22 ACCESS CONTROL : PUBLICLY ACCESSIBLE CONTENT
AC-22 The organization:
AC-22a. Designates individuals authorized to post information onto a publicly accessible information system;
AC-22 a
(CCI-001473)
The organization designates individuals authorized to post information onto a publicly accessible information system.
AC-22b. Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
AC-22 b
(CCI-001474)
The organization trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information.
AC-22c. Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and
AC-22 c
(CCI-001475)
The organization reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included.
AC-22d. Reviews the content on the publicly accessible information system for nonpublic information [Assignment: organization-defined frequency] and removes such information, if discovered.
AC-22 d
(CCI-001476)
The organization reviews the content on the publicly accessible information system for nonpublic information on an organization-defined frequency.
AC-22 d
(CCI-001477)
The organization defines a frequency for reviewing the content on the publicly accessible information system for nonpublic information.
AC-22 d
(CCI-001478)
The organization removes nonpublic information from the publicly accessible information system, if discovered.
AC-23 ACCESS CONTROL : DATA MINING PROTECTION
AC-23 The organization employs [Assignment: organization-defined data mining prevention and detection techniques] for [Assignment: organization-defined data storage objects] to adequately detect and protect against data mining.
AC-23
(CCI-002343)
The organization defines the data mining prevention techniques to be employed to adequately protect organization-defined data storage objects against data mining.
AC-23
(CCI-002344)
The organization defines the data mining detection techniques to be employed to adequately detect data mining attempts against organization-defined data storage objects.
AC-23
(CCI-002345)
The organization defines the data storage objects that are to be protected against data mining attempts.
AC-23
(CCI-002346)
The organization employs organization-defined data mining prevention techniques for organization-defined data storage objects to adequately protect against data mining.
AC-23
(CCI-002347)
The organization employs organization-defined data mining detection techniques for organization-defined data storage objects to adequately detect data mining attempts.
AC-24 ACCESS CONTROL : ACCESS CONTROL DECISIONS
AC-24 The organization establishes procedures to ensure [Assignment: organization-defined access control decisions] are applied to each access request prior to access enforcement.
AC-24
(CCI-002348)
The organization defines the access control decisions that are to be applied to each access request prior to access enforcement.
AC-24
(CCI-002349)
The organization establishes procedures to ensure organization-defined access control decisions are applied to each access request prior to access enforcement.
TRANSMIT ACCESS AUTHORIZATION INFORMATION
AC-24 (1) The information system transmits [Assignment: organization-defined access authorization information] using [Assignment: organization-defined security safeguards] to [Assignment: organization-defined information systems] that enforce access control decisions.
AC-24 (1)
(CCI-002350)
The organization defines the access authorization information that is to be transmitted using organization-defined security safeguards to organization-defined information systems that enforce access control decisions.
AC-24 (1)
(CCI-002351)
The organization defines the security safeguards to be employed when transmitting organization-defined access authorization information to organization-defined information systems that enforce access control decisions.
AC-24 (1)
(CCI-002352)
The organization defines the information systems that are to be recipients of organization-defined access authorization information using organization-defined security safeguards.
AC-24 (1)
(CCI-002353)
The information system transmits organization-defined access authorization information using organization-defined security safeguards to organization-defined information systems which enforce access control decisions.
NO USER OR PROCESS IDENTITY
AC-24 (2) The information system enforces access control decisions based on [Assignment: organization-defined security attributes] that do not include the identity of the user or process acting on behalf of the user.
AC-24 (2)
(CCI-002354)
The organization defines the security attributes, not to include the identity of the user or process acting on behalf of the user, to be used as the basis for enforcing access control decisions.
AC-24 (2)
(CCI-002355)
The information system enforces access control decisions based on organization-defined security attributes that do not include the identity of the user or process acting on behalf of the user.
AC-25 ACCESS CONTROL : REFERENCE MONITOR
AC-25 The information system implements a reference monitor for [Assignment: organization-defined access control policies] that is tamperproof, always invoked, and small enough to be subject to analysis and testing, the completeness of which can be assured.
AC-25
(CCI-002356)
The organization defines the access control policies to be implemented by the information system's reference monitor.
AC-25
(CCI-002357)
The information system implements a reference monitor for organization-defined access control policies that is tamperproof.
AC-25
(CCI-002358)
The information system implements a reference monitor for organization-defined access control policies that is always invoked.
AC-25
(CCI-002359)
The information system implements a reference monitor for organization-defined access control policies that is small enough to be subject to analysis and testing, the completeness of which can be assured.
AT-1 AWARENESS AND TRAINING : SECURITY AWARENESS AND TRAINING POLICY AND PROCEDURES
AT-1 The organization:
AT-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
AT-1a.1. A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
AT-1 a 1
(CCI-000100)
The organization develops and documents a security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
AT-1 a 1
(CCI-000101)
The organization disseminates a security awareness and training policy to organization-defined personnel or roles.
AT-1 a 1
(CCI-002048)
The organization defines the personnel or roles to whom the security awareness and training policy is disseminated.
AT-1a.2. Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and
AT-1 a 2
(CCI-000103)
The organization develops and documents procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls.
AT-1 a 2
(CCI-000104)
The organization disseminates security awareness and training procedures to organization-defined personnel or roles.
AT-1 a 2
(CCI-002049)
The organization defines the personnel or roles to whom the security awareness and training procedures are disseminated.
AT-1b. Reviews and updates the current:
AT-1b.1. Security awareness and training policy [Assignment: organization-defined frequency]; and
AT-1 b 1
(CCI-001564)
The organization defines the frequency of security awareness and training policy reviews and updates.
AT-1 b 1
(CCI-000102)
The organization reviews and updates the current security awareness and training policy in accordance with organization-defined frequency.
AT-1b.2. Security awareness and training procedures [Assignment: organization-defined frequency].
AT-1 b 2
(CCI-001565)
The organization defines the frequency of security awareness and training procedure reviews and updates.
AT-1 b 2
(CCI-000105)
The organization reviews and updates the current security awareness and training procedures in accordance with an organization-defined frequency.
AT-2 AWARENESS AND TRAINING : SECURITY AWARENESS TRAINING
AT-2 The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):
AT-2
(CCI-001480)
The organization defines the frequency for providing refresher security awareness training to all information system users (including managers, senior executives, and contractors).
AT-2a. As part of initial training for new users;
AT-2 a
(CCI-000106)
The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) as part of initial training for new users.
AT-2b. When required by information system changes; and
AT-2 b
(CCI-000112)
The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors) when required by information system changes.
AT-2c. [Assignment: organization-defined frequency] thereafter.
AT-2 c
(CCI-001479)
The organization provides refresher security awareness training to all information system users (including managers, senior executives, and contractors) in accordance with the organization-defined frequency.
PRACTICAL EXERCISES
AT-2 (1) The organization includes practical exercises in security awareness training that simulate actual cyber attacks.
AT-2 (1)
(CCI-000107)
The organization includes practical exercises in security awareness training that simulate actual cyber attacks.
INSIDER THREAT
AT-2 (2) The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.
AT-2 (2)
(CCI-002055)
The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.
AT-3 AWARENESS AND TRAINING : ROLE-BASED SECURITY TRAINING
AT-3 The organization provides role-based security training to personnel with assigned security roles and responsibilities:
AT-3a. Before authorizing access to the information system or performing assigned duties;
AT-3 a
(CCI-000108)
The organization provides role-based security training to personnel with assigned security roles and responsibilities before authorizing access to the information system or performing assigned duties.
AT-3b. When required by information system changes; and
AT-3 b
(CCI-000109)
The organization provides role-based security training to personnel with assigned security roles and responsibilities when required by information system changes.
AT-3c. [Assignment: organization-defined frequency] thereafter.
AT-3 c
(CCI-000110)
The organization provides refresher role-based security training to personnel with assigned security roles and responsibilities in accordance with organization-defined frequency.
AT-3 c
(CCI-000111)
The organization defines a frequency for providing refresher role-based security training.
ENVIRONMENTAL CONTROLS
AT-3 (1) The organization provides [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of environmental controls.
AT-3 (1)
(CCI-001481)
The organization provides organization-defined personnel or roles with initial training in the employment and operation of environmental controls.
AT-3 (1)
(CCI-001482)
The organization provides organization-defined personnel or roles with refresher training in the employment and operation of environmental controls in accordance with the organization-defined frequency.
AT-3 (1)
(CCI-001483)
The organization defines a frequency for providing employees with refresher training in the employment and operation of environmental controls.
AT-3 (1)
(CCI-002050)
The organization defines the personnel or roles to whom initial and refresher training in the employment and operation of environmental controls is to be provided.
PHYSICAL SECURITY CONTROLS
AT-3 (2) The organization provides [Assignment: organization-defined personnel or roles] with initial and [Assignment: organization-defined frequency] training in the employment and operation of physical security controls.
AT-3 (2)
(CCI-001566)
The organization provides organization-defined personnel or roles with initial training in the employment and operation of physical security controls.
AT-3 (2)
(CCI-001567)
The organization provides organization-defined personnel or roles with refresher training in the employment and operation of physical security controls in accordance with the organization-defined frequency.
AT-3 (2)
(CCI-001568)
The organization defines a frequency for providing employees with refresher training in the employment and operation of physical security controls.
AT-3 (2)
(CCI-002051)
The organization defines the personnel or roles to whom initial and refresher training in the employment and operation of physical security controls is to be provided.
PRACTICAL EXERCISES
AT-3 (3) The organization includes practical exercises in security training that reinforce training objectives.
AT-3 (3)
(CCI-002052)
The organization includes practical exercises in security training that reinforce training objectives.
SUSPICIOUS COMMUNICATIONS AND ANOMALOUS SYSTEM BEHAVIOR
AT-3 (4) The organization provides training to its personnel on [Assignment: organization-defined indicators of malicious code] to recognize suspicious communications and anomalous behavior in organizational information systems.
AT-3 (4)
(CCI-002053)
The organization provides training to its personnel on organization-defined indicators of malicious code to recognize suspicious communications and anomalous behavior in organizational information systems.
AT-3 (4)
(CCI-002054)
The organization defines indicators of malicious code to recognize suspicious communications and anomalous behavior in organizational information systems.
AT-4 AWARENESS AND TRAINING : SECURITY TRAINING RECORDS
AT-4 The organization:
AT-4a. Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and
AT-4 a
(CCI-000113)
The organization documents individual information system security training activities, including basic security awareness training and specific information system security training.
AT-4 a
(CCI-000114)
The organization monitors individual information system security training activities, including basic security awareness training and specific information system security training.
AT-4b. Retains individual training records for [Assignment: organization-defined time period].
AT-4 b
(CCI-001336)
The organization retains individual training records for an organization-defined time period.
AT-4 b
(CCI-001337)
The organization defines a time period for retaining individual training records.
AT-5 AWARENESS AND TRAINING : CONTACTS WITH SECURITY GROUPS AND ASSOCIATIONS
AT-5 [Withdrawn: Incorporated into PM-15].
AU-1 AUDIT AND ACCOUNTABILITY : AUDIT AND ACCOUNTABILITY POLICY AND PROCEDURES
AU-1 The organization:
AU-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
AU-1a.1. An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
AU-1 a 1
(CCI-000117)
The organization develops and documents an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
AU-1 a 1
(CCI-001831)
The organization documents an audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
AU-1 a 1
(CCI-001832)
The organization disseminates the audit and accountability policy to organization-defined personnel or roles.
AU-1 a 1
(CCI-001930)
The organization defines the organizational personnel or roles to whom the audit and accountability policy is to be disseminated.
AU-1a.2. Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and
AU-1 a 2
(CCI-000120)
The organization develops and documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
AU-1 a 2
(CCI-001833)
The organization documents procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
AU-1 a 2
(CCI-001834)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls.
AU-1 a 2
(CCI-001931)
The organization defines the organizational personnel or roles to whom the audit and accountability procedures are to be disseminated.
AU-1b. Reviews and updates the current:
AU-1b.1. Audit and accountability policy [Assignment: organization-defined frequency]; and
AU-1 b 1
(CCI-001569)
The organization defines the frequency on which it will review and update the audit and accountability policy.
AU-1 b 1
(CCI-000119)
The organization reviews and updates the audit and accountability policy on an organization-defined frequency.
AU-1 b 1
(CCI-001835)
The organization defines the frequency on which it will review the audit and accountability policy.
AU-1 b 1
(CCI-001836)
The organization defines the frequency on which it will update the audit and accountability policy.
AU-1 b 1
(CCI-001837)
The organization reviews the audit and accountability policy on an organization-defined frequency.
AU-1 b 1
(CCI-001838)
The organization updates the audit and accountability policy on an organization-defined frequency.
AU-1b.2. Audit and accountability procedures [Assignment: organization-defined frequency].
AU-1 b 2
(CCI-001570)
The organization defines the frequency on which it will review and update the audit and accountability procedures.
AU-1 b 2
(CCI-000122)
The organization reviews and updates the audit and accountability procedures on an organization-defined frequency.
AU-1 b 2
(CCI-001839)
The organization defines the frequency on which it will review the audit and accountability procedures.
AU-1 b 2
(CCI-001840)
The organization defines the frequency on which it will update the audit and accountability procedures.
AU-1 b 2
(CCI-001841)
The organization reviews the audit and accountability procedures on an organization-defined frequency.
AU-1 b 2
(CCI-001842)
The organization updates the audit and accountability procedures on an organization-defined frequency.
AU-2 AUDIT AND ACCOUNTABILITY : AUDIT EVENTS
AU-2 The organization:
AU-2a. Determines that the information system is capable of auditing the following events: [Assignment: organization-defined auditable events];
AU-2 a
(CCI-001571)
The organization defines the information system auditable events.
AU-2 a
(CCI-000123)
The organization determines the information system must be capable of auditing an organization-defined list of auditable events.
AU-2b. Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events;
AU-2 b
(CCI-000124)
The organization coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events.
AU-2c. Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and
AU-2 c
(CCI-000125)
The organization provides a rationale for why the list of auditable events is deemed to be adequate to support after-the-fact investigations of security incidents.
AU-2d. Determines that the following events are to be audited within the information system: [Assignment: organization-defined audited events (the subset of the auditable events defined in AU-2 a.) along with the frequency of (or situation requiring) auditing for each identified event].
AU-2 d
(CCI-000126)
The organization determines that the organization-defined subset of the auditable events defined in AU-2 are to be audited within the information system.
AU-2 d
(CCI-001484)
The organization defines frequency of (or situation requiring) auditing for each identified event.
AU-2 d
(CCI-001485)
The organization defines the events which are to be audited on the information system on an organization-defined frequency of (or situation requiring) auditing for each identified event.
COMPILATION OF AUDIT RECORDS FROM MULTIPLE SOURCES
AU-2 (1) [Withdrawn: Incorporated into AU-12].
SELECTION OF AUDIT EVENTS BY COMPONENT
AU-2 (2) [Withdrawn: Incorporated into AU-12].
REVIEWS AND UPDATES
AU-2 (3) The organization reviews and updates the audited events [Assignment: organization-defined frequency].
AU-2 (3)
(CCI-000127)
The organization reviews and updates the list of organization-defined audited events on an organization-defined frequency.
AU-2 (3)
(CCI-001486)
The organization defines a frequency for reviewing and updating the list of organization-defined auditable events.
AU-2 (3)
(CCI-001843)
The organization defines a frequency for updating the list of organization-defined auditable events.
PRIVILEGED FUNCTIONS
AU-2 (4) [Withdrawn: Incorporated into AC-6 (9)].
AU-3 AUDIT AND ACCOUNTABILITY : CONTENT OF AUDIT RECORDS
AU-3 The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event.
AU-3
(CCI-000130)
The information system generates audit records containing information that establishes what type of event occurred.
AU-3
(CCI-000131)
The information system generates audit records containing information that establishes when an event occurred.
AU-3
(CCI-000132)
The information system generates audit records containing information that establishes where the event occurred.
AU-3
(CCI-000133)
The information system generates audit records containing information that establishes the source of the event.
AU-3
(CCI-000134)
The information system generates audit records containing information that establishes the outcome of the event.
AU-3
(CCI-001487)
The information system generates audit records containing information that establishes the identity of any individuals or subjects associated with the event.
ADDITIONAL AUDIT INFORMATION
AU-3 (1) The information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information].
AU-3 (1)
(CCI-000135)
The information system generates audit records containing the organization-defined additional, more detailed information that is to be included in the audit records.
AU-3 (1)
(CCI-001488)
The organization defines additional, more detailed information to be included in the audit records.
CENTRALIZED MANAGEMENT OF PLANNED AUDIT RECORD CONTENT
AU-3 (2) The information system provides centralized management and configuration of the content to be captured in audit records generated by [Assignment: organization-defined information system components].
AU-3 (2)
(CCI-001844)
The information system provides centralized management and configuration of the content to be captured in audit records generated by organization-defined information system components.
AU-3 (2)
(CCI-001845)
The information system provides centralized configuration of the content to be captured in audit records generated by organization-defined information system components.
AU-3 (2)
(CCI-001846)
The organization defines information system components that will generate the audit records which are to be captured for centralized management of the content.
AU-3 (2)
(CCI-001847)
The organization defines information system components that will generate the audit records which are to be captured for centralized configuration of the content.
AU-4 AUDIT AND ACCOUNTABILITY : AUDIT STORAGE CAPACITY
AU-4 The organization allocates audit record storage capacity in accordance with [Assignment: organization-defined audit record storage requirements].
AU-4
(CCI-001848)
The organization defines the audit record storage requirements.
AU-4
(CCI-001849)
The organization allocates audit record storage capacity in accordance with organization-defined audit record storage requirements.
TRANSFER TO ALTERNATE STORAGE
AU-4 (1) The information system off-loads audit records [Assignment: organization-defined frequency] onto a different system or media than the system being audited.
AU-4 (1)
(CCI-001850)
The organization defines the frequency on which the information system off-loads audit records onto a different system or media than the system being audited.
AU-4 (1)
(CCI-001851)
The information system off-loads audit records per organization-defined frequency onto a different system or media than the system being audited.
AU-5 AUDIT AND ACCOUNTABILITY : RESPONSE TO AUDIT PROCESSING FAILURES
AU-5 The information system:
AU-5a. Alerts [Assignment: organization-defined personnel or roles] in the event of an audit processing failure; and
AU-5 a
(CCI-001572)
The organization defines the personnel or roles to be alerted in the event of an audit processing failure.
AU-5 a
(CCI-000139)
The information system alerts designated organization-defined personnel or roles in the event of an audit processing failure.
AU-5b. Takes the following additional actions: [Assignment: organization-defined actions to be taken (e.g., shut down information system, overwrite oldest audit records, stop generating audit records)].
AU-5 b
(CCI-000140)
The information system takes organization-defined actions upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
AU-5 b
(CCI-001490)
The organization defines actions to be taken by the information system upon audit failure (e.g., shut down information system, overwrite oldest audit records, stop generating audit records).
AUDIT STORAGE CAPACITY
AU-5 (1) The information system provides a warning to [Assignment: organization-defined personnel, roles, and/or locations] within [Assignment: organization-defined time period] when allocated audit record storage volume reaches [Assignment: organization-defined percentage] of repository maximum audit record storage capacity.
AU-5 (1)
(CCI-001852)
The organization defines the personnel, roles and/or locations to receive a warning when allocated audit record storage volume reaches a defined percentage of maximum audit records storage capacity.
AU-5 (1)
(CCI-001853)
The organization defines the time period within which organization-defined personnel, roles, and/or locations are to receive warnings when allocated audit record storage volume reaches an organization-defined percentage of maximum audit records storage capacity.
AU-5 (1)
(CCI-001854)
The organization defines the percentage of maximum audit record storage capacity that is to be reached, at which time the information system will provide a warning to organization-defined personnel, roles, and/or locations.
AU-5 (1)
(CCI-001855)
The information system provides a warning to organization-defined personnel, roles, and/or locations within an organization-defined time period when allocated audit record storage volume reaches an organization-defined percentage of repository maximum audit record storage capacity.
REAL-TIME ALERTS
AU-5 (2) The information system provides an alert in [Assignment: organization-defined real-time period] to [Assignment: organization-defined personnel, roles, and/or locations] when the following audit failure events occur: [Assignment: organization-defined audit failure events requiring real-time alerts].
AU-5 (2)
(CCI-000147)
The organization defines the audit failure events requiring real-time alerts.
AU-5 (2)
(CCI-001856)
The organization defines the real-time period within which the information system is to provide an alert when organization-defined audit failure events occur.
AU-5 (2)
(CCI-001857)
The organization defines the personnel, roles, and/or locations to receive alerts when organization-defined audit failure events occur.
AU-5 (2)
(CCI-001858)
The information system provides a real-time alert in an organization-defined real-time period to organization-defined personnel, roles, and/or locations when organization-defined audit failure events requiring real-time alerts occur.
CONFIGURABLE TRAFFIC VOLUME THRESHOLDS
AU-5 (3) The information system enforces configurable network communications traffic volume thresholds reflecting limits on auditing capacity and [Selection: rejects; delays] network traffic above those thresholds.
AU-5 (3)
(CCI-001573)
The organization defines whether to reject or delay network traffic that exceeds organization-defined thresholds.
AU-5 (3)
(CCI-000145)
The information system enforces configurable network communications traffic volume thresholds reflecting limits on auditing capacity by delaying or rejecting network traffic which exceeds the organization-defined thresholds.
AU-5 (3)
(CCI-001859)
The organization defines the network communication traffic volume thresholds reflecting limits on auditing capacity, specifying when the information system will reject or delay network traffic that exceed those thresholds.
SHUTDOWN ON FAILURE
AU-5 (4) The information system invokes a [Selection: full system shutdown; partial system shutdown; degraded operational mode with limited mission/business functionality available] in the event of [Assignment: organization-defined audit failures], unless an alternate audit capability exists.
AU-5 (4)
(CCI-001860)
The organization defines the audit failures which, should they occur, will invoke an organization-defined system mode.
AU-5 (4)
(CCI-001861)
The information system invokes an organization-defined system mode, in the event of organization-defined audit failures, unless an alternate audit capability exists.
AU-5 (4)
(CCI-002907)
The organization defines the system mode to be invoked, such as a full system shutdown, a partial system shutdown, or a degraded operational mode with limited mission/business functionality available, in the event of organization-defined audit failures.
AU-6 AUDIT AND ACCOUNTABILITY : AUDIT REVIEW, ANALYSIS, AND REPORTING
AU-6 The organization:
AU-6a. Reviews and analyzes information system audit records [Assignment: organization-defined frequency] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and
AU-6 a
(CCI-000148)
The organization reviews and analyzes information system audit records on an organization-defined frequency for indications of organization-defined inappropriate or unusual activity.
AU-6 a
(CCI-000151)
The organization defines the frequency for the review and analysis of information system audit records for organization-defined inappropriate or unusual activity.
AU-6 a
(CCI-001862)
The organization defines the types of inappropriate or unusual activity to be reviewed and analyzed in the audit records.
AU-6b. Reports findings to [Assignment: organization-defined personnel or roles].
AU-6 b
(CCI-000149)
The organization reports any findings to organization-defined personnel or roles for indications of organization-defined inappropriate or unusual activity.
AU-6 b
(CCI-001863)
The organization defines the personnel or roles to receive the reports of organization-defined inappropriate or unusual activity.
PROCESS INTEGRATION
AU-6 (1) The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.
AU-6 (1)
(CCI-001864)
The organization employs automated mechanisms to integrate audit review and analysis to support organizational processes for investigation of and response to suspicious activities.
AU-6 (1)
(CCI-001865)
The organization employs automated mechanisms to integrate reporting processes to support organizational investigation of and response to suspicious activities.
AUTOMATED SECURITY ALERTS
AU-6 (2) [Withdrawn: Incorporated into SI-4].
CORRELATE AUDIT REPOSITORIES
AU-6 (3) The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.
AU-6 (3)
(CCI-000153)
The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.
CENTRAL REVIEW AND ANALYSIS
AU-6 (4) The information system provides the capability to centrally review and analyze audit records from multiple components within the system.
AU-6 (4)
(CCI-000154)
The information system provides the capability to centrally review and analyze audit records from multiple components within the system.
INTEGRATION / SCANNING AND MONITORING CAPABILITIES
AU-6 (5) The organization integrates analysis of audit records with analysis of [Selection (one or more): vulnerability scanning information; performance data; information system monitoring information; [Assignment: organization-defined data/information collected from other sources]] to further enhance the ability to identify inappropriate or unusual activity.
AU-6 (5)
(CCI-001866)
The organization defines the data/information to be collected from other sources to enhance its ability to identify inappropriate or unusual activity.
AU-6 (5)
(CCI-001867)
The organization integrates analysis of audit records with analysis of vulnerability scanning information, performance data, information system monitoring information, and/or organization-defined data/information collected from other sources to further enhance its ability to identify inappropriate or unusual activity.
CORRELATION WITH PHYSICAL MONITORING
AU-6 (6) The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.
AU-6 (6)
(CCI-001491)
The organization correlates information from audit records with information obtained from monitoring physical access to further enhance the ability to identify suspicious, inappropriate, unusual, or malevolent activity.
PERMITTED ACTIONS
AU-6 (7) The organization specifies the permitted actions for each [Selection (one or more): information system process; role; user] associated with the review, analysis, and reporting of audit information.
AU-6 (7)
(CCI-001868)
The organization specifies the permitted actions for each information system process, role, and/or user associated with the review and analysis of audit information.
AU-6 (7)
(CCI-001869)
The organization specifies the permitted actions for each information system process, role, and/or user associated with the reporting of audit information.
FULL TEXT ANALYSIS OF PRIVILEGED COMMANDS
AU-6 (8) The organization performs a full text analysis of audited privileged commands in a physically distinct component or subsystem of the information system, or other information system that is dedicated to that analysis.
AU-6 (8)
(CCI-001870)
The organization performs a full-text analysis of audited privileged commands in a physically-distinct component or subsystem of the information system, or other information system that is dedicated to that analysis.
CORRELATION WITH INFORMATION FROM NONTECHNICAL SOURCES
AU-6 (9) The organization correlates information from nontechnical sources with audit information to enhance organization-wide situational awareness.
AU-6 (9)
(CCI-001871)
The organization correlates information from non-technical sources with audit information to enhance organization-wide situational awareness.
AUDIT LEVEL ADJUSTMENT
AU-6 (10) The organization adjusts the level of audit review, analysis, and reporting within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
AU-6 (10)
(CCI-001872)
The organization adjusts the level of audit review and analysis within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
AU-6 (10)
(CCI-001873)
The organization adjusts the level of audit analysis within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
AU-6 (10)
(CCI-001874)
The organization adjusts the level of audit reporting within the information system when there is a change in risk based on law enforcement information, intelligence information, or other credible sources of information.
AU-7 AUDIT AND ACCOUNTABILITY : AUDIT REDUCTION AND REPORT GENERATION
AU-7 The information system provides an audit reduction and report generation capability that:
AU-7a. Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and
AU-7 a
(CCI-001875)
The information system provides an audit reduction capability that supports on-demand audit review and analysis.
AU-7 a
(CCI-001876)
The information system provides an audit reduction capability that supports on-demand reporting requirements.
AU-7 a
(CCI-001877)
The information system provides an audit reduction capability that supports after-the-fact investigations of security incidents.
AU-7 a
(CCI-001878)
The information system provides a report generation capability that supports on-demand audit review and analysis.
AU-7 a
(CCI-001879)
The information system provides a report generation capability that supports on-demand reporting requirements.
AU-7 a
(CCI-001880)
The information system provides a report generation capability that supports after-the-fact investigations of security incidents.
AU-7b. Does not alter the original content or time ordering of audit records.
AU-7 b
(CCI-001881)
The information system provides an audit reduction capability that does not alter original content or time ordering of audit records.
AU-7 b
(CCI-001882)
The information system provides a report generation capability that does not alter original content or time ordering of audit records.
AUTOMATIC PROCESSING
AU-7 (1) The information system provides the capability to process audit records for events of interest based on [Assignment: organization-defined audit fields within audit records].
AU-7 (1)
(CCI-000158)
The information system provides the capability to process audit records for events of interest based on organization-defined audit fields within audit records.
AU-7 (1)
(CCI-001883)
The organization defines the audit fields within audit records to be processed for events of interest by the information system.
AUTOMATIC SORT AND SEARCH
AU-7 (2) The information system provides the capability to sort and search audit records for events of interest based on the content of [Assignment: organization-defined audit fields within audit records].
AU-7 (2)
(CCI-001884)
The organization defines the audit fields within audit records to be sorted for events of interest by the information system.
AU-7 (2)
(CCI-001885)
The organization defines the audit fields within audit records to be searched for events of interest by the information system.
AU-7 (2)
(CCI-001886)
The information system provides the capability to sort audit records for events of interest based on the content of organization-defined audit fields within audit records.
AU-7 (2)
(CCI-001887)
The information system provides the capability to search audit records for events of interest based on the content of organization-defined audit fields within audit records.
AU-8 AUDIT AND ACCOUNTABILITY : TIME STAMPS
AU-8 The information system:
AU-8a. Uses internal system clocks to generate time stamps for audit records; and
AU-8 a
(CCI-000159)
The information system uses internal system clocks to generate time stamps for audit records.
AU-8b. Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: organization-defined granularity of time measurement].
AU-8 b
(CCI-001888)
The organization defines the granularity of time measurement for time stamps generated for audit records.
AU-8 b
(CCI-001889)
The information system records time stamps for audit records that meet organization-defined granularity of time measurement.
AU-8 b
(CCI-001890)
The information system records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT).
SYNCHRONIZATION WITH AUTHORITATIVE TIME SOURCE
AU-8 (1) The information system:
AU-8 (1)(a) Compares the internal information system clocks [Assignment: organization-defined frequency] with [Assignment: organization-defined authoritative time source]; and
AU-8 (1) (a)
(CCI-000161)
The organization defines the frequency for the synchronization of internal information system clocks.
AU-8 (1) (a)
(CCI-001492)
The organization defines an authoritative time source for the synchronization of internal information system clocks.
AU-8 (1) (a)
(CCI-001891)
The information system compares internal information system clocks on an organization-defined frequency with an organization-defined authoritative time source.
AU-8 (1)(b) Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period].
AU-8 (1) (b)
(CCI-001892)
The organization defines the time difference which, when exceeded, will require the information system to synchronize the internal information system clocks to the organization-defined authoritative time source.
AU-8 (1) (b)
(CCI-002046)
The information system synchronizes the internal system clocks to the authoritative time source when the time difference is greater than the organization-defined time period.
SECONDARY AUTHORITATIVE TIME SOURCE
AU-8 (2) The information system identifies a secondary authoritative time source that is located in a different geographic region than the primary authoritative time source.
AU-8 (2)
(CCI-001893)
The information system identifies a secondary authoritative time source that is located in a different geographic region than the primary authoritative time source.
AU-9 AUDIT AND ACCOUNTABILITY : PROTECTION OF AUDIT INFORMATION
AU-9 The information system protects audit information and audit tools from unauthorized access, modification, and deletion.
AU-9
(CCI-000162)
The information system protects audit information from unauthorized access.
AU-9
(CCI-000163)
The information system protects audit information from unauthorized modification.
AU-9
(CCI-000164)
The information system protects audit information from unauthorized deletion.
AU-9
(CCI-001493)
The information system protects audit tools from unauthorized access.
AU-9
(CCI-001494)
The information system protects audit tools from unauthorized modification.
AU-9
(CCI-001495)
The information system protects audit tools from unauthorized deletion.
HARDWARE WRITE-ONCE MEDIA
AU-9 (1) The information system writes audit trails to hardware-enforced, write-once media.
AU-9 (1)
(CCI-000165)
The information system writes audit records to hardware-enforced, write-once media.
AUDIT BACKUP ON SEPARATE PHYSICAL SYSTEMS / COMPONENTS
AU-9 (2) The information system backs up audit records [Assignment: organization-defined frequency] onto a physically different system or system component than the system or component being audited.
AU-9 (2)
(CCI-001575)
The organization defines the system or system component for storing audit records that is a different system or system component than the system or component being audited.
AU-9 (2)
(CCI-001348)
The information system backs up audit records on an organization-defined frequency onto a different system or system component than the system or component being audited.
AU-9 (2)
(CCI-001349)
The organization defines a frequency for backing up system audit records onto a different system or system component than the system or component being audited.
CRYPTOGRAPHIC PROTECTION
AU-9 (3) The information system implements cryptographic mechanisms to protect the integrity of audit information and audit tools.
AU-9 (3)
(CCI-001350)
The information system implements cryptographic mechanisms to protect the integrity of audit information.
AU-9 (3)
(CCI-001496)
The information system implements cryptographic mechanisms to protect the integrity of audit tools.
ACCESS BY SUBSET OF PRIVILEGED USERS
AU-9 (4) The organization authorizes access to management of audit functionality to only [Assignment: organization-defined subset of privileged users].
AU-9 (4)
(CCI-001351)
The organization authorizes access to management of audit functionality to only an organization-defined subset of privileged users.
AU-9 (4)
(CCI-001894)
The organization defines the subset of privileged users who will be authorized access to the management of audit functionality.
DUAL AUTHORIZATION
AU-9 (5) The organization enforces dual authorization for [Selection (one or more): movement; deletion] of [Assignment: organization-defined audit information].
AU-9 (5)
(CCI-001895)
The organization defines the audit information requiring dual authorization for movement or deletion actions.
AU-9 (5)
(CCI-001896)
The organization enforces dual authorization for movement and/or deletion of organization-defined audit information.
READ ONLY ACCESS
AU-9 (6) The organization authorizes read-only access to audit information to [Assignment: organization-defined subset of privileged users].
AU-9 (6)
(CCI-001897)
The organization defines the subset of privileged users who will be authorized read-only access to audit information.
AU-9 (6)
(CCI-001898)
The organization authorizes read-only access to audit information to an organization-defined subset of privileged users.
AU-10 AUDIT AND ACCOUNTABILITY : NON-REPUDIATION
AU-10 The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed [Assignment: organization-defined actions to be covered by non-repudiation].
AU-10
(CCI-000166)
The information system protects against an individual (or process acting on behalf of an individual) falsely denying having performed organization-defined actions to be covered by non-repudiation.
AU-10
(CCI-001899)
The organization defines the actions to be covered by non-repudiation.
ASSOCIATION OF IDENTITIES
AU-10 (1) The information system:
AU-10 (1)(a) Binds the identity of the information producer with the information to [Assignment: organization-defined strength of binding]; and
AU-10 (1) (a)
(CCI-001900)
The organization defines the strength of binding to be applied to the binding of the identity of the information producer with the information.
AU-10 (1) (a)
(CCI-001901)
The information system binds the identity of the information producer with the information to an organization-defined strength of binding.
AU-10 (1)(b) Provides the means for authorized individuals to determine the identity of the producer of the information.
AU-10 (1) (b)
(CCI-001902)
The information system provides the means for authorized individuals to determine the identity of the producer of the information.
VALIDATE BINDING OF INFORMATION PRODUCER IDENTITY
AU-10 (2) The information system:
AU-10 (2)(a) Validates the binding of the information producer identity to the information at [Assignment: organization-defined frequency]; and
AU-10 (2) (a)
(CCI-001903)
The organization defines the frequency on which the information system is to validate the binding of the information producer identity to the information.
AU-10 (2) (a)
(CCI-001904)
The information system validates the binding of the information producer identity to the information at an organization-defined frequency.
AU-10 (2)(b) Performs [Assignment: organization-defined actions] in the event of a validation error.
AU-10 (2) (b)
(CCI-001905)
The organization defines the actions to be performed in the event of an error when validating the binding of the information producer identity to the information.
AU-10 (2) (b)
(CCI-001906)
The information system performs organization-defined actions in the event of an error when validating the binding of the information producer identity to the information.
CHAIN OF CUSTODY
AU-10 (3) The information system maintains reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.
AU-10 (3)
(CCI-001340)
The information system maintains reviewer/releaser identity and credentials within the established chain of custody for all information reviewed or released.
VALIDATE BINDING OF INFORMATION REVIEWER IDENTITY
AU-10 (4) The information system:
AU-10 (4)(a) Validates the binding of the information reviewer identity to the information at the transfer or release points prior to release/transfer between [Assignment: organization-defined security domains]; and
AU-10 (4) (a)
(CCI-001341)
The information system validates the binding of the information reviewer identity to the information at the transfer or release points prior to release/transfer between organization-defined security domains.
AU-10 (4) (a)
(CCI-001907)
The organization defines the security domains which will require the information system validate the binding of the information reviewer identity to the information at the transfer or release points prior to release/transfer.
AU-10 (4)(b) Performs [Assignment: organization-defined actions] in the event of a validation error.
AU-10 (4) (b)
(CCI-001908)
The organization defines the action the information system is to perform in the event of an information reviewer identity binding validation error.
AU-10 (4) (b)
(CCI-001909)
The information system performs organization-defined actions in the event of an information reviewer identity binding validation error.
DIGITAL SIGNATURES
AU-10 (5) [Withdrawn: Incorporated into SI-7].
AU-11 AUDIT AND ACCOUNTABILITY : AUDIT RECORD RETENTION
AU-11 The organization retains audit records for [Assignment: organization-defined time period consistent with records retention policy] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
AU-11
(CCI-000167)
The organization retains audit records for an organization-defined time period to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
AU-11
(CCI-000168)
The organization defines the time period for retention of audit records, which is consistent with its records retention policy, to provide support for after-the-fact investigations of security incidents and meet regulatory and organizational information retention requirements.
LONG-TERM RETRIEVAL CAPABILITY
AU-11 (1) The organization employs [Assignment: organization-defined measures] to ensure that long-term audit records generated by the information system can be retrieved.
AU-11 (1)
(CCI-002044)
The organization defines measures to be employed to ensure that long-term audit records generated by the information system can be retrieved.
AU-11 (1)
(CCI-002045)
The organization employs organization-defined measures to ensure that long-term audit records generated by the information system can be retrieved.
AU-12 AUDIT AND ACCOUNTABILITY : AUDIT GENERATION
AU-12 The information system:
AU-12a. Provides audit record generation capability for the auditable events defined in AU-2 a. at [Assignment: organization-defined information system components];
AU-12 a
(CCI-000169)
The information system provides audit record generation capability for the auditable events defined in AU-2 a. at organization-defined information system components.
AU-12 a
(CCI-001459)
The organization defines information system components that provide audit record generation capability.
AU-12b. Allows [Assignment: organization-defined personnel or roles] to select which auditable events are to be audited by specific components of the information system; and
AU-12 b
(CCI-000171)
The information system allows organization-defined personnel or roles to select which auditable events are to be audited by specific components of the information system.
AU-12 b
(CCI-001910)
The organization defines the personnel or roles allowed to select which auditable events are to be audited by specific components of the information system.
AU-12c. Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.
AU-12 c
(CCI-000172)
The information system generates audit records for the events defined in AU-2 d. with the content defined in AU-3.
SYSTEM-WIDE / TIME-CORRELATED AUDIT TRAIL
AU-12 (1) The information system compiles audit records from [Assignment: organization-defined information system components] into a system-wide (logical or physical) audit trail that is time-correlated to within [Assignment: organization-defined level of tolerance for relationship between time stamps of individual records in the audit trail].
AU-12 (1)
(CCI-001576)
The information system produces a system-wide (logical or physical) audit trail of information system audit records.
AU-12 (1)
(CCI-001577)
The organization defines the information system components from which audit records are to be compiled into the system-wide audit trail.
AU-12 (1)
(CCI-000173)
The organization defines the level of tolerance for relationship between time stamps of individual records in the audit trail that will be used for correlation.
AU-12 (1)
(CCI-000174)
The information system compiles audit records from organization-defined information system components into a system-wide (logical or physical) audit trail that is time-correlated to within an organization-defined level of tolerance for relationship between time stamps of individual records in the audit trail.
STANDARDIZED FORMATS
AU-12 (2) The information system produces a system-wide (logical or physical) audit trail composed of audit records in a standardized format.
AU-12 (2)
(CCI-001353)
The information system produces a system-wide (logical or physical) audit trail composed of audit records in a standardized format.
CHANGES BY AUTHORIZED INDIVIDUALS
AU-12 (3) The information system provides the capability for [Assignment: organization-defined individuals or roles] to change the auditing to be performed on [Assignment: organization-defined information system components] based on [Assignment: organization-defined selectable event criteria] within [Assignment: organization-defined time thresholds].
AU-12 (3)
(CCI-001911)
The organization defines the selectable event criteria to be used as the basis for changes to the auditing to be performed on organization-defined information system components, by organization-defined individuals or roles, within organization-defined time thresholds.
AU-12 (3)
(CCI-001912)
The organization defines the time thresholds for organization-defined individuals or roles to change the auditing to be performed based on organization-defined selectable event criteria.
AU-12 (3)
(CCI-001913)
The organization defines the individuals or roles that are to be provided the capability to change the auditing to be performed based on organization-defined selectable event criteria, within organization-defined time thresholds.
AU-12 (3)
(CCI-001914)
The information system provides the capability for organization-defined individuals or roles to change the auditing to be performed on organization-defined information system components based on organization-defined selectable event criteria within organization-defined time thresholds.
AU-12 (3)
(CCI-002047)
The organization defines the information system components on which the auditing that is to be performed can be changed by organization-defined individuals or roles.
AU-13 AUDIT AND ACCOUNTABILITY : MONITORING FOR INFORMATION DISCLOSURE
AU-13 The organization monitors [Assignment: organization-defined open source information and/or information sites] [Assignment: organization-defined frequency] for evidence of unauthorized disclosure of organizational information.
AU-13
(CCI-001460)
The organization monitors organization-defined open source information and/or information sites per organization-defined frequency for evidence of unauthorized exfiltration or disclosure of organizational information.
AU-13
(CCI-001461)
The organization defines a frequency for monitoring open source information and/or information sites for evidence of unauthorized exfiltration or disclosure of organizational information.
AU-13
(CCI-001915)
The organization defines the open source information and/or information sites to be monitored for evidence of unauthorized exfiltration or disclosure of organizational information.
USE OF AUTOMATED TOOLS
AU-13 (1) The organization employs automated mechanisms to determine if organizational information has been disclosed in an unauthorized manner.
AU-13 (1)
(CCI-001916)
The organization employs automated mechanisms to determine if organizational information has been disclosed in an unauthorized manner.
REVIEW OF MONITORED SITES
AU-13 (2) The organization reviews the open source information sites being monitored [Assignment: organization-defined frequency].
AU-13 (2)
(CCI-001917)
The organization defines the frequency for reviewing the open source information sites being monitored.
AU-13 (2)
(CCI-001918)
The organization reviews the open source information sites being monitored per organization-defined frequency.
AU-14 AUDIT AND ACCOUNTABILITY : SESSION AUDIT
AU-14 The information system provides the capability for authorized users to select a user session to capture/record or view/hear.
AU-14
(CCI-001919)
The information system provides the capability for authorized users to select a user session to capture/record or view/hear.
SYSTEM START-UP
AU-14 (1) The information system initiates session audits at system start-up.
AU-14 (1)
(CCI-001464)
The information system initiates session audits at system start-up.
CAPTURE/RECORD AND LOG CONTENT
AU-14 (2) The information system provides the capability for authorized users to capture/record and log content related to a user session.
AU-14 (2)
(CCI-001462)
The information system provides the capability for authorized users to capture/record and log content related to a user session.
REMOTE VIEWING / LISTENING
AU-14 (3) The information system provides the capability for authorized users to remotely view/hear all content related to an established user session in real time.
AU-14 (3)
(CCI-001920)
The information system provides the capability for authorized users to remotely view/hear all content related to an established user session in real time.
AU-15 AUDIT AND ACCOUNTABILITY : ALTERNATE AUDIT CAPABILITY
AU-15 The organization provides an alternate audit capability in the event of a failure in primary audit capability that provides [Assignment: organization-defined alternate audit functionality].
AU-15
(CCI-001921)
The organization defines the alternative audit functionality to be provided in the event of a failure in the primary audit capability.
AU-15
(CCI-001922)
The organization provides an alternative audit capability in the event of a failure in primary audit capability that provides organization-defined alternative audit functionality.
AU-16 AUDIT AND ACCOUNTABILITY : CROSS-ORGANIZATIONAL AUDITING
AU-16 The organization employs [Assignment: organization-defined methods] for coordinating [Assignment: organization-defined audit information] among external organizations when audit information is transmitted across organizational boundaries.
AU-16
(CCI-001923)
The organization defines the audit information to be coordinated among external organizations when audit information is transmitted across organizational boundaries.
AU-16
(CCI-001924)
The organization defines the methods to be employed when coordinating audit information among external organizations when audit information is transmitted across organizational boundaries.
AU-16
(CCI-001925)
The organization employs organization-defined methods for coordinating organization-defined audit information among external organizations when audit information is transmitted across organizational boundaries.
IDENTITY PRESERVATION
AU-16 (1) The organization requires that the identity of individuals be preserved in cross-organizational audit trails.
AU-16 (1)
(CCI-001926)
The organization requires that the identity of individuals be preserved in cross-organizational audit trails.
SHARING OF AUDIT INFORMATION
AU-16 (2) The organization provides cross-organizational audit information to [Assignment: organization-defined organizations] based on [Assignment: organization-defined cross-organizational sharing agreements].
AU-16 (2)
(CCI-001927)
The organization defines the organizations that will be provided cross-organizational audit information.
AU-16 (2)
(CCI-001928)
The organization defines the cross-organizational sharing agreements to be established with organization-defined organizations authorized to be provided cross-organizational sharing of audit information.
AU-16 (2)
(CCI-001929)
The organization provides cross-organizational audit information to organization-defined organizations based on organization-defined cross organizational sharing agreements.
CA-1 SECURITY ASSESSMENT AND AUTHORIZATION : SECURITY ASSESSMENT AND AUTHORIZATION POLICY AND PROCEDURES
CA-1 The organization:
CA-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
CA-1a.1. A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
CA-1 a 1
(CCI-000239)
The organization develops and documents a security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CA-1 a 1 CA-1 a 1
(CCI-000240)
The organization disseminates to organization-defined personnel or roles a security assessment and authorization policy.
CA-1 a 1
(CCI-002060)
The organization develops and documents a security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CA-1 a 1
(CCI-002061)
The organization defines the personnel or roles to whom security assessment and authorization policy is to be disseminated.
CA-1a.2. Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and
CA-1 a 2
(CCI-000242)
The organization develops and documents procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
CA-1 a 2
(CCI-000243)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls.
CA-1 a 2
(CCI-002062)
The organization defines the personnel or roles to whom the security assessment and authorization procedures are to be disseminated.
CA-1b. Reviews and updates the current:
CA-1b.1. Security assessment and authorization policy [Assignment: organization-defined frequency]; and
CA-1 b 1
(CCI-000238)
The organization defines the frequency to review and update the current security assessment and authorization policy.
CA-1 b 1
(CCI-000241)
The organization reviews and updates the current security assessment and authorization policy in accordance with organization-defined frequency.
CA-1b.2. Security assessment and authorization procedures [Assignment: organization-defined frequency].
CA-1 b 2
(CCI-001578)
The organization defines the frequency to review and update the current security assessment and authorization procedures.
CA-1 b 2
(CCI-000244)
The organization reviews and updates the current security assessment and authorization procedures in accordance with organization-defined frequency.
CA-2 SECURITY ASSESSMENT AND AUTHORIZATION : SECURITY ASSESSMENTS
CA-2 The organization:
CA-2a. Develops a security assessment plan that describes the scope of the assessment including:
CA-2 a
(CCI-000245)
The organization develops a security assessment plan for the information system and its environment of operation.
CA-2a.1. Security controls and control enhancements under assessment;
CA-2 a 1
(CCI-000246)
The organization's security assessment plan describes the security controls and control enhancements under assessment.
CA-2a.2. Assessment procedures to be used to determine security control effectiveness; and
CA-2 a 2
(CCI-000247)
The organization's security assessment plan describes assessment procedures to be used to determine security control effectiveness.
CA-2a.3. Assessment environment, assessment team, and assessment roles and responsibilities;
CA-2 a 3
(CCI-000248)
The organization's security assessment plan describes assessment environment.
CA-2 a 3
(CCI-002070)
The organization's security assessment plan describes the assessment team, and assessment roles and responsibilities.
CA-2b. Assesses the security controls in the information system and its environment of operation [Assignment: organization-defined frequency] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;
CA-2 b
(CCI-000251)
The organization assesses, on an organization-defined frequency, the security controls in the information system and its environment of operation to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements.
CA-2 b
(CCI-000252)
The organization defines the frequency on which the security controls in the information system and its environment of operation are assessed.
CA-2c. Produces a security assessment report that documents the results of the assessment; and
CA-2 c
(CCI-000253)
The organization produces a security assessment report that documents the results of the assessment against the information system and its environment of operation.
CA-2d. Provides the results of the security control assessment to [Assignment: organization-defined individuals or roles].
CA-2 d
(CCI-000254)
The organization provides the results of the security control assessment against the information system and its environment of operation to organization-defined individuals or roles.
CA-2 d
(CCI-002071)
The organization defines the individuals or roles to whom the results of the security control assessment are to be provided.
INDEPENDENT ASSESSORS
CA-2 (1) The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.
CA-2 (1)
(CCI-000255)
The organization employs assessors or assessment teams with an organization-defined level of independence to conduct security control assessments of organizational information systems.
CA-2 (1)
(CCI-002063)
The organization defines the level of independence for assessors or assessment teams to conduct security control assessments of organizational information systems.
SPECIALIZED ASSESSMENTS
CA-2 (2) The organization includes as part of security control assessments, [Assignment: organization-defined frequency], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].
CA-2 (2)
(CCI-000256)
The organization includes, as part of security control assessments announced or unannounced, one or more of the following: in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; and organization-defined other forms of security assessment on an organization-defined frequency.
CA-2 (2)
(CCI-001582)
The organization defines other forms of security assessments other than in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; and performance/load testing that should be included as part of security control assessments.
CA-2 (2)
(CCI-001583)
The organization selects announced or unannounced assessments for each form of security control assessment.
CA-2 (2)
(CCI-001681)
The organization defines the frequency at which each form of security control assessment should be conducted.
CA-2 (2)
(CCI-002064)
The organization selects one or more security assessment techniques to be conducted.
CA-2 (2)
(CCI-002065)
The organization defines the frequency at which to conduct security control assessments.
EXTERNAL ORGANIZATIONS
CA-2 (3) The organization accepts the results of an assessment of [Assignment: organization-defined information system] performed by [Assignment: organization-defined external organization] when the assessment meets [Assignment: organization-defined requirements].
CA-2 (3)
(CCI-002066)
The organization accepts the results of an assessment of the organization-defined information system performed by an organization-defined external organization when the assessment meets organization-defined requirements.
CA-2 (3)
(CCI-002067)
The organization defines the information systems for which they will accept the results of an assessment performed by an external organization.
CA-2 (3)
(CCI-002068)
The organization defines the external organizations from which assessment results for organization-defined information systems will be accepted.
CA-2 (3)
(CCI-002069)
The organization defines the requirements the assessments for organization-defined information systems from organization-defined external organizations must meet.
CA-3 SECURITY ASSESSMENT AND AUTHORIZATION : SYSTEM INTERCONNECTIONS
CA-3 The organization:
CA-3a. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
CA-3 a
(CCI-000257)
The organization authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements.
CA-3b. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
CA-3 b
(CCI-000258)
The organization documents, for each interconnection, the interface characteristics.
CA-3 b
(CCI-000259)
The organization documents, for each interconnection, the security requirements.
CA-3 b
(CCI-000260)
The organization documents, for each interconnection, the nature of the information communicated.
CA-3c. Reviews and updates Interconnection Security Agreements [Assignment: organization-defined frequency].
CA-3 c
(CCI-002083)
The organization reviews and updates Interconnection Security Agreements on an organization-defined frequency.
CA-3 c
(CCI-002084)
The organization defines the frequency at which reviews and updates to the Interconnection Security Agreements must be conducted.
UNCLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS
CA-3 (1) The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, national security system] to an external network without the use of [Assignment: organization-defined boundary protection device].
CA-3 (1)
(CCI-000262)
The organization prohibits the direct connection of an organization-defined unclassified, national security system to an external network without the use of an organization-defined boundary protection device.
CA-3 (1)
(CCI-002072)
The organization defines the unclassified, national security systems that are prohibited from directly connecting to an external network without the use of an organization-defined boundary protection device.
CA-3 (1)
(CCI-002073)
The organization defines the boundary protection device to be used to connect organization-defined unclassified, national security systems to an external network.
CLASSIFIED NATIONAL SECURITY SYSTEM CONNECTIONS
CA-3 (2) The organization prohibits the direct connection of a classified, national security system to an external network without the use of [Assignment: organization-defined boundary protection device].
CA-3 (2)
(CCI-000263)
The organization prohibits the direct connection of a classified, national security system to an external network without the use of organization-defined boundary protection device.
CA-3 (2)
(CCI-002074)
The organization defines the boundary protection device to be used for the direct connection of classified, national security system to an external network.
UNCLASSIFIED NON-NATIONAL SECURITY SYSTEM CONNECTIONS
CA-3 (3) The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [Assignment; organization-defined boundary protection device].
CA-3 (3)
(CCI-002075)
The organization prohibits the direct connection of an organization-defined unclassified, non-national security system to an external network without the use of organization-defined boundary protection device.
CA-3 (3)
(CCI-002076)
The organization defines the unclassified, non-national security system that is prohibited from directly connecting to an external network without the use of an organization-defined boundary protection device.
CA-3 (3)
(CCI-002077)
The organization defines the boundary protection device to be used to directly connect an organization-defined unclassified, non-national security system to an external network.
CONNECTIONS TO PUBLIC NETWORKS
CA-3 (4) The organization prohibits the direct connection of an [Assignment: organization-defined information system] to a public network.
CA-3 (4)
(CCI-002078)
The organization prohibits the direct connection of an organization-defined information system to a public network.
CA-3 (4)
(CCI-002079)
The organization defines the information system that is prohibited from directly connecting to a public network.
RESTRICTIONS ON EXTERNAL SYSTEM CONNECTIONS
CA-3 (5) The organization employs [Selection: allow-all, deny-by-exception; deny-all, permit-by-exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.
CA-3 (5)
(CCI-002080)
The organization employs either an allow-all, deny-by-exception or a deny-all, permit-by-exception policy for allowing organization-defined information systems to connect to external information systems.
CA-3 (5)
(CCI-002081)
The organization defines the information systems that employ either an allow-all, deny-by-exception or a deny-all, permit-by-exception policy for allowing connections to external information systems.
CA-3 (5)
(CCI-002082)
The organization selects either an allow-all, deny-by-exception or a deny-all, permit-by-exception policy for allowing organization-defined information systems to connect to external information systems.
CA-4 SECURITY ASSESSMENT AND AUTHORIZATION : SECURITY CERTIFICATION
CA-4 [Withdrawn: Incorporated into CA-2].
CA-5 SECURITY ASSESSMENT AND AUTHORIZATION : PLAN OF ACTION AND MILESTONES
CA-5 The organization:
CA-5a. Develops a plan of action and milestones for the information system to document the organization�s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and
CA-5 a
(CCI-000264)
The organization develops a plan of action and milestones for the information system to document the organization's planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system.
CA-5b. Updates existing plan of action and milestones [Assignment: organization-defined frequency] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
CA-5 b
(CCI-000265)
The organization defines the frequency with which to update the existing plan of action and milestones for the information system.
CA-5 b
(CCI-000266)
The organization updates, on an organization-defined frequency, the existing plan of action and milestones for the information system based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
AUTOMATION SUPPORT FOR ACCURACY / CURRENCY
CA-5 (1) The organization employs automated mechanisms to help ensure that the plan of action and milestones for the information system is accurate, up to date, and readily available.
CA-5 (1)
(CCI-000267)
The organization employs automated mechanisms to help ensure the plan of action and milestones for the information system is accurate.
CA-5 (1)
(CCI-000268)
The organization employs automated mechanisms to help ensure the plan of action and milestones for the information system is up to date.
CA-5 (1)
(CCI-000269)
The organization employs automated mechanisms to help ensure the plan of action and milestones for the information system is readily available.
CA-6 SECURITY ASSESSMENT AND AUTHORIZATION : SECURITY AUTHORIZATION
CA-6 The organization:
CA-6a. Assigns a senior-level executive or manager as the authorizing official for the information system;
CA-6 a
(CCI-000270)
The organization assigns a senior-level executive or manager as the authorizing official for the information system.
CA-6b. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
CA-6 b
(CCI-000271)
The organization ensures the authorizing official authorizes the information system for processing before commencing operations.
CA-6c. Updates the security authorization [Assignment: organization-defined frequency].
CA-6 c
(CCI-000272)
The organization updates the security authorization on an organization-defined frequency.
CA-6 c
(CCI-000273)
The organization defines the frequency with which to update the security authorization.
CA-7 SECURITY ASSESSMENT AND AUTHORIZATION : CONTINUOUS MONITORING
CA-7 The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:
CA-7
(CCI-000274)
The organization develops a continuous monitoring strategy.
CA-7a. Establishment of [Assignment: organization-defined metrics] to be monitored;
CA-7 a
(CCI-002087)
The organization establishes and defines the metrics to be monitored for the continuous monitoring program.
CA-7b. Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;
CA-7 b
(CCI-002088)
The organization establishes and defines the frequencies for continuous monitoring.
CA-7 b
(CCI-002089)
The organization establishes and defines the frequencies for assessments supporting continuous monitoring.
CA-7c. Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;
CA-7 c
(CCI-000279)
The organization implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy.
CA-7d. Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;
CA-7 d
(CCI-002090)
The organization implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
CA-7e. Correlation and analysis of security-related information generated by assessments and monitoring;
CA-7 e
(CCI-002091)
The organization implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring.
CA-7f. Response actions to address results of the analysis of security-related information; and
CA-7 f
(CCI-002092)
The organization implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information.
CA-7g. Reporting the security status of organization and the information system to [Assignment: organization-defined personnel or roles] [Assignment: organization-defined frequency].
CA-7 g
(CCI-001581)
The organization defines personnel or roles to whom the security status of the organization and the information system should be reported.
CA-7 g
(CCI-000280)
The organization implements a continuous monitoring program that includes reporting the security status of the organization and the information system to organization-defined personnel or roles on an organization-defined frequency.
CA-7 g
(CCI-000281)
The organization defines the frequency with which to report the security status of the organization and the information system to organization-defined personnel or roles.
INDEPENDENT ASSESSMENT
CA-7 (1) The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.
CA-7 (1)
(CCI-000282)
The organization employs assessors or assessment teams with an organization-defined level of independence to monitor the security controls in the information system on an ongoing basis.
CA-7 (1)
(CCI-002085)
The organization defines the level of independence the assessors or assessment teams must have to monitor the security controls in the information system on an ongoing basis.
TYPES OF ASSESSMENTS
CA-7 (2) [Withdrawn: Incorporated into CA-2.]
TREND ANALYSES
CA-7 (3) The organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
CA-7 (3)
(CCI-002086)
The organization employs trend analyses to determine if security control implementations, the frequency of continuous monitoring activities, and/or the types of activities used in the continuous monitoring process need to be modified based on empirical data.
CA-8 SECURITY ASSESSMENT AND AUTHORIZATION : PENETRATION TESTING
CA-8 The organization conducts penetration testing [Assignment: organization-defined frequency] on [Assignment: organization-defined information systems or system components].
CA-8
(CCI-002093)
The organization conducts penetration testing in accordance with organization-defined frequency on organization-defined information systems or system components.
CA-8
(CCI-002094)
The organization defines the frequency for conducting penetration testing on organization-defined information systems or system components.
CA-8
(CCI-002095)
The organization defines the information systems or system components on which penetration testing will be conducted.
INDEPENDENT PENETRATION AGENT OR TEAM
CA-8 (1) The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.
CA-8 (1)
(CCI-002096)
The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.
RED TEAM EXERCISES
CA-8 (2) The organization employs [Assignment: organization-defined red team exercises] to simulate attempts by adversaries to compromise organizational information systems in accordance with [Assignment: organization-defined rules of engagement].
CA-8 (2)
(CCI-002097)
The organization defines red team exercises to simulate attempts by adversaries to compromise organizational information systems.
CA-8 (2)
(CCI-002098)
The organization defines rules of engagement for red team exercises to simulate attempts by adversaries to compromise organizational information systems.
CA-8 (2)
(CCI-002099)
The organization employs organization-defined red team exercises to simulate attempts by adversaries to compromise organizational information systems in accordance with organization-defined rules of engagement.
CA-9 SECURITY ASSESSMENT AND AUTHORIZATION : INTERNAL SYSTEM CONNECTIONS
CA-9 The organization:
CA-9a. Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and
CA-9b. Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.
SECURITY COMPLIANCE CHECKS
CA-9 (1) The information system performs security compliance checks on constituent system components prior to the establishment of the internal connection.
CA-9 (1)
(CCI-002100)
The information system performs security compliance checks on constituent components prior to the establishment of the internal connection.
CM-1 CONFIGURATION MANAGEMENT : CONFIGURATION MANAGEMENT POLICY AND PROCEDURES
CM-1 The organization:
CM-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
CM-1a.1. A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
CM-1 a 1
(CCI-000287)
The organization develops and documents a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CM-1 a 1
(CCI-001820)
The organization documents a configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CM-1 a 1
(CCI-001821)
The organization defines the organizational personnel or roles to whom the configuration management policy is to be disseminated.
CM-1 a 1
(CCI-001822)
The organization disseminates the configuration management policy to organization-defined personnel or roles.
CM-1a.2. Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and
CM-1 a 2
(CCI-000290)
The organization develops and documents procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
CM-1 a 2
(CCI-001823)
The organization documents the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
CM-1 a 2
(CCI-001824)
The organization defines the organizational personnel or roles to whom the configuration management procedures are to be disseminated.
CM-1 a 2
(CCI-001825)
The organization disseminates to organization-defined personnel or roles the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
CM-1b. Reviews and updates the current:
CM-1b.1. Configuration management policy [Assignment: organization-defined frequency]; and
CM-1 b 1
(CCI-000286)
The organization defines a frequency with which to review and update the configuration management policies.
CM-1 b 1
(CCI-000289)
The organization reviews and updates, on an organization-defined frequency, the configuration management policy.
CM-1b.2. Configuration management procedures [Assignment: organization-defined frequency].
CM-1 b 2
(CCI-001584)
The organization defines the frequency with which to review and update configuration management procedures.
CM-1 b 2
(CCI-000292)
The organization reviews and updates, on an organization-defined frequency, the procedures to facilitate the implementation of the configuration management policy and associated configuration management controls.
CM-2 CONFIGURATION MANAGEMENT : BASELINE CONFIGURATION
CM-2 The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system.
CM-2
(CCI-000293)
The organization develops a current baseline configuration of the information system.
CM-2
(CCI-000294)
The organization documents a baseline configuration of the information system.
CM-2
(CCI-000295)
The organization maintains, under configuration control, a current baseline configuration of the information system.
REVIEWS AND UPDATES
CM-2 (1) The organization reviews and updates the baseline configuration of the information system:
CM-2 (1)(a) [Assignment: organization-defined frequency];
CM-2 (1) (a)
(CCI-000296)
The organization reviews and updates the baseline configuration of the information system at an organization-defined frequency.
CM-2 (1) (a)
(CCI-001497)
The organization defines a frequency for the reviews and updates to the baseline configuration of the information system.
CM-2 (1)(b) When required due to [Assignment organization-defined circumstances]; and
CM-2 (1) (b)
(CCI-001585)
The organization defines the circumstances that require reviews and updates to the baseline configuration of the information system.
CM-2 (1) (b)
(CCI-000297)
The organization reviews and updates the baseline configuration of the information system when required due to organization-defined circumstances.
CM-2 (1)(c) As an integral part of information system component installations and upgrades.
CM-2 (1) (c)
(CCI-000298)
The organization reviews and updates the baseline configuration of the information system as an integral part of information system component installations.
CM-2 (1) (c)
(CCI-000299)
The organization reviews and updates the baseline configuration of the information system as an integral part of information system component upgrades.
AUTOMATION SUPPORT FOR ACCURACY / CURRENCY
CM-2 (2) The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system.
CM-2 (2)
(CCI-000300)
The organization employs automated mechanisms to maintain a complete baseline configuration of the information system.
CM-2 (2)
(CCI-000301)
The organization employs automated mechanisms to maintain an up-to-date baseline configuration of the information system.
CM-2 (2)
(CCI-000302)
The organization employs automated mechanisms to maintain an accurate baseline configuration of the information system.
CM-2 (2)
(CCI-000303)
The organization employs automated mechanisms to maintain a readily available baseline configuration of the information system.
RETENTION OF PREVIOUS CONFIGURATIONS
CM-2 (3) The organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback.
CM-2 (3)
(CCI-000304)
The organization retains organization-defined previous versions of baseline configurations of the information system to support rollback.
CM-2 (3)
(CCI-001736)
The organization defines the previous versions of the baseline configuration of the information system required to support rollback.
UNAUTHORIZED SOFTWARE
CM-2 (4) [Withdrawn: Incorporated into CM-7].
AUTHORIZED SOFTWARE
CM-2 (5) [Withdrawn: Incorporated into CM-7].
DEVELOPMENT AND TEST ENVIRONMENTS
CM-2 (6) The organization maintains a baseline configuration for information system development and test environments that is managed separately from the operational baseline configuration.
CM-2 (6)
(CCI-000311)
The organization maintains a baseline configuration for information system development environments that is managed separately from the operational baseline configuration.
CM-2 (6)
(CCI-000312)
The organization maintains a baseline configuration for information system test environments that is managed separately from the operational baseline configuration.
CONFIGURE SYSTEMS, COMPONENTS, OR DEVICES FOR HIGH-RISK AREAS
CM-2 (7) The organization:
CM-2 (7)(a) Issues [Assignment: organization-defined information systems, system components, or devices] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk; and
CM-2 (7) (a)
(CCI-001737)
The organization defines the information systems, system components, or devices that are to have organization-defined configurations applied when located in areas of significant risk.
CM-2 (7) (a)
(CCI-001738)
The organization defines the security configurations to be implemented on information systems, system components, or devices when they are located in areas of significant risk.
CM-2 (7) (a)
(CCI-001739)
The organization issues organization-defined information systems, system components, or devices with organization-defined configurations to individuals traveling to locations the organization deems to be of significant risk.
CM-2 (7)(b) Applies [Assignment: organization-defined security safeguards] to the devices when the individuals return.
CM-2 (7) (b)
(CCI-001815)
The organization defines the security safeguards to be applied to devices when they return from areas of significant risk.
CM-2 (7) (b)
(CCI-001816)
The organization applies organization-defined security safeguards to devices when individuals return from areas of significant risk.
CM-3 CONFIGURATION MANAGEMENT : CONFIGURATION CHANGE CONTROL
CM-3 The organization:
CM-3a. Determines the types of changes to the information system that are configuration-controlled;
CM-3 a
(CCI-000313)
The organization determines the types of changes to the information system that are configuration controlled.
CM-3b. Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;
CM-3 b
(CCI-000314)
The organization approves or disapproves configuration-controlled changes to the information system, with explicit consideration for security impact analysis.
CM-3 b
(CCI-001740)
The organization reviews proposed configuration-controlled changes to the information system.
CM-3c. Documents configuration change decisions associated with the information system;
CM-3 c
(CCI-001741)
The organization documents configuration change decisions associated with the information system.
CM-3d. Implements approved configuration-controlled changes to the information system;
CM-3 d
(CCI-001819)
The organization implements approved configuration-controlled changes to the information system.
CM-3e. Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period];
CM-3 e
(CCI-000316)
The organization retains records of configuration-controlled changes to the information system for an organization-defined time period.
CM-3 e
(CCI-002056)
The organization defines the time period the records of configuration-controlled changes are to be retained.
CM-3f. Audits and reviews activities associated with configuration-controlled changes to the information system; and
CM-3 f
(CCI-000318)
The organization audits and reviews activities associated with configuration-controlled changes to the system.
CM-3g. Coordinates and provides oversight for configuration change control activities through [Assignment: organization-defined configuration change control element (e.g., committee, board)] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]].
CM-3 g
(CCI-001586)
The organization defines the configuration change control element (e.g., committee, board) responsible for coordinating and providing oversight for configuration change control activities.
CM-3 g
(CCI-000319)
The organization coordinates and provides oversight for configuration change control activities through an organization-defined configuration change control element (e.g., committee, board) that convenes at the organization-defined frequency and/or for any organization-defined configuration change conditions.
CM-3 g
(CCI-000320)
The organization defines the frequency with which to convene the configuration change control element.
CM-3 g
(CCI-000321)
The organization defines configuration change conditions that prompt the configuration change control element to convene.
AUTOMATED DOCUMENT / NOTIFICATION / PROHIBITION OF CHANGES
CM-3 (1) The organization employs automated mechanisms to:
CM-3 (1)(a) Document proposed changes to the information system;
CM-3 (1) (a)
(CCI-000322)
The organization employs automated mechanisms to document proposed changes to the information system.
CM-3 (1)(b) Notify [Assignment: organized-defined approval authorities] of proposed changes to the information system and request change approval;
CM-3 (1) (b)
(CCI-000323)
The organization employs automated mechanisms to notify organization-defined approval authorities of proposed changes to the information system and request change approval.
CM-3 (1) (b)
(CCI-001742)
The organization defines the approval authorities to be notified when proposed changes to the information system are received.
CM-3 (1)(c) Highlight proposed changes to the information system that have not been approved or disapproved by [Assignment: organization-defined time period];
CM-3 (1) (c)
(CCI-000324)
The organization employs automated mechanisms to highlight proposed changes to the information system that have not been approved or disapproved by an organization-defined time period.
CM-3 (1) (c)
(CCI-001498)
The organization defines a time period after which proposed changes to the information system that have not been approved or disapproved are highlighted.
CM-3 (1)(d) Prohibit changes to the information system until designated approvals are received;
CM-3 (1) (d)
(CCI-000325)
The organization employs automated mechanisms to prohibit changes to the information system until designated approvals are received.
CM-3 (1)(e) Document all changes to the information system; and
CM-3 (1) (e)
(CCI-000326)
The organization employs automated mechanisms to document all changes to the information system.
CM-3 (1)(f) Notify [Assignment: organization-defined personnel] when approved changes to the information system are completed.
CM-3 (1) (f)
(CCI-002057)
The organization defines the personnel to be notified when approved changes to the information system are completed.
CM-3 (1) (f)
(CCI-002058)
The organization employs automated mechanisms to notify organization-defined personnel when approved changes to the information system are completed.
TEST / VALIDATE / DOCUMENT CHANGES
CM-3 (2) The organization tests, validates, and documents changes to the information system before implementing the changes on the operational system.
CM-3 (2)
(CCI-000327)
The organization tests changes to the information system before implementing the changes on the operational system.
CM-3 (2)
(CCI-000328)
The organization validates changes to the information system before implementing the changes on the operational system.
CM-3 (2)
(CCI-000329)
The organization documents changes to the information system before implementing the changes on the operational system.
AUTOMATED CHANGE IMPLEMENTATION
CM-3 (3) The organization employs automated mechanisms to implement changes to the current information system baseline and deploys the updated baseline across the installed base.
CM-3 (3)
(CCI-000330)
The organization employs automated mechanisms to implement changes to the current information system baseline.
CM-3 (3)
(CCI-000331)
The organization deploys the updated information system baseline across the installed base.
SECURITY REPRESENTATIVE
CM-3 (4) The organization requires an information security representative to be a member of the [Assignment: organization-defined configuration change control element].
CM-3 (4)
(CCI-000332)
The organization requires an information security representative to be a member of the organization-defined configuration change control element.
AUTOMATED SECURITY RESPONSE
CM-3 (5) The information system implements [Assignment: organization-defined security responses] automatically if baseline configurations are changed in an unauthorized manner.
CM-3 (5)
(CCI-001743)
The organization defines the security responses to be automatically implemented by the information system if baseline configurations are changed in an unauthorized manner.
CM-3 (5)
(CCI-001744)
The information system implements organization-defined security responses automatically if baseline configurations are changed in an unauthorized manner.
CRYPTOGRAPHY MANAGEMENT
CM-3 (6) The organization ensures that cryptographic mechanisms used to provide [Assignment: organization-defined security safeguards] are under configuration management.
CM-3 (6)
(CCI-001745)
The organization defines the security safeguards that are to be provided by the cryptographic mechanisms which are employed by the organization.
CM-3 (6)
(CCI-001746)
The organization ensures that cryptographic mechanisms used to provide organization-defined security safeguards are under configuration management.
CM-4 CONFIGURATION MANAGEMENT : SECURITY IMPACT ANALYSIS
CM-4 The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.
CM-4
(CCI-000333)
The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.
SEPARATE TEST ENVIRONMENTS
CM-4 (1) The organization analyzes changes to the information system in a separate test environment before implementation in an operational environment, looking for security impacts due to flaws, weaknesses, incompatibility, or intentional malice.
CM-4 (1)
(CCI-001817)
The organization, when analyzing changes to the information system, looks for security impacts due to flaws, weaknesses, incompatibility, or intentional malice.
CM-4 (1)
(CCI-001818)
The organization analyzes changes to the information system in a separate test environment before installation in an operational environment.
VERIFICATION OF SECURITY FUNCTIONS
CM-4 (2) The organization, after the information system is changed, checks the security functions to verify that the functions are implemented correctly, operating as intended, and producing the desired outcome with regard to meeting the security requirements for the system.
CM-4 (2)
(CCI-000335)
The organization, after the information system is changed, checks the security functions to verify the functions are implemented correctly.
CM-4 (2)
(CCI-000336)
The organization, after the information system is changed, checks the security functions to verify the functions are operating as intended.
CM-4 (2)
(CCI-000337)
The organization, after the information system is changed, checks the security functions to verify the functions are producing the desired outcome with regard to meeting the security requirements for the system.
CM-5 CONFIGURATION MANAGEMENT : ACCESS RESTRICTIONS FOR CHANGE
CM-5 The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system.
CM-5
(CCI-000338)
The organization defines physical access restrictions associated with changes to the information system.
CM-5
(CCI-000339)
The organization documents physical access restrictions associated with changes to the information system.
CM-5
(CCI-000340)
The organization approves physical access restrictions associated with changes to the information system.
CM-5
(CCI-000341)
The organization enforces physical access restrictions associated with changes to the information system.
CM-5
(CCI-000342)
The organization defines logical access restrictions associated with changes to the information system.
CM-5
(CCI-000343)
The organization documents logical access restrictions associated with changes to the information system.
CM-5
(CCI-000344)
The organization approves logical access restrictions associated with changes to the information system.
CM-5
(CCI-000345)
The organization enforces logical access restrictions associated with changes to the information system.
AUTOMATED ACCESS ENFORCEMENT / AUDITING
CM-5 (1) The information system enforces access restrictions and supports auditing of the enforcement actions.
CM-5 (1)
(CCI-001813)
The information system enforces access restrictions.
CM-5 (1)
(CCI-001814)
The Information system supports auditing of the enforcement actions.
REVIEW SYSTEM CHANGES
CM-5 (2) The organization reviews information system changes [Assignment: organization-defined frequency] and [Assignment: organization-defined circumstances] to determine whether unauthorized changes have occurred.
CM-5 (2)
(CCI-000348)
The organization defines a frequency with which to conduct reviews of information system changes.
CM-5 (2)
(CCI-000349)
The organization reviews information system changes per organization-defined frequency to determine whether unauthorized changes have occurred.
CM-5 (2)
(CCI-000350)
The organization reviews information system changes upon organization-defined circumstances to determine whether unauthorized changes have occurred.
CM-5 (2)
(CCI-001826)
The organization defines the circumstances upon which the organization reviews the information system changes to determine whether unauthorized changes have occurred.
SIGNED COMPONENTS
CM-5 (3) The information system prevents the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
CM-5 (3)
(CCI-001747)
The organization defines critical software components the information system will prevent from being installed without verification the component has been digitally signed using a certificate that is recognized and approved by the organization.
CM-5 (3)
(CCI-001748)
The organization defines critical firmware components the information system will prevent from being installed without verification the component has been digitally signed using a certificate that is recognized and approved by the organization.
CM-5 (3)
(CCI-001749)
The information system prevents the installation of organization-defined software components without verification the software component has been digitally signed using a certificate that is recognized and approved by the organization.
CM-5 (3)
(CCI-001750)
The information system prevents the installation of organization-defined firmware components without verification the firmware component has been digitally signed using a certificate that is recognized and approved by the organization.
DUAL AUTHORIZATION
CM-5 (4) The organization enforces dual authorization for implementing changes to [Assignment: organization-defined information system components and system-level information].
CM-5 (4)
(CCI-000353)
The organization defines information system components requiring enforcement of a dual authorization for information system changes.
CM-5 (4)
(CCI-000354)
The organization enforces dual authorization for changes to organization-defined information system components.
CM-5 (4)
(CCI-001751)
The organization defines system-level information requiring enforcement of a dual authorization for information system changes.
CM-5 (4)
(CCI-001752)
The organization enforces dual authorization for changes to organization-defined system-level information.
LIMIT PRODUCTION / OPERATIONAL PRIVILEGES
CM-5 (5) The organization:
CM-5 (5)(a) Limits privileges to change information system components and system-related information within a production or operational environment; and
CM-5 (5) (a)
(CCI-001753)
The organization limits privileges to change information system components within a production or operational environment.
CM-5 (5) (a)
(CCI-001754)
The organization limits privileges to change system-related information within a production or operational environment.
CM-5 (5)(b) Reviews and reevaluates privileges [Assignment: organization-defined frequency].
CM-5 (5) (b)
(CCI-001827)
The organization defines the frequency with which to review information system privileges.
CM-5 (5) (b)
(CCI-001828)
The organization defines the frequency with which to reevaluate information system privileges.
CM-5 (5) (b)
(CCI-001829)
The organization reviews information system privileges per an organization-defined frequency.
CM-5 (5) (b)
(CCI-001830)
The organization reevaluates information system privileges per an organization-defined frequency.
LIMIT LIBRARY PRIVILEGES
CM-5 (6) The organization limits privileges to change software resident within software libraries.
CM-5 (6)
(CCI-001499)
The organization limits privileges to change software resident within software libraries.
AUTOMATIC IMPLEMENTATION OF SECURITY SAFEGUARDS
CM-5 (7) [Withdrawn: Incorporated into SI-7].
CM-6 CONFIGURATION MANAGEMENT : CONFIGURATION SETTINGS
CM-6 The organization:
CM-6a. Establishes and documents configuration settings for information technology products employed within the information system using [Assignment: organization-defined security configuration checklists] that reflect the most restrictive mode consistent with operational requirements;
CM-6 a
(CCI-001588)
The organization-defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
CM-6 a
(CCI-000363)
The organization defines security configuration checklists to be used to establish and document configuration settings for the information system technology products employed.
CM-6 a
(CCI-000364)
The organization establishes configuration settings for information technology products employed within the information system using organization-defined security configuration checklists.
CM-6 a
(CCI-000365)
The organization documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists that reflect the most restrictive mode consistent with operational requirements.
CM-6b. Implements the configuration settings;
CM-6 b
(CCI-000366)
The organization implements the security configuration settings.
CM-6c. Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment: organization-defined operational requirements]; and
CM-6 c
(CCI-000367)
The organization identifies any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
CM-6 c
(CCI-000368)
The organization documents any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
CM-6 c
(CCI-000369)
The organization approves any deviations from the established configuration settings for organization-defined information system components based on organization-defined operational requirements.
CM-6 c
(CCI-001755)
The organization defines the information system components for which any deviation from the established configuration settings are to be identified, documented, and approved.
CM-6 c
(CCI-001756)
The organization defines the operational requirements on which the configuration settings for the organization-defined information system components are to be based.
CM-6d. Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.
CM-6 d
(CCI-001502)
The organization monitors changes to the configuration settings in accordance with organizational policies and procedures.
CM-6 d
(CCI-001503)
The organization controls changes to the configuration settings in accordance with organizational policies and procedures.
AUTOMATED CENTRAL MANAGEMENT / APPLICATION / VERIFICATION
CM-6 (1) The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for [Assignment: organization-defined information system components].
CM-6 (1)
(CCI-000370)
The organization employs automated mechanisms to centrally manage configuration settings for organization-defined information system components.
CM-6 (1)
(CCI-000371)
The organization employs automated mechanisms to centrally apply configuration settings for organization-defined information system components.
CM-6 (1)
(CCI-000372)
The organization employs automated mechanisms to centrally verify configuration settings for organization-defined information system components.
CM-6 (1)
(CCI-002059)
The organization defines the information system components for which the organization will employ automated mechanisms to centrally manage, apply, and verify configuration settings.
RESPOND TO UNAUTHORIZED CHANGES
CM-6 (2) The organization employs [Assignment: organization-defined security safeguards] to respond to unauthorized changes to [Assignment: organization-defined configuration settings].
CM-6 (2)
(CCI-001757)
The organization defines the security safeguards the organization is to employ when responding to unauthorized changes to the organization-defined configuration settings.
CM-6 (2)
(CCI-001758)
The organization defines configuration settings for which the organization will employ organization-defined security safeguards in response to unauthorized changes.
CM-6 (2)
(CCI-001759)
The organization employs organization-defined security safeguards to respond to unauthorized changes to organization-defined configuration settings.
UNAUTHORIZED CHANGE DETECTION
CM-6 (3) [Withdrawn: Incorporated into SI-7].
CONFORMANCE DEMONSTRATION
CM-6 (4) [Withdrawn: Incorporated into CM-4].
CM-7 CONFIGURATION MANAGEMENT : LEAST FUNCTIONALITY
CM-7 The organization:
CM-7a. Configures the information system to provide only essential capabilities; and
CM-7 a
(CCI-000381)
The organization configures the information system to provide only essential capabilities.
CM-7b. Prohibits or restricts the use of the following functions, ports, protocols, and/or services: [Assignment: organization-defined prohibited or restricted functions, ports, protocols, and/or services].
CM-7 b
(CCI-000380)
The organization defines prohibited or restricted functions, ports, protocols, and/or services for the information system.
CM-7 b
(CCI-000382)
The organization configures the information system to prohibit or restrict the use of organization-defined functions, ports, protocols, and/or services.
PERIODIC REVIEW
CM-7 (1) The organization:
CM-7 (1)(a) Reviews the information system [Assignment: organization-defined frequency] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and
CM-7 (1) (a)
(CCI-000384)
The organization reviews the information system per organization-defined frequency to identify unnecessary and nonsecure functions, ports, protocols, and services.
CM-7 (1) (a)
(CCI-001760)
The organization defines the frequency of information system reviews to identify unnecessary and/or nonsecure functions, ports, protocols, and services.
CM-7 (1)(b) Disables [Assignment: organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure].
CM-7 (1) (b)
(CCI-001761)
The organization defines the functions, ports, protocols, and services within the information system that are to be disabled when deemed unnecessary and/or nonsecure.
CM-7 (1) (b)
(CCI-001762)
The organization disables organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure.
PREVENT PROGRAM EXECUTION
CM-7 (2) The information system prevents program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
CM-7 (2)
(CCI-001592)
The organization defines the rules authorizing the terms and conditions of software program usage on the information system.
CM-7 (2)
(CCI-001763)
The organization defines the policies regarding software program usage and restrictions.
CM-7 (2)
(CCI-001764)
The information system prevents program execution in accordance with organization-defined policies regarding software program usage and restrictions, and/or rules authorizing the terms and conditions of software program usage.
REGISTRATION COMPLIANCE
CM-7 (3) The organization ensures compliance with [Assignment: organization-defined registration requirements for functions, ports, protocols, and services].
CM-7 (3)
(CCI-000387)
The organization defines registration requirements for functions, ports, protocols, and services.
CM-7 (3)
(CCI-000388)
The organization ensures compliance with organization-defined registration requirements for functions, ports, protocols, and services.
UNAUTHORIZED SOFTWARE / BLACKLISTING
CM-7 (4) The organization:
CM-7 (4)(a) Identifies [Assignment: organization-defined software programs not authorized to execute on the information system];
CM-7 (4) (a)
(CCI-001765)
The organization defines the software programs not authorized to execute on the information system.
CM-7 (4) (a)
(CCI-001766)
The organization identifies the organization-defined software programs not authorized to execute on the information system.
CM-7 (4)(b) Employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system; and
CM-7 (4) (b)
(CCI-001767)
The organization employs an allow-all, deny-by-exception policy to prohibit the execution of unauthorized software programs on the information system.
CM-7 (4)(c) Reviews and updates the list of unauthorized software programs [Assignment: organization-defined frequency].
CM-7 (4) (c)
(CCI-001768)
The organization defines the frequency on which it will review and update the list of unauthorized software programs.
CM-7 (4) (c)
(CCI-001769)
The organization defines the frequency on which it will update the list of unauthorized software programs.
CM-7 (4) (c)
(CCI-001770)
The organization reviews and updates the list of unauthorized software programs per organization-defined frequency.
CM-7 (4) (c)
(CCI-001771)
The organization updates the list of unauthorized software programs per organization-defined frequency.
AUTHORIZED SOFTWARE / WHITELISTING
CM-7 (5) The organization:
CM-7 (5)(a) Identifies [Assignment: organization-defined software programs authorized to execute on the information system];
CM-7 (5) (a)
(CCI-001772)
The organization defines the software programs authorized to execute on the information system.
CM-7 (5) (a)
(CCI-001773)
The organization identifies the organization-defined software programs authorized to execute on the information system.
CM-7 (5)(b) Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and
CM-7 (5) (b)
(CCI-001774)
The organization employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system.
CM-7 (5)(c) Reviews and updates the list of authorized software programs [Assignment: organization-defined frequency].
CM-7 (5) (c)
(CCI-001775)
The organization defines the frequency on which it will review and update the list of authorized software programs.
CM-7 (5) (c)
(CCI-001776)
The organization defines the frequency on which it will update the list of authorized software programs.
CM-7 (5) (c)
(CCI-001777)
The organization reviews and updates the list of authorized software programs per organization-defined frequency.
CM-7 (5) (c)
(CCI-001778)
The organization updates the list of authorized software programs per organization-defined frequency.
CM-8 CONFIGURATION MANAGEMENT : INFORMATION SYSTEM COMPONENT INVENTORY
CM-8 The organization:
CM-8a. Develops and documents an inventory of information system components that:
CM-8a.1. Accurately reflects the current information system;
CM-8 a 1
(CCI-000389)
The organization develops an inventory of information system components that accurately reflects the current information system.
CM-8 a 1
(CCI-000390)
The organization documents an inventory of information system components that accurately reflects the current information system.
CM-8a.2. Includes all components within the authorization boundary of the information system;
CM-8 a 2
(CCI-000392)
The organization develops an inventory of information system components that includes all components within the authorization boundary of the information system.
CM-8 a 2
(CCI-000393)
The organization documents an inventory of information system components that includes all components within the authorization boundary of the information system.
CM-8a.3. Is at the level of granularity deemed necessary for tracking and reporting; and
CM-8 a 3
(CCI-000395)
The organization develops an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting.
CM-8 a 3
(CCI-000396)
The organization documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting.
CM-8a.4. Includes [Assignment: organization-defined information deemed necessary to achieve effective information system component accountability]; and
CM-8 a 4
(CCI-000398)
The organization defines information deemed necessary to achieve effective information system component accountability.
CM-8 a 4
(CCI-000399)
The organization develops an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability.
CM-8 a 4
(CCI-000400)
The organization documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability.
CM-8b. Reviews and updates the information system component inventory [Assignment: organization-defined frequency].
CM-8 b
(CCI-001779)
The organization defines the frequency on which the information system component inventory is to be reviewed and updated.
CM-8 b
(CCI-001780)
The organization reviews and updates the information system component inventory per organization-defined frequency.
CM-8 b
(CCI-001781)
The organization defines the frequency on which the information system component inventory is to be updated.
CM-8 b
(CCI-001782)
The organization updates the information system component inventory per organization-defined frequency.
UPDATES DURING INSTALLATIONS / REMOVALS
CM-8 (1) The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.
CM-8 (1)
(CCI-000408)
The organization updates the inventory of information system components as an integral part of component installations.
CM-8 (1)
(CCI-000409)
The organization updates the inventory of information system components as an integral part of component removals.
CM-8 (1)
(CCI-000410)
The organization updates the inventory of information system components as an integral part of information system updates.
AUTOMATED MAINTENANCE
CM-8 (2) The organization employs automated mechanisms to help maintain an up-to-date, complete, accurate, and readily available inventory of information system components.
CM-8 (2)
(CCI-000411)
The organization employs automated mechanisms to help maintain an up-to-date inventory of information system components.
CM-8 (2)
(CCI-000412)
The organization employs automated mechanisms to help maintain a complete inventory of information system components.
CM-8 (2)
(CCI-000413)
The organization employs automated mechanisms to help maintain an accurate inventory of information system components.
CM-8 (2)
(CCI-000414)
The organization employs automated mechanisms to help maintain a readily available inventory of information system components.
AUTOMATED UNAUTHORIZED COMPONENT DETECTION
CM-8 (3) The organization:
CM-8 (3)(a) Employs automated mechanisms [Assignment: organization-defined frequency] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and
CM-8 (3) (a)
(CCI-000415)
The organization defines the frequency of employing automated mechanisms to detect the presence of unauthorized hardware, software, and firmware components within the information system.
CM-8 (3) (a)
(CCI-000416)
The organization employs automated mechanisms, per organization-defined frequency, to detect the presence of unauthorized hardware, software, and firmware components within the information system.
CM-8 (3)(b) Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]].
CM-8 (3) (b)
(CCI-001783)
The organization defines the personnel or roles to be notified when unauthorized hardware, software, and firmware components are detected within the information system.
CM-8 (3) (b)
(CCI-001784)
When unauthorized hardware, software, and firmware components are detected within the information system, the organization takes action to disable network access by such components, isolates the components, and/or notifies organization-defined personnel or roles.
ACCOUNTABILITY INFORMATION
CM-8 (4) The organization includes in the information system component inventory information, a means for identifying by [Selection (one or more): name; position; role], individuals responsible/accountable for administering those components.
CM-8 (4)
(CCI-000418)
The organization includes, in the information system component inventory information, a means for identifying by name, position, and/or role, individuals responsible/accountable for administering those components.
NO DUPLICATE ACCOUNTING OF COMPONENTS
CM-8 (5) The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories.
CM-8 (5)
(CCI-000419)
The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system component inventories.
ASSESSED CONFIGURATIONS / APPROVED DEVIATIONS
CM-8 (6) The organization includes assessed component configurations and any approved deviations to current deployed configurations in the information system component inventory.
CM-8 (6)
(CCI-000420)
The organization includes assessed component configurations and any approved deviations to current deployed configurations in the information system component inventory.
CENTRALIZED REPOSITORY
CM-8 (7) The organization provides a centralized repository for the inventory of information system components.
CM-8 (7)
(CCI-001785)
The organization provides a centralized repository for the inventory of information system components.
AUTOMATED LOCATION TRACKING
CM-8 (8) The organization employs automated mechanisms to support tracking of information system components by geographic location.
CM-8 (8)
(CCI-001786)
The organization employs automated mechanisms to support tracking of information system components by geographic location.
ASSIGNMENT OF COMPONENTS TO SYSTEMS
CM-8 (9) The organization:
CM-8 (9)(a) Assigns [Assignment: organization-defined acquired information system components] to an information system; and
CM-8 (9) (a)
(CCI-001787)
The organization defines the acquired information system components that are to be assigned to an information system.
CM-8 (9) (a)
(CCI-001788)
The organization assigns organization-defined acquired information system components to an information system.
CM-8 (9)(b) Receives an acknowledgement from the information system owner of this assignment.
CM-8 (9) (b)
(CCI-001789)
The organization receives an acknowledgement from the information system owner of the assignment of the acquired information system components to an information system.
CM-9 CONFIGURATION MANAGEMENT : CONFIGURATION MANAGEMENT PLAN
CM-9 The organization develops, documents, and implements a configuration management plan for the information system that:
CM-9a. Addresses roles, responsibilities, and configuration management processes and procedures;
CM-9 a
(CCI-000421)
The organization develops a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
CM-9 a
(CCI-000422)
The organization documents a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
CM-9 a
(CCI-000423)
The organization implements a configuration management plan for the information system that addresses roles, responsibilities, and configuration management processes and procedures.
CM-9b. Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;
CM-9 b
(CCI-001790)
The organization develops a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
CM-9 b
(CCI-001791)
The organization documents a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
CM-9 b
(CCI-001792)
The organization implements a configuration management plan for the information system that establishes a process for identifying configuration items throughout the system development life cycle.
CM-9 b
(CCI-001793)
The organization develops a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
CM-9 b
(CCI-001794)
The organization documents a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
CM-9 b
(CCI-001795)
The organization implements a configuration management plan for the information system that establishes a process for managing the configuration of the configuration items.
CM-9c. Defines the configuration items for the information system and places the configuration items under configuration management; and
CM-9 c
(CCI-000424)
The organization develops a configuration management plan for the information system that defines the configuration items for the information system.
CM-9 c
(CCI-000425)
The organization documents a configuration management plan for the information system that defines the configuration items for the information system.
CM-9 c
(CCI-000426)
The organization implements a configuration management plan for the information system that defines the configuration items for the information system.
CM-9 c
(CCI-001796)
The organization develops a configuration management plan for the information system that places the configuration items under configuration management.
CM-9 c
(CCI-001797)
The organization documents a configuration management plan for the information system that places the configuration items under configuration management.
CM-9 c
(CCI-001798)
The organization implements a configuration management plan for the information system that places the configuration items under configuration management.
CM-9d. Protects the configuration management plan from unauthorized disclosure and modification.
CM-9 d
(CCI-001799)
The organization develops and documents a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
CM-9 d
(CCI-001800)
The organization documents a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
CM-9 d
(CCI-001801)
The organization implements a configuration management plan for the information system that protects the configuration management plan from unauthorized disclosure and modification.
ASSIGNMENT OF RESPONSIBILITY
CM-9 (1) The organization assigns responsibility for developing the configuration management process to organizational personnel that are not directly involved in information system development.
CM-9 (1)
(CCI-000436)
The organization assigns responsibility for developing the configuration management process to organizational personnel that are not directly involved in information system development.
CM-10 CONFIGURATION MANAGEMENT : SOFTWARE USAGE RESTRICTIONS
CM-10 The organization:
CM-10a. Uses software and associated documentation in accordance with contract agreements and copyright laws;
CM-10 a
(CCI-001726)
The organization uses software in accordance with contract agreements.
CM-10 a
(CCI-001727)
The organization uses software documentation in accordance with contract agreements.
CM-10 a
(CCI-001728)
The organization uses software in accordance with copyright laws.
CM-10 a
(CCI-001729)
The organization uses software documentation in accordance with copyright laws.
CM-10b. Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and
CM-10 b
(CCI-001730)
The organization tracks the use of software protected by quantity licenses to control copying of the software.
CM-10 b
(CCI-001731)
The organization tracks the use of software documentation protected by quantity licenses to control distribution of the software documentation.
CM-10 b
(CCI-001802)
The organization tracks the use of software documentation protected by quantity licenses to control copying of the software documentation.
CM-10 b
(CCI-001803)
The organization tracks the use of software protected by quantity licenses to control distribution of the software.
CM-10c. Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
CM-10 c
(CCI-001732)
The organization controls the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
CM-10 c
(CCI-001733)
The organization documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
OPEN SOURCE SOFTWARE
CM-10 (1) The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].
CM-10 (1)
(CCI-001734)
The organization defines the restrictions to be followed on the use of open source software.
CM-10 (1)
(CCI-001735)
The organization establishes organization-defined restrictions on the use of open source software.
CM-11 CONFIGURATION MANAGEMENT : USER-INSTALLED SOFTWARE
CM-11 The organization:
CM-11a. Establishes [Assignment: organization-defined policies] governing the installation of software by users;
CM-11 a
(CCI-001804)
The organization defines the policies for governing the installation of software by users.
CM-11 a
(CCI-001805)
The organization establishes organization-defined policies governing the installation of software by users.
CM-11b. Enforces software installation policies through [Assignment: organization-defined methods]; and
CM-11 b
(CCI-001806)
The organization defines methods to be employed to enforce the software installation policies.
CM-11 b
(CCI-001807)
The organization enforces software installation policies through organization-defined methods.
CM-11c. Monitors policy compliance at [Assignment: organization-defined frequency].
CM-11 c
(CCI-001808)
The organization defines the frequency on which it will monitor software installation policy compliance.
CM-11 c
(CCI-001809)
The organization monitors software installation policy compliance per an organization-defined frequency.
ALERTS FOR UNAUTHORIZED INSTALLATIONS
CM-11 (1) The information system alerts [Assignment: organization-defined personnel or roles] when the unauthorized installation of software is detected.
CM-11 (1)
(CCI-001810)
The organization defines the personnel or roles to be notified when unauthorized software is detected.
CM-11 (1)
(CCI-001811)
The information system alerts organization-defined personnel or roles when the unauthorized installation of software is detected.
PROHIBIT INSTALLATION WITHOUT PRIVILEGED STATUS
CM-11 (2) The information system prohibits user installation of software without explicit privileged status.
CM-11 (2)
(CCI-001812)
The information system prohibits user installation of software without explicit privileged status.
CP-1 CONTINGENCY PLANNING : CONTINGENCY PLANNING POLICY AND PROCEDURES
CP-1 The organization:
CP-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
CP-1a.1. A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
CP-1 a 1
(CCI-000438)
The organization develops and documents a contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
CP-1 a 1
(CCI-000439)
The organization disseminates a contingency planning policy to organization-defined personnel or roles.
CP-1 a 1
(CCI-002825)
The organization defines personnel or roles to whom the contingency planning policy is to be disseminated.
CP-1a.2. Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and
CP-1 a 2
(CCI-001597)
The organization disseminates contingency planning procedures to organization-defined personnel or roles.
CP-1 a 2
(CCI-000441)
The organization develops and documents procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls.
CP-1 a 2
(CCI-002826)
The organization defines personnel or roles to whom the contingency planning procedures are disseminated.
CP-1b. Reviews and updates the current:
CP-1b.1. Contingency planning policy [Assignment: organization-defined frequency]; and
CP-1 b 1
(CCI-000437)
The organization defines the frequency with which to review and update the current contingency planning policy.
CP-1 b 1
(CCI-000440)
The organization reviews and updates the current contingency planning policy in accordance with an organization-defined frequency.
CP-1b.2. Contingency planning procedures [Assignment: organization-defined frequency].
CP-1 b 2
(CCI-001596)
The organization defines the frequency with which to review and update the current contingency planning procedures.
CP-1 b 2
(CCI-001598)
The organization reviews and updates the current contingency planning procedures in accordance with the organization-defined frequency.
CP-2 CONTINGENCY PLANNING : CONTINGENCY PLAN
CP-2 The organization:
CP-2a. Develops a contingency plan for the information system that:
CP-2a.1. Identifies essential missions and business functions and associated contingency requirements;
CP-2 a 1
(CCI-000443)
The organization develops a contingency plan for the information system that identifies essential missions.
CP-2 a 1
(CCI-000444)
The organization develops a contingency plan for the information system that identifies essential business functions.
CP-2 a 1
(CCI-000445)
The organization develops a contingency plan for the information system that identifies associated contingency requirements.
CP-2a.2. Provides recovery objectives, restoration priorities, and metrics;
CP-2 a 2
(CCI-000446)
The organization develops a contingency plan for the information system that provides recovery objectives.
CP-2 a 2
(CCI-000447)
The organization develops a contingency plan for the information system that provides restoration priorities.
CP-2 a 2
(CCI-000448)
The organization develops a contingency plan for the information system that provides metrics.
CP-2a.3. Addresses contingency roles, responsibilities, assigned individuals with contact information;
CP-2 a 3
(CCI-000449)
The organization develops a contingency plan for the information system that addresses contingency roles, responsibilities, assigned individuals with contact information.
CP-2a.4. Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;
CP-2 a 4
(CCI-000450)
The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system disruption.
CP-2 a 4
(CCI-000451)
The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system disruption.
CP-2 a 4
(CCI-000452)
The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system compromise.
CP-2 a 4
(CCI-000453)
The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system compromise.
CP-2 a 4
(CCI-000454)
The organization develops a contingency plan for the information system that addresses maintaining essential missions despite an information system failure.
CP-2 a 4
(CCI-000455)
The organization develops a contingency plan for the information system that addresses maintaining essential business functions despite an information system failure.
CP-2a.5. Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and
CP-2 a 5
(CCI-000456)
The organization develops a contingency plan for the information system that addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented.
CP-2a.6. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
CP-2 a 6
(CCI-000457)
The organization develops a contingency plan for the information system that is reviewed and approved by organization-defined personnel or roles.
CP-2 a 6
(CCI-002830)
The organization defines the personnel or roles who review and approve the contingency plan for the information system.
CP-2b. Distributes copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
CP-2 b
(CCI-000458)
The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements designated to receive copies of the contingency plan.
CP-2 b
(CCI-000459)
The organization distributes copies of the contingency plan to an organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
CP-2c. Coordinates contingency planning activities with incident handling activities;
CP-2 c
(CCI-000460)
The organization coordinates contingency planning activities with incident handling activities.
CP-2d. Reviews the contingency plan for the information system [Assignment: organization-defined frequency];
CP-2 d
(CCI-000461)
The organization defines the frequency with which to review the contingency plan for the information system.
CP-2 d
(CCI-000462)
The organization reviews the contingency plan for the information system in accordance with organization-defined frequency.
CP-2e. Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
CP-2 e
(CCI-000463)
The organization updates the contingency plan to address changes to the organization.
CP-2 e
(CCI-000464)
The organization updates the contingency plan to address changes to the information system.
CP-2 e
(CCI-000465)
The organization updates the contingency plan to address changes to the environment of operation.
CP-2 e
(CCI-000466)
The organization updates the contingency plan to address problems encountered during contingency plan implementation, execution, or testing.
CP-2f. Communicates contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements]; and
CP-2 f
(CCI-000468)
The organization communicates contingency plan changes to an organization-defined list of key contingency personnel (identified by name and/or by role) and organizational elements.
CP-2 f
(CCI-002831)
The organization defines a list of key contingency personnel (identified by name and/or by role) and organizational elements to whom contingency plan changes are to be communicated.
CP-2g. Protects the contingency plan from unauthorized disclosure and modification.
CP-2 g
(CCI-002832)
The organization protects the contingency plan from unauthorized disclosure and modification.
COORDINATE WITH RELATED PLANS
CP-2 (1) The organization coordinates contingency plan development with organizational elements responsible for related plans.
CP-2 (1)
(CCI-000469)
The organization coordinates contingency plan development with organizational elements responsible for related plans.
CAPACITY PLANNING
CP-2 (2) The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.
CP-2 (2)
(CCI-000470)
The organization conducts capacity planning so that necessary capacity for information processing exists during contingency operations.
CP-2 (2)
(CCI-000471)
The organization conducts capacity planning so that necessary capacity for telecommunications exists during contingency operations.
CP-2 (2)
(CCI-000472)
The organization conducts capacity planning so that necessary capacity for environmental support exists during contingency operations.
RESUME ESSENTIAL MISSIONS / BUSINESS FUNCTIONS
CP-2 (3) The organization plans for the resumption of essential missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.
CP-2 (3)
(CCI-000473)
The organization defines the time period for planning the resumption of essential missions as a result of contingency plan activation.
CP-2 (3)
(CCI-000474)
The organization defines the time period for planning the resumption of essential business functions as a result of contingency plan activation.
CP-2 (3)
(CCI-000475)
The organization plans for the resumption of essential missions within the organization-defined time period of contingency plan activation.
CP-2 (3)
(CCI-000476)
The organization plans for the resumption of essential business functions within the organization-defined time period of contingency plan activation.
RESUME ALL MISSIONS / BUSINESS FUNCTIONS
CP-2 (4) The organization plans for the resumption of all missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.
CP-2 (4)
(CCI-000477)
The organization defines the time period for planning the resumption of all missions as a result of contingency plan activation.
CP-2 (4)
(CCI-000478)
The organization defines the time period for planning the resumption of all business functions as a result of contingency plan activation.
CP-2 (4)
(CCI-000479)
The organization plans for the resumption of all missions within an organization-defined time period of contingency plan activation.
CP-2 (4)
(CCI-000480)
The organization plans for the resumption of all business functions within an organization-defined time period of contingency plan activation.
CONTINUE ESSENTIAL MISSIONS / BUSINESS FUNCTIONS
CP-2 (5) The organization plans for the continuance of essential missions and business functions with little or no loss of operational continuity and sustains that continuity until full information system restoration at primary processing and/or storage sites.
CP-2 (5)
(CCI-001599)
The organization sustains operational continuity of essential missions until full information system restoration at primary processing and/or storage sites.
CP-2 (5)
(CCI-001600)
The organization sustains operational continuity of essential business functions until full information system restoration at primary processing and/or storage sites.
CP-2 (5)
(CCI-000481)
The organization plans for the continuance of essential missions with little or no loss of operational continuity.
CP-2 (5)
(CCI-000482)
The organization plans for the continuance of essential business functions with little or no loss of operational continuity.
ALTERNATE PROCESSING / STORAGE SITE
CP-2 (6) The organization plans for the transfer of essential missions and business functions to alternate processing and/or storage sites with little or no loss of operational continuity and sustains that continuity through information system restoration to primary processing and/or storage sites.
CP-2 (6)
(CCI-001601)
The organization sustains operational continuity of essential missions at alternate processing and/or storage sites until information system restoration at primary processing and/or storage sites.
CP-2 (6)
(CCI-001602)
The organization sustains operational continuity of essential business functions at alternate processing and/or storage sites until information system restoration at primary processing and/or storage sites.
CP-2 (6)
(CCI-000483)
The organization plans for the transfer of essential missions to alternate processing and/or storage sites with little or no loss of operational continuity.
CP-2 (6)
(CCI-000484)
The organization plans for the transfer of essential business functions to alternate processing and/or storage sites with little or no loss of operational continuity.
COORDINATE WITH EXTERNAL SERVICE PROVIDERS
CP-2 (7) The organization coordinates its contingency plan with the contingency plans of external service providers to ensure that contingency requirements can be satisfied.
CP-2 (7)
(CCI-002827)
The organization coordinates its contingency plan with the contingency plans of external service providers to ensure that contingency requirements can be satisfied.
IDENTIFY CRITICAL ASSETS
CP-2 (8) The organization identifies critical information system assets supporting essential missions and business functions.
CP-2 (8)
(CCI-002828)
The organization identifies critical information system assets supporting essential missions.
CP-2 (8)
(CCI-002829)
The organization identifies critical information system assets supporting essential business functions.
CP-3 CONTINGENCY PLANNING : CONTINGENCY TRAINING
CP-3 The organization provides contingency training to information system users consistent with assigned roles and responsibilities:
CP-3a. Within [Assignment: organization-defined time period] of assuming a contingency role or responsibility;
CP-3 a
(CCI-000486)
The organization provides contingency training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming a contingency role or responsibility.
CP-3 a
(CCI-002833)
The organization defines the time period that contingency training is to be provided to information system users consistent with assigned roles and responsibilities within assuming a contingency role or responsibility.
CP-3b. When required by information system changes; and
CP-3 b
(CCI-002834)
The organization provides contingency training to information system users consistent with assigned roles and responsibilities when required by information system changes.
CP-3c. [Assignment: organization-defined frequency] thereafter.
CP-3 c
(CCI-000485)
The organization defines the frequency of refresher contingency training to information system users.
CP-3 c
(CCI-000487)
The organization provides refresher contingency training to information system users consistent with assigned roles and responsibilities in accordance with organization-defined frequency.
SIMULATED EVENTS
CP-3 (1) The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations.
CP-3 (1)
(CCI-000488)
The organization incorporates simulated events into contingency training to facilitate effective response by personnel in crisis situations.
AUTOMATED TRAINING ENVIRONMENTS
CP-3 (2) The organization employs automated mechanisms to provide a more thorough and realistic contingency training environment.
CP-3 (2)
(CCI-000489)
The organization employs automated mechanisms to provide a more thorough and realistic contingency training environment.
CP-4 CONTINGENCY PLANNING : CONTINGENCY PLAN TESTING
CP-4 The organization:
CP-4a. Tests the contingency plan for the information system [Assignment: organization-defined frequency] using [Assignment: organization-defined tests] to determine the effectiveness of the plan and the organizational readiness to execute the plan;
CP-4 a
(CCI-000490)
The organization defines the frequency with which to test the contingency plan for the information system.
CP-4 a
(CCI-000492)
The organization defines contingency plan tests to be conducted for the information system.
CP-4 a
(CCI-000494)
The organization tests the contingency plan for the information system in accordance with organization-defined frequency using organization-defined tests to determine the effectiveness of the plan and the organizational readiness to execute the plan.
CP-4b. Reviews the contingency plan test results; and
CP-4 b
(CCI-000496)
The organization reviews the contingency plan test results.
CP-4c. Initiates corrective actions, if needed.
CP-4 c
(CCI-000497)
The organization initiates corrective actions, if needed, after reviewing the contingency plan test results.
COORDINATE WITH RELATED PLANS
CP-4 (1) The organization coordinates contingency plan testing with organizational elements responsible for related plans.
CP-4 (1)
(CCI-000498)
The organization coordinates contingency plan testing with organizational elements responsible for related plans.
ALTERNATE PROCESSING SITE
CP-4 (2) The organization tests the contingency plan at the alternate processing site:
CP-4 (2)(a) To familiarize contingency personnel with the facility and available resources; and
CP-4 (2) (a)
(CCI-000500)
The organization tests the contingency plan at the alternate processing site to familiarize contingency personnel with the facility and available resources.
CP-4 (2)(b) To evaluate the capabilities of the alternate processing site to support contingency operations.
CP-4 (2) (b)
(CCI-002835)
The organization tests the contingency plan at the alternate processing site to evaluate the capabilities of the alternate processing site to support contingency operations.
AUTOMATED TESTING
CP-4 (3) The organization employs automated mechanisms to more thoroughly and effectively test the contingency plan.
CP-4 (3)
(CCI-000502)
The organization employs automated mechanisms to more thoroughly and effectively test the contingency plan.
FULL RECOVERY / RECONSTITUTION
CP-4 (4) The organization includes a full recovery and reconstitution of the information system to a known state as part of contingency plan testing.
CP-5 CONTINGENCY PLANNING : CONTINGENCY PLAN UPDATE
CP-5 [Withdrawn: Incorporated into CP-2].
CP-6 CONTINGENCY PLANNING : ALTERNATE STORAGE SITE
CP-6 The organization:
CP-6a. Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and
CP-6 a
(CCI-000505)
The organization establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information.
CP-6b. Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
CP-6 b
(CCI-002836)
The organization ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
SEPARATION FROM PRIMARY SITE
CP-6 (1) The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.
CP-6 (1)
(CCI-000507)
The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.
RECOVERY TIME / POINT OBJECTIVES
CP-6 (2) The organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.
CP-6 (2)
(CCI-000508)
The organization configures the alternate storage site to facilitate recovery operations in accordance with recovery time and recovery point objectives.
ACCESSIBILITY
CP-6 (3) The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP-6 (3)
(CCI-001604)
The organization outlines explicit mitigation actions for organization identified accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster.
CP-6 (3)
(CCI-000509)
The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster.
CP-7 CONTINGENCY PLANNING : ALTERNATE PROCESSING SITE
CP-7 The organization:
CP-7a. Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined information system operations] for essential missions/business functions within [Assignment: organization-defined time period consistent with recovery time and recovery point objectives] when the primary processing capabilities are unavailable;
CP-7 a
(CCI-000510)
The organization defines the time period consistent with recovery time and recovery point objectives for essential missions/business functions to permit the transfer and resumption of organization-defined information system operations at an alternate processing site when the primary processing capabilities are unavailable.
CP-7 a
(CCI-000513)
The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential missions within an organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
CP-7 a
(CCI-000514)
The organization establishes an alternate processing site including necessary agreements to permit the transfer and resumption of organization-defined information system operations for essential business functions within an organization-defined time period consistent with recovery time and recovery point objectives when the primary processing capabilities are unavailable.
CP-7 a
(CCI-002839)
The organization defines information system operations that are permitted to transfer and resume at an alternate processing site for essential missions/business functions when the primary processing capabilities are unavailable.
CP-7b. Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption; and
CP-7 b
(CCI-000515)
The organization ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption.
CP-7c. Ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
CP-7 c
(CCI-000521)
The organization ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
SEPARATION FROM PRIMARY SITE
CP-7 (1) The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
CP-7 (1)
(CCI-000516)
The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
ACCESSIBILITY
CP-7 (2) The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.
CP-7 (2)
(CCI-001606)
The organization outlines explicit mitigation actions for organization-identified potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster.
CP-7 (2)
(CCI-000517)
The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster.
PRIORITY OF SERVICE
CP-7 (3) The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).
CP-7 (3)
(CCI-000518)
The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with the organizational availability requirements (including recovery time objectives).
PREPARATION FOR USE
CP-7 (4) The organization prepares the alternate processing site so that the site is ready to be used as the operational site supporting essential missions and business functions.
CP-7 (4)
(CCI-000519)
The organization prepares the alternate processing site so that it is ready to be used as the operational site supporting essential missions.
CP-7 (4)
(CCI-000520)
The organization prepares the alternate processing site so that it is ready to be used as the operational site supporting essential business functions.
EQUIVALENT INFORMATION SECURITY SAFEGUARDS
CP-7 (5) [Withdrawn: Incorporated into CP-7].
INABILITY TO RETURN TO PRIMARY SITE
CP-7 (6) The organization plans and prepares for circumstances that preclude returning to the primary processing site.
CP-7 (6)
(CCI-002837)
The organization plans for circumstances that preclude returning to the primary processing site.
CP-7 (6)
(CCI-002838)
The organization prepares for circumstances that preclude returning to the primary processing site.
CP-8 CONTINGENCY PLANNING : TELECOMMUNICATIONS SERVICES
CP-8 The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of [Assignment: organization-defined information system operations] for essential missions and business functions within [Assignment: organization-defined time period] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-000522)
The organization defines the time period within which to permit the resumption of organization-defined information system operations for essential missions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-000523)
The organization defines the time period within which to permit the resumption of organization-defined information system operations for essential business functions when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-000524)
The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential missions within an organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-000525)
The organization establishes alternate telecommunication services including necessary agreements to permit the resumption of organization-defined information system operations for essential business functions within an organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-002840)
The organization defines the information system operations to be resumed for essential missions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
CP-8
(CCI-002841)
The organization defines the information system operations to be resumed for essential business functions within the organization-defined time period when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
PRIORITY OF SERVICE PROVISIONS
CP-8 (1) The organization:
CP-8 (1)(a) Develops primary and alternate telecommunications service agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and
CP-8 (1) (a)
(CCI-000526)
The organization develops primary telecommunications service agreements that contain priority-of-service provisions in accordance with the organization's availability requirements (including recovery time objectives).
CP-8 (1) (a)
(CCI-000527)
The organization develops alternate telecommunications service agreements that contain priority-of-service provisions in accordance with the organization's availability requirements (including recovery time objectives).
CP-8 (1)(b) Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and/or alternate telecommunications services are provided by a common carrier.
CP-8 (1) (b)
(CCI-000528)
The organization requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary telecommunications services are provided by a common carrier.
CP-8 (1) (b)
(CCI-000529)
The organization requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the alternate telecommunications services are provided by a common carrier.
SINGLE POINTS OF FAILURE
CP-8 (2) The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
CP-8 (2)
(CCI-000530)
The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.
SEPARATION OF PRIMARY / ALTERNATE PROVIDERS
CP-8 (3) The organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
CP-8 (3)
(CCI-000531)
The organization obtains alternate telecommunications services from providers that are separated from primary service providers to reduce susceptibility to the same threats.
PROVIDER CONTINGENCY PLAN
CP-8 (4) The organization:
CP-8 (4)(a) Requires primary and alternate telecommunications service providers to have contingency plans;
CP-8 (4) (a)
(CCI-000532)
The organization requires primary telecommunications service providers to have contingency plans.
CP-8 (4) (a)
(CCI-000533)
The organization requires alternate telecommunications service providers to have contingency plans.
CP-8 (4)(b) Reviews provider contingency plans to ensure that the plans meet organizational contingency requirements; and
CP-8 (4) (b)
(CCI-002842)
The organization reviews provider contingency plans to ensure that the plans meet organizational contingency requirements.
CP-8 (4)(c) Obtains evidence of contingency testing/training by providers [Assignment: organization-defined frequency].
ALTERNATE TELECOMMUNICATION SERVICE TESTING
CP-8 (5) The organization tests alternate telecommunication services [Assignment: organization-defined frequency].
CP-8 (5)
(CCI-002847)
The organization defines the frequency with which to test alternate telecommunication services.
CP-8 (5)
(CCI-002848)
The organization tests alternate telecommunication services per organization-defined frequency.
CP-9 CONTINGENCY PLANNING : INFORMATION SYSTEM BACKUP
CP-9 The organization:
CP-9a. Conducts backups of user-level information contained in the information system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
CP-9b. Conducts backups of system-level information contained in the information system [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives];
CP-9c. Conducts backups of information system documentation including security-related documentation [Assignment: organization-defined frequency consistent with recovery time and recovery point objectives]; and
CP-9d. Protects the confidentiality, integrity, and availability of backup information at storage locations.
TESTING FOR RELIABILITY / INTEGRITY
CP-9 (1) The organization tests backup information [Assignment: organization-defined frequency] to verify media reliability and information integrity.
CP-9 (1)
(CCI-000541)
The organization defines the frequency with which to test backup information to verify media reliability and information integrity.
CP-9 (1)
(CCI-000542)
The organization tests backup information per an organization-defined frequency to verify media reliability and information integrity.
TEST RESTORATION USING SAMPLING
CP-9 (2) The organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing.
CP-9 (2)
(CCI-000543)
The organization uses a sample of backup information in the restoration of selected information system functions as part of contingency plan testing.
SEPARATE STORAGE FOR CRITICAL INFORMATION
CP-9 (3) The organization stores backup copies of [Assignment: organization-defined critical information system software and other security-related information] in a separate facility or in a fire-rated container that is not collocated with the operational system.
CP-9 (3)
(CCI-002849)
The organization defines critical information system software and other security-related information, of which backup copies must be stored in a separate facility or in a fire-rated container.
CP-9 (3)
(CCI-002850)
The organization stores backup copies of organization-defined critical information system software and other security-related information in a separate facility or in a fire-rated container that is not collocated with the operational system.
PROTECTION FROM UNAUTHORIZED MODIFICATION
CP-9 (4) [Withdrawn: Incorporated into CP-9].
TRANSFER TO ALTERNATE STORAGE SITE
CP-9 (5) The organization transfers information system backup information to the alternate storage site [Assignment: organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives].
CP-9 (5)
(CCI-000547)
The organization defines the time period and transfer rate of the information system backup information to the alternate storage site consistent with the recovery time and recovery point objectives.
CP-9 (5)
(CCI-000548)
The organization transfers information system backup information to the alternate storage site in accordance with the organization-defined time period and transfer rate consistent with the recovery time and recovery point objectives.
REDUNDANT SECONDARY SYSTEM
CP-9 (6) The organization accomplishes information system backup by maintaining a redundant secondary system that is not collocated with the primary system and that can be activated without loss of information or disruption to operations.
CP-9 (6)
(CCI-001609)
The organization can activate the redundant secondary information system that is not collocated with the primary system without loss of information or disruption to operations.
CP-9 (6)
(CCI-000549)
The organization maintains a redundant secondary information system that is not collocated with the primary system.
DUAL AUTHORIZATION
CP-9 (7) The organization enforces dual authorization for the deletion or destruction of [Assignment: organization-defined backup information].
CP-9 (7)
(CCI-002851)
The organization defines the backup information that requires dual authorization for deletion or destruction.
CP-9 (7)
(CCI-002852)
The organization enforces dual authorization for the deletion or destruction of organization-defined backup information.
CP-10 CONTINGENCY PLANNING : INFORMATION SYSTEM RECOVERY AND RECONSTITUTION
CP-10 The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.
CP-10
(CCI-000550)
The organization provides for the recovery and reconstitution of the information system to a known state after a disruption.
CP-10
(CCI-000551)
The organization provides for the recovery and reconstitution of the information system to a known state after a compromise.
CP-10
(CCI-000552)
The organization provides for the recovery and reconstitution of the information system to a known state after a failure.
CONTINGENCY PLAN TESTING
CP-10 (1) [Withdrawn: Incorporated into CP-4].
TRANSACTION RECOVERY
CP-10 (2) The information system implements transaction recovery for systems that are transaction-based.
CP-10 (2)
(CCI-000553)
The information system implements transaction recovery for systems that are transaction-based.
COMPENSATING SECURITY CONTROLS
CP-10 (3) [Withdrawn: Addressed through tailoring procedures].
RESTORE WITHIN TIME PERIOD
CP-10 (4) The organization provides the capability to restore information system components within [Assignment: organization-defined restoration time-periods] from configuration-controlled and integrity-protected information representing a known, operational state for the components.
CP-10 (4)
(CCI-000556)
The organization defines restoration time periods within which to restore information system components from configuration-controlled and integrity-protected information representing a known, operational state for the components.
CP-10 (4)
(CCI-000557)
The organization provides the capability to restore information system components within organization-defined restoration time periods from configuration-controlled and integrity-protected information representing a known, operational state for the components.
FAILOVER CAPABILITY
CP-10 (5) [Withdrawn: Incorporated into SI-13].
COMPONENT PROTECTION
CP-10 (6) The organization protects backup and restoration hardware, firmware, and software.
CP-10 (6)
(CCI-000560)
The organization protects backup and restoration hardware.
CP-10 (6)
(CCI-000561)
The organization protects backup and restoration firmware.
CP-10 (6)
(CCI-000562)
The organization protects backup and restoration software.
CP-11 CONTINGENCY PLANNING : ALTERNATE COMMUNICATIONS PROTOCOLS
CP-11 The information system provides the capability to employ [Assignment: organization-defined alternative communications protocols] in support of maintaining continuity of operations.
CP-11
(CCI-002853)
The information system provides the capability to employ organization-defined alternative communications protocols in support of maintaining continuity of operations.
CP-11
(CCI-002854)
The organization defines the alternative communications protocols the information system must be capable of providing in support of maintaining continuity of operations.
CP-12 CONTINGENCY PLANNING : SAFE MODE
CP-12 The information system, when [Assignment: organization-defined conditions] are detected, enters a safe mode of operation with [Assignment: organization-defined restrictions of safe mode of operation].
CP-12
(CCI-002855)
The information system, when organization-defined conditions are detected, enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
CP-12
(CCI-002856)
The organization defines the conditions that, when detected, the information system enters a safe mode of operation with organization-defined restrictions of safe mode of operation.
CP-12
(CCI-002857)
The organization defines the restrictions of the safe mode of operation that the information system will enter when organization-defined conditions are detected.
CP-13 CONTINGENCY PLANNING : ALTERNATIVE SECURITY MECHANISMS
CP-13 The organization employs [Assignment: organization-defined alternative or supplemental security mechanisms] for satisfying [Assignment: organization-defined security functions] when the primary means of implementing the security function is unavailable or compromised.
CP-13
(CCI-002858)
The organization employs organization-defined alternative or supplemental security mechanisms for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
CP-13
(CCI-002859)
The organization defines the alternative or supplemental security mechanisms that will be employed for satisfying organization-defined security functions when the primary means of implementing the security function is unavailable or compromised.
CP-13
(CCI-002860)
The organization defines the security functions that must be satisfied when the primary means of implementing the security function is unavailable or compromised.
IA-1 IDENTIFICATION AND AUTHENTICATION : IDENTIFICATION AND AUTHENTICATION POLICY AND PROCEDURES
IA-1 The organization:
IA-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
IA-1a.1. An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
IA-1 a 1
(CCI-000756)
The organization develops an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
IA-1 a 1
(CCI-000757)
The organization disseminates to organization-defined personnel or roles an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
IA-1 a 1
(CCI-001932)
The organization documents an identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
IA-1 a 1
(CCI-001933)
The organization defines the personnel or roles to be recipients of the identification and authentication policy and the procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
IA-1a.2. Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and
IA-1 a 2
(CCI-000760)
The organization develops procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
IA-1 a 2
(CCI-000761)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
IA-1 a 2
(CCI-001934)
The organization documents procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls.
IA-1b. Reviews and updates the current:
IA-1b.1. Identification and authentication policy [Assignment: organization-defined frequency]; and
IA-1 b 1
(CCI-000758)
The organization reviews and updates identification and authentication policy in accordance with the organization-defined frequency.
IA-1 b 1
(CCI-000759)
The organization defines a frequency for reviewing and updating the identification and authentication policy.
IA-1b.2. Identification and authentication procedures [Assignment: organization-defined frequency].
IA-1 b 2
(CCI-000762)
The organization reviews and updates identification and authentication procedures in accordance with the organization-defined frequency.
IA-1 b 2
(CCI-000763)
The organization defines a frequency for reviewing and updating the identification and authentication procedures.
IA-2 IDENTIFICATION AND AUTHENTICATION : IDENTIFICATION AND AUTHENTICATION (ORGANIZATIONAL USERS)
IA-2 The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
IA-2
(CCI-000764)
The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).
NETWORK ACCESS TO PRIVILEGED ACCOUNTS
IA-2 (1) The information system implements multifactor authentication for network access to privileged accounts.
IA-2 (1)
(CCI-000765)
The information system implements multifactor authentication for network access to privileged accounts.
NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS
IA-2 (2) The information system implements multifactor authentication for network access to non-privileged accounts.
IA-2 (2)
(CCI-000766)
The information system implements multifactor authentication for network access to non-privileged accounts.
LOCAL ACCESS TO PRIVILEGED ACCOUNTS
IA-2 (3) The information system implements multifactor authentication for local access to privileged accounts.
IA-2 (3)
(CCI-000767)
The information system implements multifactor authentication for local access to privileged accounts.
LOCAL ACCESS TO NON-PRIVILEGED ACCOUNTS
IA-2 (4) The information system implements multifactor authentication for local access to non-privileged accounts.
IA-2 (4)
(CCI-000768)
The information system implements multifactor authentication for local access to non-privileged accounts.
GROUP AUTHENTICATION
IA-2 (5) The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
IA-2 (5)
(CCI-000770)
The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.
NETWORK ACCESS TO PRIVILEGED ACCOUNTS - SEPARATE DEVICE
IA-2 (6) The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2 (6)
(CCI-001935)
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access to privileged accounts.
IA-2 (6)
(CCI-001936)
The information system implements multifactor authentication for network access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
IA-2 (6)
(CCI-001937)
The device used in the information system implementation of multifactor authentication for network access to privileged accounts meets organization-defined strength of mechanism requirements.
NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - SEPARATE DEVICE
IA-2 (7) The information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2 (7)
(CCI-001938)
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access to non-privileged accounts.
IA-2 (7)
(CCI-001939)
The information system implements multifactor authentication for network access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
IA-2 (7)
(CCI-001940)
The device used in the information system implementation of multifactor authentication for network access to non-privileged accounts meets organization-defined strength of mechanism requirements.
NETWORK ACCESS TO PRIVILEGED ACCOUNTS - REPLAY RESISTANT
IA-2 (8) The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
IA-2 (8)
(CCI-001941)
The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.
NETWORK ACCESS TO NON-PRIVILEGED ACCOUNTS - REPLAY RESISTANT
IA-2 (9) The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
IA-2 (9)
(CCI-001942)
The information system implements replay-resistant authentication mechanisms for network access to non-privileged accounts.
SINGLE SIGN-ON
IA-2 (10) The information system provides a single sign-on capability for [Assignment: organization-defined list of information system accounts and services].
IA-2 (10)
(CCI-001943)
The organization defines the information system accounts for which single sign-on capability will be provided.
IA-2 (10)
(CCI-001944)
The organization defines the information system services for which single sign-on capability will be provided.
IA-2 (10)
(CCI-001945)
The information system provides a single sign-on capability for an organization-defined list of information system accounts.
IA-2 (10)
(CCI-001946)
The information system provides a single sign-on capability for an organization-defined list of information system services.
REMOTE ACCESS - SEPARATE DEVICE
IA-2 (11) The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [Assignment: organization-defined strength of mechanism requirements].
IA-2 (11)
(CCI-001947)
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access and is to provide one factor of a multifactor authentication for remote access to privileged accounts.
IA-2 (11)
(CCI-001948)
The information system implements multifactor authentication for remote access to privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
IA-2 (11)
(CCI-001949)
The device used in the information system implementation of multifactor authentication for remote access to privileged accounts meets organization-defined strength of mechanism requirements.
IA-2 (11)
(CCI-001950)
The organization defines the strength of mechanism requirements for the device that is separate from the system gaining access and is to provide one factor of a multifactor authentication for remote access to non-privileged accounts.
IA-2 (11)
(CCI-001951)
The information system implements multifactor authentication for remote access to non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access.
IA-2 (11)
(CCI-001952)
The device used in the information system implementation of multifactor authentication for remote access to non-privileged accounts meets organization-defined strength of mechanism requirements.
ACCEPTANCE OF PIV CREDENTIALS
IA-2 (12) The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials.
IA-2 (12)
(CCI-001953)
The information system accepts Personal Identity Verification (PIV) credentials.
IA-2 (12)
(CCI-001954)
The information system electronically verifies Personal Identity Verification (PIV) credentials.
OUT-OF-BAND AUTHENTICATION
IA-2 (13) The information system implements [Assignment: organization-defined out-of-band authentication] under [Assignment: organization-defined conditions].
IA-2 (13)
(CCI-001955)
The organization defines the out-of-band authentication to be implemented by the information system under organization-defined conditions.
IA-2 (13)
(CCI-001956)
The organization defines the conditions for which the information system implements organization-defined out-of-band authentication.
IA-2 (13)
(CCI-001957)
The information system implements organization-defined out-of-band authentication under organization-defined conditions.
IA-3 IDENTIFICATION AND AUTHENTICATION : DEVICE IDENTIFICATION AND AUTHENTICATION
IA-3 The information system uniquely identifies and authenticates [Assignment: organization-defined specific and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.
IA-3
(CCI-000777)
The organization defines a list of specific and/or types of devices for which identification and authentication is required before establishing a connection to the information system.
IA-3
(CCI-000778)
The information system uniquely identifies an organization-defined list of specific and/or types of devices before establishing a local, remote, or network connection.
IA-3
(CCI-001958)
The information system authenticates an organization-defined list of specific and/or types of devices before establishing a local, remote, or network connection.
CRYPTOGRAPHIC BIDIRECTIONAL AUTHENTICATION
IA-3 (1) The information system authenticates [Assignment: organization-defined specific devices and/or types of devices] before establishing [Selection (one or more): local; remote; network] connection using bidirectional authentication that is cryptographically based.
IA-3 (1)
(CCI-001959)
The organization defines the specific devices and/or type of devices the information system is to authenticate before establishing a connection.
IA-3 (1)
(CCI-001967)
The information system authenticates organization-defined devices and/or types of devices before establishing a local, remote, and/or network connection using bidirectional authentication that is cryptographically based.
CRYPTOGRAPHIC BIDIRECTIONAL NETWORK AUTHENTICATION
IA-3 (2) [Withdrawn: Incorporated into IA-3 (1)].
DYNAMIC ADDRESS ALLOCATION
IA-3 (3) The organization:
IA-3 (3)(a) Standardizes dynamic address allocation lease information and the lease duration assigned to devices in accordance with [Assignment: organization-defined lease information and lease duration]; and
IA-3 (3) (a)
(CCI-001960)
The organization defines the lease information to be assigned to devices.
IA-3 (3) (a)
(CCI-001961)
The organization defines the lease duration to be assigned to devices.
IA-3 (3) (a)
(CCI-001962)
The organization standardizes dynamic address allocation lease information assigned to devices in accordance with organization-defined lease information.
IA-3 (3) (a)
(CCI-001963)
The organization standardizes dynamic address allocation lease duration assigned to devices in accordance with organization-defined lease duration.
IA-3 (3)(b) Audits lease information when assigned to a device.
IA-3 (3) (b)
(CCI-000783)
The organization audits lease information when assigned to a device.
DEVICE ATTESTATION
IA-3 (4) The organization ensures that device identification and authentication based on attestation is handled by [Assignment: organization-defined configuration management process].
IA-3 (4)
(CCI-001964)
The organization defines the configuration management process that is to handle the device identification procedures.
IA-3 (4)
(CCI-001965)
The organization defines the configuration management process that is to handle the device authentication procedures.
IA-3 (4)
(CCI-001966)
The organization ensures that device identification based on attestation is handled by the organization-defined configuration management process.
IA-3 (4)
(CCI-001968)
The organization defines the configuration management process that is to handle the device identification procedures.
IA-3 (4)
(CCI-001969)
The organization ensures that device authentication based on attestation is handled by the organization-defined configuration management process.
IA-4 IDENTIFICATION AND AUTHENTICATION : IDENTIFIER MANAGEMENT
IA-4 The organization manages information system identifiers by:
IA-4a. Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, or device identifier;
IA-4 a
(CCI-001970)
The organization defines the personnel or roles that authorize the assignment of individual, group, role, and device identifiers.
IA-4 a
(CCI-001971)
The organization manages information system identifiers by receiving authorization from organization-defined personnel or roles to assign an individual, group, role, or device identifier.
IA-4b. Selecting an identifier that identifies an individual, group, role, or device;
IA-4 b
(CCI-001972)
The organization manages information system identifiers by selecting an identifier that identifies an individual, group, role, or device.
IA-4c. Assigning the identifier to the intended individual, group, role, or device;
IA-4 c
(CCI-001973)
The organization manages information system identifiers by assigning the identifier to the intended individual, group, role, or device.
IA-4d. Preventing reuse of identifiers for [Assignment: organization-defined time period]; and
IA-4 d
(CCI-001974)
The organization defines the time period for which the reuse of identifiers is prohibited.
IA-4 d
(CCI-001975)
The organization manages information system identifiers by preventing reuse of identifiers for an organization-defined time period.
IA-4e. Disabling the identifier after [Assignment: organization-defined time period of inactivity].
IA-4 e
(CCI-000794)
The organization defines a time period of inactivity after which the identifier is disabled.
IA-4 e
(CCI-000795)
The organization manages information system identifiers by disabling the identifier after an organization-defined time period of inactivity.
PROHIBIT ACCOUNT IDENTIFIERS AS PUBLIC IDENTIFIERS
IA-4 (1) The organization prohibits the use of information system account identifiers that are the same as public identifiers for individual electronic mail accounts.
IA-4 (1)
(CCI-000796)
The organization prohibits the use of information system account identifiers that are the same as public identifiers for individual electronic mail accounts.
SUPERVISOR AUTHORIZATION
IA-4 (2) The organization requires that the registration process to receive an individual identifier includes supervisor authorization.
IA-4 (2)
(CCI-002040)
The organization requires that the registration process to receive an individual identifier includes supervisor authorization.
MULTIPLE FORMS OF CERTIFICATION
IA-4 (3) The organization requires multiple forms of certification of individual identification such as documentary evidence or a combination of documents and biometrics be presented to the registration authority.
IA-4 (3)
(CCI-000799)
The organization requires multiple forms of certification of individual identification, such as documentary evidence or a combination of documents and biometrics, be presented to the registration authority.
IDENTIFY USER STATUS
IA-4 (4) The organization manages individual identifiers by uniquely identifying each individual as [Assignment: organization-defined characteristic identifying individual status].
IA-4 (4)
(CCI-000800)
The organization defines characteristics for identifying individual status.
IA-4 (4)
(CCI-000801)
The organization manages individual identifiers by uniquely identifying each individual by organization-defined characteristics identifying individual status.
DYNAMIC MANAGEMENT
IA-4 (5) The information system dynamically manages identifiers.
IA-4 (5)
(CCI-001976)
The information system dynamically manages identifiers.
CROSS-ORGANIZATION MANAGEMENT
IA-4 (6) The organization coordinates with [Assignment: organization-defined external organizations] for cross-organization management of identifiers.
IA-4 (6)
(CCI-001977)
The organization defines the external organizations with which it will coordinate for cross-management of identifiers.
IA-4 (6)
(CCI-001978)
The organization coordinates with organization-defined external organizations for cross-organization management of identifiers.
IN-PERSON REGISTRATION
IA-4 (7) The organization requires that the registration process to receive an individual identifier be conducted in person before a designated registration authority.
IA-4 (7)
(CCI-001979)
The organization requires the registration process to receive an individual identifier be conducted in person before a designated registration authority.
IA-5 IDENTIFICATION AND AUTHENTICATION : AUTHENTICATOR MANAGEMENT
IA-5 The organization manages information system authenticators by:
IA-5a. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;
IA-5 a
(CCI-001980)
The organization manages information system authenticators by verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator.
IA-5b. Establishing initial authenticator content for authenticators defined by the organization;
IA-5 b
(CCI-000176)
The organization manages information system authenticators by establishing initial authenticator content for authenticators defined by the organization.
IA-5c. Ensuring that authenticators have sufficient strength of mechanism for their intended use;
IA-5 c
(CCI-001544)
The organization manages information system authenticators by ensuring that authenticators have sufficient strength of mechanism for their intended use.
IA-5d. Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;
IA-5 d
(CCI-001981)
The organization manages information system authenticators by establishing administrative procedures for initial authenticator distribution.
IA-5 d
(CCI-001982)
The organization manages information system authenticators by establishing administrative procedures for lost/compromised authenticators.
IA-5 d
(CCI-001983)
The organization manages information system authenticators by establishing administrative procedures for damaged authenticators.
IA-5 d
(CCI-001984)
The organization manages information system authenticators by establishing administrative procedures for revoking authenticators.
IA-5 d
(CCI-001985)
The organization manages information system authenticators by implementing administrative procedures for initial authenticator distribution.
IA-5 d
(CCI-001986)
The organization manages information system authenticators by implementing administrative procedures for lost/compromised authenticators.
IA-5 d
(CCI-001987)
The organization manages information system authenticators by implementing administrative procedures for damaged authenticators.
IA-5 d
(CCI-001988)
The organization manages information system authenticators by implementing administrative procedures for revoking authenticators.
IA-5e. Changing default content of authenticators prior to information system installation;
IA-5 e
(CCI-001989)
The organization manages information system authenticators by changing default content of authenticators prior to information system installation.
IA-5f. Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;
IA-5 f
(CCI-000179)
The organization manages information system authenticators by establishing minimum lifetime restrictions for authenticators.
IA-5 f
(CCI-000180)
The organization manages information system authenticators by establishing maximum lifetime restrictions for authenticators.
IA-5 f
(CCI-000181)
The organization manages information system authenticators by establishing reuse conditions for authenticators.
IA-5g. Changing/refreshing authenticators [Assignment: organization-defined time period by authenticator type];
IA-5 g
(CCI-001610)
The organization defines the time period (by authenticator type) for changing/refreshing authenticators.
IA-5 g
(CCI-000182)
The organization manages information system authenticators by changing/refreshing authenticators in accordance with the organization-defined time period by authenticator type.
IA-5h. Protecting authenticator content from unauthorized disclosure and modification;
IA-5 h
(CCI-000183)
The organization manages information system authenticators by protecting authenticator content from unauthorized disclosure.
IA-5 h
(CCI-002042)
The organization manages information system authenticators by protecting authenticator content from unauthorized modification.
IA-5i. Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and
IA-5 i
(CCI-000184)
The organization manages information system authenticators by requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators.
IA-5 i
(CCI-002365)
The organization manages information system authenticators by requiring individuals to take specific security safeguards to protect authenticators.
IA-5 i
(CCI-002366)
The organization manages information system authenticators by having devices implement specific security safeguards to protect authenticators.
IA-5j. Changing authenticators for group/role accounts when membership to those accounts changes.
IA-5 j
(CCI-001990)
The organization manages information system authenticators by changing authenticators for group/role accounts when membership to those accounts changes.
PASSWORD-BASED AUTHENTICATION
IA-5 (1) The information system, for password-based authentication:
IA-5 (1)(a) Enforces minimum password complexity of [Assignment: organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type];
IA-5 (1) (a)
(CCI-001611)
The organization defines the minimum number of special characters for password complexity enforcement.
IA-5 (1) (a)
(CCI-001612)
The organization defines the minimum number of upper case characters for password complexity enforcement.
IA-5 (1) (a)
(CCI-001613)
The organization defines the minimum number of lower case characters for password complexity enforcement.
IA-5 (1) (a)
(CCI-001614)
The organization defines the minimum number of numeric characters for password complexity enforcement.
IA-5 (1) (a)
(CCI-001619)
The information system enforces password complexity by the minimum number of special characters used.
IA-5 (1) (a)
(CCI-000192)
The information system enforces password complexity by the minimum number of upper case characters used.
IA-5 (1) (a)
(CCI-000193)
The information system enforces password complexity by the minimum number of lower case characters used.
IA-5 (1) (a)
(CCI-000194)
The information system enforces password complexity by the minimum number of numeric characters used.
IA-5 (1) (a)
(CCI-000205)
The information system enforces minimum password length.
IA-5 (1)(b) Enforces at least the following number of changed characters when new passwords are created: [Assignment: organization-defined number];
IA-5 (1) (b)
(CCI-001615)
The organization defines the minimum number of characters that are changed when new passwords are created.
IA-5 (1) (b)
(CCI-000195)
The information system, for password-based authentication, when new passwords are created, enforces that at least an organization-defined number of characters are changed.
IA-5 (1)(c) Stores and transmits only cryptographically-protected passwords;
IA-5 (1) (c)
(CCI-000196)
The information system, for password-based authentication, stores only cryptographically-protected passwords.
IA-5 (1) (c)
(CCI-000197)
The information system, for password-based authentication, transmits only cryptographically-protected passwords.
IA-5 (1)(d) Enforces password minimum and maximum lifetime restrictions of [Assignment: organization-defined numbers for lifetime minimum, lifetime maximum];
IA-5 (1) (d)
(CCI-001616)
The organization defines minimum password lifetime restrictions.
IA-5 (1) (d)
(CCI-001617)
The organization defines maximum password lifetime restrictions.
IA-5 (1) (d)
(CCI-000198)
The information system enforces minimum password lifetime restrictions.
IA-5 (1) (d)
(CCI-000199)
The information system enforces maximum password lifetime restrictions.
IA-5 (1)(e) Prohibits password reuse for [Assignment: organization-defined number] generations; and
IA-5 (1) (e)
(CCI-001618)
The organization defines the number of generations for which password reuse is prohibited.
IA-5 (1) (e)
(CCI-000200)
The information system prohibits password reuse for the organization-defined number of generations.
IA-5 (1)(f) Allows the use of a temporary password for system logons with an immediate change to a permanent password.
IA-5 (1) (f)
(CCI-002041)
The information system allows the use of a temporary password for system logons with an immediate change to a permanent password.
PKI-BASED AUTHENTICATION
IA-5 (2) The information system, for PKI-based authentication:
IA-5 (2)(a) Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;
IA-5 (2) (a)
(CCI-000185)
The information system, for PKI-based authentication, validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information.
IA-5 (2)(b) Enforces authorized access to the corresponding private key;
IA-5 (2) (b)
(CCI-000186)
The information system, for PKI-based authentication, enforces authorized access to the corresponding private key.
IA-5 (2)(c) Maps the authenticated identity to the account of the individual or group; and
IA-5 (2) (c)
(CCI-000187)
The information system, for PKI-based authentication, maps the authenticated identity to the account of the individual or group.
IA-5 (2)(d) Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
IA-5 (2) (d)
(CCI-001991)
The information system, for PKI-based authentication, implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
IN-PERSON OR TRUSTED THIRD-PARTY REGISTRATION
IA-5 (3) The organization requires that the registration process to receive [Assignment: organization-defined types of and/or specific authenticators] be conducted [Selection: in person; by a trusted third party] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].
IA-5 (3)
(CCI-001992)
The organization defines the personnel or roles responsible for authorizing the organization's registration authority accountable for the authenticator registration process.
IA-5 (3)
(CCI-001993)
The organization defines the registration authority accountable for the authenticator registration process.
IA-5 (3)
(CCI-001994)
The organization defines the types of and/or specific authenticators that are subject to the authenticator registration process.
IA-5 (3)
(CCI-001995)
The organization requires that the registration process, to receive organization-defined types of and/or specific authenticators, be conducted in person, or by a trusted third-party, before an organization-defined registration authority with authorization by organization-defined personnel or roles.
AUTOMATED SUPPORT FOR PASSWORD STRENGTH DETERMINATION
IA-5 (4) The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy [Assignment: organization-defined requirements].
IA-5 (4)
(CCI-001996)
The organization defines the requirements required by the automated tools to determine if password authenticators are sufficiently strong.
IA-5 (4)
(CCI-001997)
The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy organization-defined requirements.
CHANGE AUTHENTICATORS PRIOR TO DELIVERY
IA-5 (5) The organization requires developers/installers of information system components to provide unique authenticators or change default authenticators prior to delivery/installation.
IA-5 (5)
(CCI-001998)
The organization requires developers/installers of information system components to provide unique authenticators or change default authenticators prior to delivery/installation.
PROTECTION OF AUTHENTICATORS
IA-5 (6) The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
IA-5 (6)
(CCI-000201)
The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.
NO EMBEDDED UNENCRYPTED STATIC AUTHENTICATORS
IA-5 (7) The organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.
IA-5 (7)
(CCI-000202)
The organization ensures unencrypted static authenticators are not embedded in access scripts.
IA-5 (7)
(CCI-000203)
The organization ensures unencrypted static authenticators are not stored on function keys.
IA-5 (7)
(CCI-002367)
The organization ensures unencrypted static authenticators are not embedded in applications.
MULTIPLE INFORMATION SYSTEM ACCOUNTS
IA-5 (8) The organization implements [Assignment: organization-defined security safeguards] to manage the risk of compromise due to individuals having accounts on multiple information systems.
IA-5 (8)
(CCI-001621)
The organization implements organization-defined security safeguards to manage the risk of compromise due to individuals having accounts on multiple information systems.
IA-5 (8)
(CCI-000204)
The organization defines the security safeguards required to manage the risk of compromise due to individuals having accounts on multiple information systems.
CROSS-ORGANIZATION CREDENTIAL MANAGEMENT
IA-5 (9) The organization coordinates with [Assignment: organization-defined external organizations] for cross-organization management of credentials.
IA-5 (9)
(CCI-001999)
The organization defines the external organizations to be coordinated with for cross-organization management of credentials.
IA-5 (9)
(CCI-002000)
The organization coordinates with organization-defined external organizations for cross-organization management of credentials.
DYNAMIC CREDENTIAL ASSOCIATION
IA-5 (10) The information system dynamically provisions identities.
IA-5 (10)
(CCI-002001)
The information system dynamically provisions identities.
HARDWARE TOKEN-BASED AUTHENTICATION
IA-5 (11) The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].
IA-5 (11)
(CCI-002002)
The organization defines the token quality requirements to be employed by the information system mechanisms for token-based authentication.
IA-5 (11)
(CCI-002003)
The information system, for token-based authentication, employs mechanisms that satisfy organization-defined token quality requirements.
BIOMETRIC AUTHENTICATION
IA-5 (12) The information system, for biometric-based authentication, employs mechanisms that satisfy [Assignment: organization-defined biometric quality requirements].
IA-5 (12)
(CCI-002004)
The organization defines the biometric quality requirements to be employed by the information system mechanisms for biometric-based authentication.
IA-5 (12)
(CCI-002005)
The information system, for biometric-based authentication, employs mechanisms that satisfy organization-defined biometric quality requirements.
EXPIRATION OF CACHED AUTHENTICATORS
IA-5 (13) The information system prohibits the use of cached authenticators after [Assignment: organization-defined time period].
IA-5 (13)
(CCI-002006)
The organization defines the time period after which the use of cached authenticators is prohibited.
IA-5 (13)
(CCI-002007)
The information system prohibits the use of cached authenticators after an organization-defined time period.
MANAGING CONTENT OF PKI TRUST STORES
IA-5 (14) The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
IA-5 (14)
(CCI-002008)
The organization, for PKI-based authentication, employs a deliberate organization-wide methodology for managing the content of PKI trust stores installed across all platforms including networks, operating systems, browsers, and applications.
FICAM-APPROVED PRODUCTS AND SERVICES
IA-5 (15) The organization uses only FICAM-approved path discovery and validation products and services.
IA-5 (15)
(CCI-002043)
The organization uses only FICAM-approved path discovery and validation products and services.
IA-6 IDENTIFICATION AND AUTHENTICATION : AUTHENTICATOR FEEDBACK
IA-6 The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
IA-6
(CCI-000206)
The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.
IA-7 IDENTIFICATION AND AUTHENTICATION : CRYPTOGRAPHIC MODULE AUTHENTICATION
IA-7 The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
IA-7
(CCI-000803)
The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.
IA-8 IDENTIFICATION AND AUTHENTICATION : IDENTIFICATION AND AUTHENTICATION (NON-ORGANIZATIONAL USERS)
IA-8 The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).
IA-8
(CCI-000804)
The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).
ACCEPTANCE OF PIV CREDENTIALS FROM OTHER AGENCIES
IA-8 (1) The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies.
IA-8 (1)
(CCI-002009)
The information system accepts Personal Identity Verification (PIV) credentials from other federal agencies.
IA-8 (1)
(CCI-002010)
The information system electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies.
ACCEPTANCE OF THIRD-PARTY CREDENTIALS
IA-8 (2) The information system accepts only FICAM-approved third-party credentials.
IA-8 (2)
(CCI-002011)
The information system accepts FICAM-approved third-party credentials.
USE OF FICAM-APPROVED PRODUCTS
IA-8 (3) The organization employs only FICAM-approved information system components in [Assignment: organization-defined information systems] to accept third-party credentials.
IA-8 (3)
(CCI-002012)
The organization defines the information systems which will employ only FICAM-approved information system components.
IA-8 (3)
(CCI-002013)
The organization employs only FICAM-approved information system components in organization-defined information systems to accept third-party credentials.
USE OF FICAM-ISSUED PROFILES
IA-8 (4) The information system conforms to FICAM-issued profiles.
IA-8 (4)
(CCI-002014)
The information system conforms to FICAM-issued profiles.
ACCEPTANCE OF PIV-I CREDENTIALS
IA-8 (5) The information system accepts and electronically verifies Personal Identity Verification-I (PIV-I) credentials.
IA-8 (5)
(CCI-002015)
The information system accepts Personal Identity Verification-I (PIV-I) credentials.
IA-8 (5)
(CCI-002016)
The information system electronically verifies Personal Identity Verification-I (PIV-I) credentials.
IA-9 IDENTIFICATION AND AUTHENTICATION : SERVICE IDENTIFICATION AND AUTHENTICATION
IA-9 The organization identifies and authenticates [Assignment: organization-defined information system services] using [Assignment: organization-defined security safeguards].
IA-9
(CCI-002017)
The organization defines the information system services requiring identification.
IA-9
(CCI-002018)
The organization defines the information system services requiring authentication.
IA-9
(CCI-002019)
The organization defines the security safeguards to be used when identifying information system services.
IA-9
(CCI-002020)
The organization defines the security safeguards to be used when authenticating information system services.
IA-9
(CCI-002021)
The organization identifies organization-defined information system services using organization-defined security safeguards.
IA-9
(CCI-002022)
The organization authenticates organization-defined information system services using organization-defined security safeguards.
INFORMATION EXCHANGE
IA-9 (1) The organization ensures that service providers receive, validate, and transmit identification and authentication information.
IA-9 (1)
(CCI-002023)
The organization ensures that service providers receive identification information.
IA-9 (1)
(CCI-002024)
The organization ensures that service providers validate identification information.
IA-9 (1)
(CCI-002025)
The organization ensures that service providers transmit identification information.
IA-9 (1)
(CCI-002026)
The organization ensures that service providers receive authentication information.
IA-9 (1)
(CCI-002027)
The organization ensures that service providers validate authentication information.
IA-9 (1)
(CCI-002028)
The organization ensures that service providers transmit authentication information.
TRANSMISSION OF DECISIONS
IA-9 (2) The organization ensures that identification and authentication decisions are transmitted between [Assignment: organization-defined services] consistent with organizational policies.
IA-9 (2)
(CCI-002029)
The organization defines the services between which identification decisions are to be transmitted.
IA-9 (2)
(CCI-002030)
The organization defines the services between which authentication decisions are to be transmitted.
IA-9 (2)
(CCI-002031)
The organization ensures that identification decisions are transmitted between organization-defined services consistent with organizational policies.
IA-9 (2)
(CCI-002032)
The organization ensures that authentication decisions are transmitted between organization-defined services consistent with organizational policies.
IA-10 IDENTIFICATION AND AUTHENTICATION : ADAPTIVE IDENTIFICATION AND AUTHENTICATION
IA-10 The organization requires that individuals accessing the information system employ [Assignment: organization-defined supplemental authentication techniques or mechanisms] under specific [Assignment: organization-defined circumstances or situations].
IA-10
(CCI-002033)
The organization defines the specific circumstances or situations when individuals accessing an information system employ organization-defined supplemental authentication techniques or mechanisms.
IA-10
(CCI-002034)
The organization defines the supplemental authentication techniques or mechanisms to be employed in specific organization-defined circumstances or situations by individuals accessing the information system.
IA-10
(CCI-002035)
The organization requires that individuals accessing the information system employ organization-defined supplemental authentication techniques or mechanisms under specific organization-defined circumstances or situations.
IA-11 IDENTIFICATION AND AUTHENTICATION : RE-AUTHENTICATION
IA-11 The organization requires users and devices to re-authenticate when [Assignment: organization-defined circumstances or situations requiring re-authentication].
IA-11
(CCI-002036)
The organization defines the circumstances or situations under which users will be required to reauthenticate.
IA-11
(CCI-002037)
The organization defines the circumstances or situations under which devices will be required to reauthenticate.
IA-11
(CCI-002038)
The organization requires users to reauthenticate upon organization-defined circumstances or situations requiring reauthentication.
IA-11
(CCI-002039)
The organization requires devices to reauthenticate upon organization-defined circumstances or situations requiring reauthentication.
IR-1 INCIDENT RESPONSE : INCIDENT RESPONSE POLICY AND PROCEDURES
IR-1 The organization:
IR-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
IR-1a.1. An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
IR-1 a 1
(CCI-000805)
The organization develops and documents an incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
IR-1 a 1
(CCI-000806)
The organization disseminates an incident response policy to organization-defined personnel or roles.
IR-1 a 1
(CCI-002776)
The organization defines the personnel or roles to whom the incident response policy is disseminated.
IR-1a.2. Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and
IR-1 a 2
(CCI-000809)
The organization develops and documents procedures to facilitate the implementation of the incident response policy and associated incident response controls.
IR-1 a 2
(CCI-000810)
The organization disseminates incident response procedures to organization-defined personnel or roles.
IR-1 a 2
(CCI-002777)
The organization defines the personnel or roles to whom the incident response procedures are disseminated.
IR-1b. Reviews and updates the current:
IR-1b.1. Incident response policy [Assignment: organization-defined frequency]; and
IR-1 b 1
(CCI-000807)
The organization reviews and updates the current incident response policy in accordance with organization-defined frequency.
IR-1 b 1
(CCI-000808)
The organization defines the frequency with which to review and update the current incident response policy.
IR-1b.2. Incident response procedures [Assignment: organization-defined frequency].
IR-1 b 2
(CCI-000811)
The organization reviews and updates the current incident response procedures in accordance with organization-defined frequency.
IR-1 b 2
(CCI-000812)
The organization defines the frequency with which to review and update the current incident response procedures.
IR-2 INCIDENT RESPONSE : INCIDENT RESPONSE TRAINING
IR-2 The organization provides incident response training to information system users consistent with assigned roles and responsibilities:
IR-2a. Within [Assignment: organization-defined time period] of assuming an incident response role or responsibility;
IR-2 a
(CCI-000813)
The organization provides incident response training to information system users consistent with assigned roles and responsibilities within an organization-defined time period of assuming an incident response role or responsibility.
IR-2 a
(CCI-002778)
The organization defines the time period in which information system users who assume an incident response role or responsibility receive incident response training.
IR-2b. When required by information system changes; and
IR-2 b
(CCI-002779)
The organization provides incident response training to information system users consistent with assigned roles and responsibilities when required by information system changes.
IR-2c. [Assignment: organization-defined frequency] thereafter.
IR-2 c
(CCI-000814)
The organization provides incident response training in accordance with organization-defined frequency.
IR-2 c
(CCI-000815)
The organization defines a frequency for incident response training.
SIMULATED EVENTS
IR-2 (1) The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations.
IR-2 (1)
(CCI-000816)
The organization incorporates simulated events into incident response training to facilitate effective response by personnel in crisis situations.
AUTOMATED TRAINING ENVIRONMENTS
IR-2 (2) The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment.
IR-2 (2)
(CCI-000817)
The organization employs automated mechanisms to provide a more thorough and realistic incident response training environment.
IR-3 INCIDENT RESPONSE : INCIDENT RESPONSE TESTING
IR-3 The organization tests the incident response capability for the information system [Assignment: organization-defined frequency] using [Assignment: organization-defined tests] to determine the incident response effectiveness and documents the results.
IR-3
(CCI-001624)
The organization documents the results of incident response tests.
IR-3
(CCI-000818)
The organization tests the incident response capability for the information system on an organization-defined frequency using organization-defined tests to determine the incident response effectiveness.
IR-3
(CCI-000819)
The organization defines a frequency for incident response tests.
IR-3
(CCI-000820)
The organization defines tests for incident response.
AUTOMATED TESTING
IR-3 (1) The organization employs automated mechanisms to more thoroughly and effectively test the incident response capability.
IR-3 (1)
(CCI-000821)
The organization employs automated mechanisms to more thoroughly and effectively test the incident response capability.
COORDINATION WITH RELATED PLANS
IR-3 (2) The organization coordinates incident response testing with organizational elements responsible for related plans.
IR-3 (2)
(CCI-002780)
The organization coordinates incident response testing with organizational elements responsible for related plans.
IR-4 INCIDENT RESPONSE : INCIDENT HANDLING
IR-4 The organization:
IR-4a. Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;
IR-4 a
(CCI-000822)
The organization implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery.
IR-4b. Coordinates incident handling activities with contingency planning activities; and
IR-4 b
(CCI-000823)
The organization coordinates incident handling activities with contingency planning activities.
IR-4c. Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises, and implements the resulting changes accordingly.
IR-4 c
(CCI-001625)
The organization implements the resulting incident handling activity changes to incident response procedures, training, and testing/exercises accordingly.
IR-4 c
(CCI-000824)
The organization incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises.
AUTOMATED INCIDENT HANDLING PROCESSES
IR-4 (1) The organization employs automated mechanisms to support the incident handling process.
IR-4 (1)
(CCI-000825)
The organization employs automated mechanisms to support the incident handling process.
DYNAMIC RECONFIGURATION
IR-4 (2) The organization includes dynamic reconfiguration of [Assignment: organization-defined information system components] as part of the incident response capability.
IR-4 (2)
(CCI-000826)
The organization includes dynamic reconfiguration of organization-defined information system components as part of the incident response capability.
IR-4 (2)
(CCI-002781)
The organization defines the information system components for dynamic reconfiguration as part of the incident response capability.
CONTINUITY OF OPERATIONS
IR-4 (3) The organization identifies [Assignment: organization-defined classes of incidents] and [Assignment: organization-defined actions to take in response to classes of incidents] to ensure continuation of organizational missions and business functions.
IR-4 (3)
(CCI-000827)
The organization defines and identifies classes of incidents for which organization-defined actions are to be taken to ensure continuation of organizational mission and business functions.
IR-4 (3)
(CCI-000828)
The organization defines and identifies actions to take in response to organization-defined classes of incidents to ensure continuation of organizational missions and business functions.
INFORMATION CORRELATION
IR-4 (4) The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.
IR-4 (4)
(CCI-000829)
The organization correlates incident information and individual incident responses to achieve an organization-wide perspective on incident awareness and response.
AUTOMATIC DISABLING OF INFORMATION SYSTEM
IR-4 (5) The organization implements a configurable capability to automatically disable the information system if [Assignment: organization-defined security violations] are detected.
IR-4 (5)
(CCI-000830)
The organization defines security violations that, if detected, initiate a configurable capability to automatically disable the information system.
IR-4 (5)
(CCI-000831)
The organization implements a configurable capability to automatically disable the information system if organization-defined security violations are detected.
INSIDER THREATS - SPECIFIC CAPABILITIES
IR-4 (6) The organization implements incident handling capability for insider threats.
IR-4 (6)
(CCI-002782)
The organization implements an incident handling capability for insider threats.
INSIDER THREATS - INTRA-ORGANIZATION COORDINATION
IR-4 (7) The organization coordinates incident handling capability for insider threats across [Assignment: organization-defined components or elements of the organization].
IR-4 (7)
(CCI-002783)
The organization coordinates an incident handling capability for insider threats across organization-defined components or elements of the organization.
IR-4 (7)
(CCI-002784)
The organization defines components or elements of the organization across which an incident handling capability for insider threats will be coordinated.
CORRELATION WITH EXTERNAL ORGANIZATIONS
IR-4 (8) The organization coordinates with [Assignment: organization-defined external organizations] to correlate and share [Assignment: organization-defined incident information] to achieve a cross-organization perspective on incident awareness and more effective incident responses.
IR-4 (8)
(CCI-002785)
The organization coordinates with organization-defined external organizations to correlate and share organization-defined incident information to achieve a cross-organization perspective on incident awareness and more effective incident responses.
IR-4 (8)
(CCI-002786)
The organization defines external organizations with which to correlate and share organization-defined incident information.
IR-4 (8)
(CCI-002787)
The organization defines incident information to correlate and share with organization-defined external organizations.
DYNAMIC RESPONSE CAPABILITY
IR-4 (9) The organization employs [Assignment: organization-defined dynamic response capabilities] to effectively respond to security incidents.
IR-4 (9)
(CCI-002788)
The organization employs organization-defined dynamic response capabilities to effectively respond to security incidents.
IR-4 (9)
(CCI-002789)
The organization defines dynamic response capabilities to effectively respond to security incidents.
SUPPLY CHAIN COORDINATION
IR-4 (10) The organization coordinates incident handling activities involving supply chain events with other organizations involved in the supply chain.
IR-4 (10)
(CCI-002790)
The organization coordinates incident handling activities involving supply chain events with other organizations involved in the supply chain.
IR-5 INCIDENT RESPONSE : INCIDENT MONITORING
IR-5 The organization tracks and documents information system security incidents.
IR-5
(CCI-000832)
The organization tracks and documents information system security incidents.
AUTOMATED TRACKING / DATA COLLECTION / ANALYSIS
IR-5 (1) The organization employs automated mechanisms to assist in the tracking of security incidents and in the collection and analysis of incident information.
IR-5 (1)
(CCI-001626)
The organization employs automated mechanisms to assist in the collection of security incident information.
IR-5 (1)
(CCI-001627)
The organization employs automated mechanisms to assist in the analysis of security incident information.
IR-5 (1)
(CCI-000833)
The organization employs automated mechanisms to assist in the tracking of security incidents.
IR-6 INCIDENT RESPONSE : INCIDENT REPORTING
IR-6 The organization:
IR-6a. Requires personnel to report suspected security incidents to the organizational incident response capability within [Assignment: organization-defined time period]; and
IR-6 a
(CCI-000834)
The organization defines a time period for personnel to report suspected security incidents to the organizational incident response capability.
IR-6 a
(CCI-000835)
The organization requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period.
IR-6b. Reports security incident information to [Assignment: organization-defined authorities].
IR-6 b
(CCI-000836)
The organization reports security incident information to organization-defined authorities.
IR-6 b
(CCI-002791)
The organization defines authorities to whom security incident information is reported.
AUTOMATED REPORTING
IR-6 (1) The organization employs automated mechanisms to assist in the reporting of security incidents.
IR-6 (1)
(CCI-000837)
The organization employs automated mechanisms to assist in the reporting of security incidents.
VULNERABILITIES RELATED TO INCIDENTS
IR-6 (2) The organization reports information system vulnerabilities associated with reported security incidents to [Assignment: organization-defined personnel or roles].
IR-6 (2)
(CCI-000838)
The organization reports information system vulnerabilities associated with reported security incidents to organization-defined personnel or roles.
IR-6 (2)
(CCI-002792)
The organization defines personnel or roles to whom information system vulnerabilities associated with reported security incident information are reported.
COORDINATION WITH SUPPLY CHAIN
IR-6 (3) The organization provides security incident information to other organizations involved in the supply chain for information systems or information system components related to the incident.
IR-6 (3)
(CCI-002793)
The organization provides security incident information to other organizations involved in the supply chain for information systems or information system components related to the incident.
IR-7 INCIDENT RESPONSE : INCIDENT RESPONSE ASSISTANCE
IR-7 The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents.
IR-7
(CCI-000839)
The organization provides an incident response support resource, integral to the organizational incident response capability, that offers advice and assistance to users of the information system for the handling and reporting of security incidents.
AUTOMATION SUPPORT FOR AVAILABILITY OF INFORMATION / SUPPORT
IR-7 (1) The organization employs automated mechanisms to increase the availability of incident response-related information and support.
IR-7 (1)
(CCI-000840)
The organization employs automated mechanisms to increase the availability of incident response-related information and support.
COORDINATION WITH EXTERNAL PROVIDERS
IR-7 (2) The organization:
IR-7 (2)(a) Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
IR-7 (2) (a)
(CCI-000841)
The organization establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability.
IR-7 (2)(b) Identifies organizational incident response team members to the external providers.
IR-7 (2) (b)
(CCI-000842)
The organization identifies organizational incident response team members to the external providers.
IR-8 INCIDENT RESPONSE : INCIDENT RESPONSE PLAN
IR-8 The organization:
IR-8a. Develops an incident response plan that:
IR-8 a
(CCI-002794)
The organization develops an incident response plan.
IR-8a.1. Provides the organization with a roadmap for implementing its incident response capability;
IR-8 a 1
(CCI-002795)
The organization's incident response plan provides the organization with a roadmap for implementing its incident response capability.
IR-8a.2. Describes the structure and organization of the incident response capability;
IR-8 a 2
(CCI-002796)
The organization's incident response plan describes the structure and organization of the incident response capability.
IR-8a.3. Provides a high-level approach for how the incident response capability fits into the overall organization;
IR-8 a 3
(CCI-002797)
The organization's incident response plan provides a high-level approach for how the incident response capability fits into the overall organization.
IR-8a.4. Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;
IR-8 a 4
(CCI-002798)
The organization's incident response plan meets the unique requirements of the organization, which relate to mission, size, structure, and functions.
IR-8a.5. Defines reportable incidents;
IR-8 a 5
(CCI-002799)
The organization's incident response plan defines reportable incidents.
IR-8a.6. Provides metrics for measuring the incident response capability within the organization;
IR-8 a 6
(CCI-002800)
The organization's incident response plan provides metrics for measuring the incident response capability within the organization.
IR-8a.7. Defines the resources and management support needed to effectively maintain and mature an incident response capability; and
IR-8 a 7
(CCI-002801)
The organization's incident response plan defines the resources and management support needed to effectively maintain and mature an incident response capability.
IR-8a.8. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
IR-8 a 8
(CCI-000844)
The organization develops an incident response plan that is reviewed and approved by organization-defined personnel or roles.
IR-8 a 8
(CCI-002802)
The organization defines personnel or roles to review and approve the incident response plan.
IR-8b. Distributes copies of the incident response plan to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements];
IR-8 b
(CCI-000845)
The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom copies of the incident response plan are distributed.
IR-8 b
(CCI-000846)
The organization distributes copies of the incident response plan to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
IR-8c. Reviews the incident response plan [Assignment: organization-defined frequency];
IR-8 c
(CCI-000847)
The organization defines the frequency for reviewing the incident response plan.
IR-8 c
(CCI-000848)
The organization reviews the incident response plan on an organization-defined frequency.
IR-8d. Updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing;
IR-8 d
(CCI-000849)
The organization updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing.
IR-8e. Communicates incident response plan changes to [Assignment: organization-defined incident response personnel (identified by name and/or by role) and organizational elements]; and
IR-8 e
(CCI-000850)
The organization communicates incident response plan changes to organization-defined incident response personnel (identified by name and/or by role) and organizational elements.
IR-8 e
(CCI-002803)
The organization defines incident response personnel (identified by name and/or by role) and organizational elements to whom incident response plan changes will be communicated.
IR-8f. Protects the incident response plan from unauthorized disclosure and modification.
IR-8 f
(CCI-002804)
The organization protects the incident response plan from unauthorized disclosure and modification.
IR-9 INCIDENT RESPONSE : INFORMATION SPILLAGE RESPONSE
IR-9 The organization responds to information spills by:
IR-9a. Identifying the specific information involved in the information system contamination;
IR-9 a
(CCI-002805)
The organization responds to information spills by identifying the specific information involved in the information system contamination.
IR-9b. Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill;
IR-9 b
(CCI-002806)
The organization responds to information spills by alerting organization-defined personnel or roles of the information spill using a method of communication not associated with the spill.
IR-9 b
(CCI-002807)
The organization defines personnel or roles to be alerted of information spills using a method of communication not associated with the spill.
IR-9c. Isolating the contaminated information system or system component;
IR-9 c
(CCI-002808)
The organization responds to information spills by isolating the contaminated information system or system component.
IR-9d. Eradicating the information from the contaminated information system or component;
IR-9 d
(CCI-002809)
The organization responds to information spills by eradicating the information from the contaminated information system or component.
IR-9e. Identifying other information systems or system components that may have been subsequently contaminated; and
IR-9 e
(CCI-002810)
The organization responds to information spills by identifying other information systems or system components that may have been subsequently contaminated.
IR-9f. Performing other [Assignment: organization-defined actions].
IR-9 f
(CCI-002811)
The organization responds to information spills by performing other organization-defined actions.
IR-9 f
(CCI-002812)
The organization defines other actions required to respond to information spills.
RESPONSIBLE PERSONNEL
IR-9 (1) The organization assigns [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills.
IR-9 (1)
(CCI-002813)
The organization assigns organization-defined personnel or roles with responsibility for responding to information spills.
IR-9 (1)
(CCI-002814)
The organization assigns organization-defined personnel or roles with responsibility for responding to information spills.
IR-9 (1)
(CCI-002815)
The organization defines personnel or roles to whom responsibility for responding to information spills will be assigned.
TRAINING
IR-9 (2) The organization provides information spillage response training [Assignment: organization-defined frequency].
IR-9 (2)
(CCI-002816)
The organization provides information spillage response training according to an organization-defined frequency.
IR-9 (2)
(CCI-002817)
The organization defines the frequency with which to provide information spillage response training.
POST-SPILL OPERATIONS
IR-9 (3) The organization implements [Assignment: organization-defined procedures] to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.
IR-9 (3)
(CCI-002818)
The organization implements organization-defined procedures to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.
IR-9 (3)
(CCI-002819)
The organization defines procedures to implement to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.
EXPOSURE TO UNAUTHORIZED PERSONNEL
IR-9 (4) The organization employs [Assignment: organization-defined security safeguards] for personnel exposed to information not within assigned access authorizations.
IR-9 (4)
(CCI-002820)
The organization employs organization-defined security safeguards for personnel exposed to information not within assigned access authorizations.
IR-9 (4)
(CCI-002821)
The organization defines security safeguards to employ for personnel exposed to information not within assigned access authorizations.
IR-10 INCIDENT RESPONSE : INTEGRATED INFORMATION SECURITY ANALYSIS TEAM
IR-10 The organization establishes an integrated team of forensic/malicious code analysts, tool developers, and real-time operations personnel.
IR-10
(CCI-002822)
The organization establishes an integrated team of forensic/malicious code analysts, tool developers, and real-time operations personnel.
MA-1 MAINTENANCE : SYSTEM MAINTENANCE POLICY AND PROCEDURES
MA-1 The organization:
MA-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
MA-1a.1. A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
MA-1 a 1
(CCI-000852)
The organization develops and documents a system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
MA-1 a 1
(CCI-000853)
The organization disseminates to organization-defined personnel or roles a system maintenance policy.
MA-1 a 1
(CCI-002861)
The organization defines the personnel or roles to whom a system maintenance policy is disseminated.
MA-1a.2. Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and
MA-1 a 2
(CCI-000855)
The organization develops and documents procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
MA-1 a 2
(CCI-000856)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls.
MA-1 a 2
(CCI-002862)
The organization defines the personnel or roles to whom system maintenance procedures are to be disseminated.
MA-1b. Reviews and updates the current:
MA-1b.1. System maintenance policy [Assignment: organization-defined frequency]; and
MA-1 b 1
(CCI-000854)
The organization reviews and updates the current system maintenance policy in accordance with organization-defined frequency.
MA-1 b 1
(CCI-000851)
The organization defines the frequency with which to review and update the current system maintenance policy.
MA-1b.2. System maintenance procedures [Assignment: organization-defined frequency].
MA-1 b 2
(CCI-001628)
The organization defines a frequency with which to review and update the current system maintenance procedures.
MA-1 b 2
(CCI-000857)
The organization reviews and updates the current system maintenance procedures in accordance with organization-defined frequency.
MA-2 MAINTENANCE : CONTROLLED MAINTENANCE
MA-2 The organization:
MA-2a. Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
MA-2 a
(CCI-002866)
The organization schedules maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002868)
The organization documents maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002869)
The organization reviews records of maintenance on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002870)
The organization schedules repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002871)
The organization performs repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002872)
The organization documents repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2 a
(CCI-002873)
The organization reviews records of repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements.
MA-2b. Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;
MA-2 b
(CCI-000859)
The organization approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location.
MA-2c. Requires that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
MA-2 c
(CCI-000860)
The organization requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
MA-2 c
(CCI-002874)
The organization defines the personnel or roles who can explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs.
MA-2d. Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
MA-2 d
(CCI-000861)
The organization sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs.
MA-2e. Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and
MA-2 e
(CCI-000862)
The organization checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions.
MA-2f. Includes [Assignment: organization-defined maintenance-related information] in organizational maintenance records.
MA-2 f
(CCI-002875)
The organization includes organization-defined maintenance-related information in organizational maintenance records.
MA-2 f
(CCI-002876)
The organization defines the maintenance-related information to include in organizational maintenance records.
RECORD CONTENT
MA-2 (1) [Withdrawn: Incorporated into MA-2].
AUTOMATED MAINTENANCE ACTIVITIES
MA-2 (2) The organization:
MA-2 (2)(a) Employs automated mechanisms to schedule, conduct, and document maintenance and repairs; and
MA-2 (2) (a)
(CCI-002863)
The organization employs automated mechanisms to schedule, conduct, and document repairs.
MA-2 (2) (a)
(CCI-002905)
The organization employs automated mechanisms to schedule, conduct, and document maintenance.
MA-2 (2)(b) Produces up-to date, accurate, and complete records of all maintenance and repair actions requested, scheduled, in process, and completed.
MA-2 (2) (b)
(CCI-002864)
The organization produces up-to date, accurate, and complete records of all maintenance requested, scheduled, in process, and completed.
MA-2 (2) (b)
(CCI-002865)
The organization produces up-to date, accurate, and complete records of all repair actions requested, scheduled, in process, and completed.
MA-3 MAINTENANCE : MAINTENANCE TOOLS
MA-3 The organization approves, controls, and monitors information system maintenance tools.
MA-3
(CCI-000865)
The organization approves information system maintenance tools.
MA-3
(CCI-000866)
The organization controls information system maintenance tools.
MA-3
(CCI-000867)
The organization monitors information system maintenance tools.
INSPECT TOOLS
MA-3 (1) The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.
MA-3 (1)
(CCI-000869)
The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.
INSPECT MEDIA
MA-3 (2) The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.
MA-3 (2)
(CCI-000870)
The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.
PREVENT UNAUTHORIZED REMOVAL
MA-3 (3) The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:
MA-3 (3)
(CCI-000871)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by: (a) verifying that there is no organizational information contained on the equipment; (b) sanitizing or destroying the equipment; (c) retaining the equipment within the facility; or (d) obtaining an exemption from organization-defined personnel or roles explicitly authorizing removal of the equipment from the facility.
MA-3 (3)(a) Verifying that there is no organizational information contained on the equipment;
MA-3 (3) (a)
(CCI-002877)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by verifying that there is no organizational information contained on the equipment.
MA-3 (3)(b) Sanitizing or destroying the equipment;
MA-3 (3) (b)
(CCI-002878)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by sanitizing or destroying the equipment.
MA-3 (3)(c) Retaining the equipment within the facility; or
MA-3 (3) (c)
(CCI-002879)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by retaining the equipment within the facility.
MA-3 (3) (c)
(CCI-002880)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by retaining the equipment within the facility.
MA-3 (3)(d) Obtaining an exemption from [Assignment: organization-defined personnel or roles] explicitly authorizing removal of the equipment from the facility.
MA-3 (3) (d)
(CCI-002881)
The organization prevents the unauthorized removal of maintenance equipment containing organizational information by obtaining an exemption from organization-defined personnel or roles explicitly authorizing removal of the equipment from the facility.
MA-3 (3) (d)
(CCI-002882)
The organization defines the personnel or roles who can provide an exemption that explicitly authorizes removal of equipment from the facility.
RESTRICTED TOOL USE
MA-3 (4) The information system restricts the use of maintenance tools to authorized personnel only.
MA-3 (4)
(CCI-002883)
The information system restricts the use of maintenance tools to authorized personnel only.
MA-4 MAINTENANCE : NONLOCAL MAINTENANCE
MA-4 The organization:
MA-4a. Approves and monitors nonlocal maintenance and diagnostic activities;
MA-4 a
(CCI-000873)
The organization approves nonlocal maintenance and diagnostic activities.
MA-4 a
(CCI-000874)
The organization monitors nonlocal maintenance and diagnostic activities.
MA-4b. Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;
MA-4 b
(CCI-000876)
The organization allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system.
MA-4c. Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;
MA-4 c
(CCI-000877)
The organization employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions.
MA-4d. Maintains records for nonlocal maintenance and diagnostic activities; and
MA-4 d
(CCI-000878)
The organization maintains records for nonlocal maintenance and diagnostic activities.
MA-4e. Terminates session and network connections when nonlocal maintenance is completed.
MA-4 e
(CCI-000879)
The organization terminates sessions and network connections when nonlocal maintenance is completed.
AUDITING AND REVIEW
MA-4 (1) The organization:
MA-4 (1)(a) Audits nonlocal maintenance and diagnostic sessions [Assignment: organization-defined audit events]; and
MA-4 (1) (a)
(CCI-002884)
The organization audits nonlocal maintenance and diagnostic sessions' organization-defined audit events.
MA-4 (1) (a)
(CCI-002885)
The organization defines the nonlocal maintenance and diagnostic session audit events to audit.
MA-4 (1)(b) Reviews the records of the maintenance and diagnostic sessions.
MA-4 (1) (b)
(CCI-002886)
The organization reviews the records of the nonlocal maintenance and diagnostic sessions.
DOCUMENT NONLOCAL MAINTENANCE
MA-4 (2) The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.
MA-4 (2)
(CCI-000881)
The organization documents, in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.
COMPARABLE SECURITY / SANITIZATION
MA-4 (3) The organization:
MA-4 (3)(a) Requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced; or
MA-4 (3) (a)
(CCI-000882)
The organization requires that nonlocal maintenance and diagnostic services be performed from an information system that implements a security capability comparable to the capability implemented on the system being serviced.
MA-4 (3)(b) Removes the component to be serviced from the information system and prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system.
MA-4 (3) (b)
(CCI-001631)
The organization, before removal from organizational facilities, and after the service is performed, inspects and sanitizes the component (with regard to potentially malicious software) before reconnecting the component to the information system.
MA-4 (3) (b)
(CCI-000883)
The organization removes the component to be serviced from the information system and prior to nonlocal maintenance or diagnostic services, sanitizes the component (with regard to organizational information) before removal from organizational facilities.
AUTHENTICATION / SEPARATION OF MAINTENANCE SESSIONS
MA-4 (4) The organization protects nonlocal maintenance sessions by:
MA-4 (4)(a) Employing [Assignment: organization-defined authenticators that are replay resistant]; and
MA-4 (4) (a)
(CCI-000884)
The organization protects nonlocal maintenance sessions by employing organization-defined authenticators that are replay resistant.
MA-4 (4) (a)
(CCI-002887)
The organization defines the authenticators that are replay resistant which will be employed to protect nonlocal maintenance sessions.
MA-4 (4)(b) Separating the maintenance sessions from other network sessions with the information system by either:
MA-4 (4) (b)
(CCI-001632)
The organization protects nonlocal maintenance sessions by separating the maintenance session from other network sessions with the information system by either physically separated communications paths or logically separated communications paths based upon encryption.
MA-4 (4)(b)(1) Physically separated communications paths; or
MA-4 (4)(b)(2) Logically separated communications paths based upon encryption.
APPROVALS AND NOTIFICATIONS
MA-4 (5) The organization:
MA-4 (5)(a) Requires the approval of each nonlocal maintenance session by [Assignment: organization-defined personnel or roles]; and
MA-4 (5) (a)
(CCI-000887)
The organization requires the approval of each nonlocal maintenance session by organization-defined personnel or roles.
MA-4 (5) (a)
(CCI-002888)
The organization defines the personnel or roles authorized to approve each nonlocal maintenance session.
MA-4 (5)(b) Notifies [Assignment: organization-defined personnel or roles] of the date and time of planned nonlocal maintenance.
MA-4 (5) (b)
(CCI-000886)
The organization defines the personnel or roles to be notified of the date and time of planned nonlocal maintenance.
MA-4 (5) (b)
(CCI-002889)
The organization notifies organization-defined personnel or roles of the date and time of planned nonlocal maintenance.
CRYPTOGRAPHIC PROTECTION
MA-4 (6) The information system implements cryptographic mechanisms to protect the integrity and confidentiality of nonlocal maintenance and diagnostic communications.
MA-4 (6)
(CCI-002890)
The information system implements cryptographic mechanisms to protect the integrity of nonlocal maintenance and diagnostic communications.
MA-4 (6)
(CCI-003123)
The information system implements cryptographic mechanisms to protect the confidentiality of nonlocal maintenance and diagnostic communications.
REMOTE DISCONNECT VERIFICATION
MA-4 (7) The information system implements remote disconnect verification at the termination of nonlocal maintenance and diagnostic sessions.
MA-4 (7)
(CCI-002891)
The information system implements remote disconnect verification at the termination of nonlocal maintenance and diagnostic sessions.
MA-5 MAINTENANCE : MAINTENANCE PERSONNEL
MA-5 The organization:
MA-5a. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
MA-5 a
(CCI-000890)
The organization establishes a process for maintenance personnel authorization.
MA-5 a
(CCI-000891)
The organization maintains a list of authorized maintenance organizations or personnel.
MA-5b. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
MA-5 b
(CCI-002894)
The organization ensures that non-escorted personnel performing maintenance on the information system have required access authorizations.
MA-5c. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
MA-5 c
(CCI-002895)
The organization designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
INDIVIDUALS WITHOUT APPROPRIATE ACCESS
MA-5 (1) The organization:
MA-5 (1)(a) Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
MA-5 (1) (a)
(CCI-000893)
The organization implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens.
MA-5 (1)(a)(1) Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;
MA-5 (1) (a) (1)
(CCI-000894)
The organization requires maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals to be escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified.
MA-5 (1)(a)(2) Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and
MA-5 (1) (a) (2)
(CCI-000895)
The organization requires that, prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system be sanitized and all nonvolatile storage media be removed or physically disconnected from the system and secured.
MA-5 (1)(b) Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.
MA-5 (1) (b)
(CCI-002892)
The organization develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.
SECURITY CLEARANCES FOR CLASSIFIED SYSTEMS
MA-5 (2) The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information possess security clearances and formal access approvals for at least the highest classification level and for all compartments of information on the system.
MA-5 (2)
(CCI-000897)
The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information possess security clearances and formal access approvals for at least the highest classification level and for all compartments of information on the system.
CITIZENSHIP REQUIREMENTS FOR CLASSIFIED SYSTEMS
MA-5 (3) The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information are U.S. citizens.
MA-5 (3)
(CCI-000898)
The organization ensures that personnel performing maintenance and diagnostic activities on an information system processing, storing, or transmitting classified information are U.S. citizens.
FOREIGN NATIONALS
MA-5 (4) The organization ensures that:
MA-5 (4)(a) Cleared foreign nationals (i.e., foreign nationals with appropriate security clearances), are used to conduct maintenance and diagnostic activities on classified information systems only when the systems are jointly owned and operated by the United States and foreign allied governments, or owned and operated solely by foreign allied governments; and
MA-5 (4) (a)
(CCI-000899)
The organization ensures that cleared foreign nationals (i.e., foreign nationals with appropriate security clearances) are used to conduct maintenance and diagnostic activities on classified information systems only when the systems are jointly owned and operated by the United States and foreign allied governments, or owned and operated solely by foreign allied governments.
MA-5 (4)(b) Approvals, consents, and detailed operational conditions regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified information systems are fully documented within Memoranda of Agreements.
MA-5 (4) (b)
(CCI-000900)
The organization ensures that approvals, consents, and detailed operational conditions regarding the use of foreign nationals to conduct maintenance and diagnostic activities on classified information systems are fully documented within Memoranda of Agreements.
NONSYSTEM-RELATED MAINTENANCE
MA-5 (5) The organization ensures that non-escorted personnel performing maintenance activities not directly associated with the information system but in the physical proximity of the system, have required access authorizations.
MA-5 (5)
(CCI-002893)
The organization ensures that non-escorted personnel performing maintenance activities not directly associated with the information system but in the physical proximity of the system, have required access authorization.
MA-6 MAINTENANCE : TIMELY MAINTENANCE
MA-6 The organization obtains maintenance support and/or spare parts for [Assignment: organization-defined information system components] within [Assignment: organization-defined time period] of failure.
MA-6
(CCI-000903)
The organization obtains maintenance support and/or spare parts for organization-defined information system components within an organization-defined time period of failure.
MA-6
(CCI-002896)
The organization defines the information system components for which it obtains maintenance support and/or spare parts.
MA-6
(CCI-002897)
The organization defines a time period for obtaining maintenance support and/or spare parts for organization-defined information system components after a failure.
PREVENTIVE MAINTENANCE
MA-6 (1) The organization performs preventive maintenance on [Assignment: organization-defined information system components] at [Assignment: organization-defined time intervals].
MA-6 (1)
(CCI-002898)
The organization performs preventive maintenance on organization-defined information system components at organization-defined time intervals.
MA-6 (1)
(CCI-002899)
The organization defines information system components on which to perform preventive maintenance.
MA-6 (1)
(CCI-002900)
The organization defines time intervals at which to perform preventive maintenance on organization-defined information system components.
PREDICTIVE MAINTENANCE
MA-6 (2) The organization performs predictive maintenance on [Assignment: organization-defined information system components] at [Assignment: organization-defined time intervals].
MA-6 (2)
(CCI-002901)
The organization performs predictive maintenance on organization-defined information system components at organization-defined intervals.
MA-6 (2)
(CCI-002902)
The organization defines information system components on which to perform predictive maintenance.
MA-6 (2)
(CCI-002903)
The organization defines time intervals at which to perform predictive maintenance on organization-defined information system components.
AUTOMATED SUPPORT FOR PREDICTIVE MAINTENANCE
MA-6 (3) The organization employs automated mechanisms to transfer predictive maintenance data to a computerized maintenance management system.
MA-6 (3)
(CCI-002904)
The organization employs automated mechanisms to transfer predictive maintenance data to a computerized maintenance management system.
MP-1 MEDIA PROTECTION : MEDIA PROTECTION POLICY AND PROCEDURES
MP-1 The organization:
MP-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
MP-1a.1. A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
MP-1 a 1
(CCI-000995)
The organization develops and documents a media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
MP-1 a 1
(CCI-000996)
The organization disseminates to organization-defined personnel or roles a media protection policy.
MP-1 a 1
(CCI-002566)
The organization defines personnel or roles to whom a documented media protection policy and procedures will be disseminated.
MP-1a.2. Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and
MP-1 a 2
(CCI-000999)
The organization develops and documents procedures to facilitate the implementation of the media protection policy and associated media protection controls.
MP-1 a 2
(CCI-001000)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the media protection policy and associated media protection controls.
MP-1b. Reviews and updates the current:
MP-1b.1. Media protection policy [Assignment: organization-defined frequency]; and
MP-1 b 1
(CCI-000997)
The organization reviews and updates the current media protection policy in accordance with organization-defined frequency.
MP-1 b 1
(CCI-000998)
The organization defines a frequency for reviewing and updating the current media protection policy.
MP-1b.2. Media protection procedures [Assignment: organization-defined frequency].
MP-1 b 2
(CCI-001001)
The organization reviews and updates the current media protection procedures in accordance with organization-defined frequency.
MP-1 b 2
(CCI-001002)
The organization defines a frequency for reviewing and updating the current media protection procedures.
MP-2 MEDIA PROTECTION : MEDIA ACCESS
MP-2 The organization restricts access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organization-defined personnel or roles].
MP-2
(CCI-001003)
The organization restricts access to organization-defined types of digital and/or non-digital media to organization-defined personnel or roles.
MP-2
(CCI-001004)
The organization defines types of digital and/or non-digital media for which the organization restricts access.
MP-2
(CCI-001005)
The organization defines personnel or roles from which to restrict access to organization-defined types of digital and/or non-digital media.
AUTOMATED RESTRICTED ACCESS
MP-2 (1) [Withdrawn: Incorporated into MP-4 (2)].
CRYPTOGRAPHIC PROTECTION
MP-2 (2) [Withdrawn: Incorporated into SC-28 (1)].
MP-3 MEDIA PROTECTION : MEDIA MARKING
MP-3 The organization:
MP-3a. Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and
MP-3 a
(CCI-001010)
The organization marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information.
MP-3b. Exempts [Assignment: organization-defined types of information system media] from marking as long as the media remain within [Assignment: organization-defined controlled areas].
MP-3 b
(CCI-001011)
The organization exempts organization-defined types of information system media from marking as long as the media remain within organization-defined controlled areas.
MP-3 b
(CCI-001012)
The organization defines types of information system media to exempt from marking as long as the media remain within organization-defined controlled areas.
MP-3 b
(CCI-001013)
The organization defines controlled areas where organization-defined types of information system media are exempt from being marked.
MP-4 MEDIA PROTECTION : MEDIA STORAGE
MP-4 The organization:
MP-4a. Physically controls and securely stores [Assignment: organization-defined types of digital and/or non-digital media] within [Assignment: organization-defined controlled areas]; and
MP-4 a
(CCI-001014)
The organization physically controls and securely stores organization-defined types of digital and/or non-digital media within organization-defined controlled areas.
MP-4 a
(CCI-001015)
The organization defines types of digital and/or non-digital media to physically control and securely store within organization-defined controlled areas.
MP-4 a
(CCI-001016)
The organization defines controlled areas where organization-defined types of digital and/or non-digital media are physically controlled and securely stored.
MP-4b. Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
MP-4 b
(CCI-001018)
The organization protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
CRYPTOGRAPHIC PROTECTION
MP-4 (1) [Withdrawn: Incorporated into SC-28 (1)].
AUTOMATED RESTRICTED ACCESS
MP-4 (2) The organization employs automated mechanisms to restrict access to media storage areas and to audit access attempts and access granted.
MP-4 (2)
(CCI-001007)
The organization employs automated mechanisms to restrict access to media storage areas.
MP-4 (2)
(CCI-001008)
The organization employs automated mechanisms to audit access attempts and access granted to media storage areas.
MP-5 MEDIA PROTECTION : MEDIA TRANSPORT
MP-5 The organization:
MP-5a. Protects and controls [Assignment: organization-defined types of information system media] during transport outside of controlled areas using [Assignment: organization-defined security safeguards];
MP-5 a
(CCI-001020)
The organization protects and controls organization-defined types of information system media during transport outside of controlled areas using organization-defined security safeguards.
MP-5 a
(CCI-001021)
The organization defines types of information system media protected and controlled during transport outside of controlled areas.
MP-5 a
(CCI-001022)
The organization defines security safeguards to be used to protect and control organization-defined types of information system media during transport outside of controlled areas.
MP-5b. Maintains accountability for information system media during transport outside of controlled areas;
MP-5 b
(CCI-001023)
The organization maintains accountability for information system media during transport outside of controlled areas.
MP-5c. Documents activities associated with the transport of information system media; and
MP-5 c
(CCI-001025)
The organization documents activities associated with the transport of information system media.
MP-5d. Restricts the activities associated with the transport of information system media to authorized personnel.
MP-5 d
(CCI-001024)
The organization restricts the activities associated with the transport of information system media to authorized personnel.
PROTECTION OUTSIDE OF CONTROLLED AREAS
MP-5 (1) [Withdrawn: Incorporated into MP-5].
DOCUMENTATION OF ACTIVITIES
MP-5 (2) [Withdrawn: Incorporated into MP-5].
CUSTODIANS
MP-5 (3) The organization employs an identified custodian during transport of information system media outside of controlled areas.
MP-5 (3)
(CCI-001026)
The organization employs an identified custodian during transport of information system media outside of controlled areas.
CRYPTOGRAPHIC PROTECTION
MP-5 (4) The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.
MP-5 (4)
(CCI-001027)
The information system implements cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.
MP-6 MEDIA PROTECTION : MEDIA SANITIZATION
MP-6 The organization:
MP-6a. Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and
MP-6 a
(CCI-001028)
The organization sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
MP-6 a
(CCI-002578)
The organization defines information system media to sanitize prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques and procedures in accordance with applicable federal and organizational standards and policies.
MP-6 a
(CCI-002579)
The organization defines the sanitization techniques and procedures to be used to sanitize organization-defined information system media prior to disposal, release out of organizational control, or release for reuse in accordance with applicable federal and organization standards and policies.
MP-6b. Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
MP-6 b
(CCI-002580)
The organization employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
REVIEW / APPROVE / TRACK / DOCUMENT / VERIFY
MP-6 (1) The organization reviews, approves, tracks, documents, and verifies media sanitization and disposal actions.
MP-6 (1)
(CCI-002567)
The organization reviews and approves media sanitization.
MP-6 (1)
(CCI-002568)
The organization tracks and documents media sanitization.
MP-6 (1)
(CCI-002569)
The organization verifies media sanitization.
MP-6 (1)
(CCI-002570)
The organization reviews and approves media disposal actions.
MP-6 (1)
(CCI-002571)
The organization tracks and documents media disposal actions.
MP-6 (1)
(CCI-002572)
The organization verifies media disposal actions.
EQUIPMENT TESTING
MP-6 (2) The organization tests sanitization equipment and procedures [Assignment: organization-defined frequency] to verify that the intended sanitization is being achieved.
MP-6 (2)
(CCI-001030)
The organization tests sanitization equipment and procedures in accordance with the organization-defined frequency to verify that the intended sanitization is being achieved.
MP-6 (2)
(CCI-001031)
The organization defines a frequency for testing sanitization equipment and procedures to verify that the intended sanitization is being achieved.
NONDESTRUCTIVE TECHNIQUES
MP-6 (3) The organization applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system under the following circumstances: [Assignment: organization-defined circumstances requiring sanitization of portable storage devices].
MP-6 (3)
(CCI-001032)
The organization applies nondestructive sanitization techniques to portable storage devices prior to connecting such devices to the information system in accordance with organization-defined circumstances requiring sanitization of portable storage devices.
MP-6 (3)
(CCI-001033)
The organization defines circumstances requiring sanitization of portable storage devices prior to connecting such devices to the information system.
CONTROLLED UNCLASSIFIED INFORMATION
MP-6 (4) [Withdrawn: Incorporated into MP-6].
CLASSIFIED INFORMATION
MP-6 (5) [Withdrawn: Incorporated into MP-6].
MEDIA DESTRUCTION
MP-6 (6) [Withdrawn: Incorporated into MP-6].
DUAL AUTHORIZATION
MP-6 (7) The organization enforces dual authorization for the sanitization of [Assignment: organization-defined information system media].
MP-6 (7)
(CCI-002573)
The organization enforces dual authorization for the sanitization of organization-defined information system media.
MP-6 (7)
(CCI-002574)
The organization defines the information system media that dual authorization is enforced for sanitization.
REMOTE PURGING / WIPING OF INFORMATION
MP-6 (8) The organization provides the capability to purge/wipe information from [Assignment: organization-defined information systems, system components, or devices] either remotely or under the following conditions: [Assignment: organization-defined conditions].
MP-6 (8)
(CCI-002575)
The organization defines information systems, system components, or devices from which information is to be purged/wiped, either remotely or under the organization-defined conditions.
MP-6 (8)
(CCI-002576)
The organization defines conditions under which information from organization-defined information systems, system components, or devices should be purged/wiped.
MP-6 (8)
(CCI-002577)
The organization provides the capability to purge/wipe information from organization-defined information systems, system components, or devices either remotely or under organization-defined conditions.
MP-7 MEDIA PROTECTION : MEDIA USE
MP-7 The organization [Selection: restricts; prohibits] the use of [Assignment: organization-defined types of information system media] on [Assignment: organization-defined information systems or system components] using [Assignment: organization-defined security safeguards].
MP-7
(CCI-002581)
The organization defines the types of information system media to restrict or prohibit on organization-defined information systems or system components using organization-defined security safeguards.
MP-7
(CCI-002582)
The organization defines the information systems or system components on which to restrict or prohibit the use of organization-defined types of information system media using organization-defined security safeguards.
MP-7
(CCI-002583)
The organization defines the security safeguards to use for restricting or prohibiting the use of organization-defined types of information system media on organization-defined information systems or system components.
MP-7
(CCI-002584)
The organization restricts or prohibits the use of organization-defined types of information system media on organization-defined information systems or system components using organization-defined security safeguards.
PROHIBIT USE WITHOUT OWNER
MP-7 (1) The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.
MP-7 (1)
(CCI-002585)
The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.
PROHIBIT USE OF SANITIZATION-RESISTANT MEDIA
MP-7 (2) The organization prohibits the use of sanitization-resistant media in organizational information systems.
MP-7 (2)
(CCI-002586)
The organization prohibits the use of sanitization-resistant media in organizational information systems.
MP-8 MEDIA PROTECTION : MEDIA DOWNGRADING
MP-8 The organization:
MP-8a. Establishes [Assignment: organization-defined information system media downgrading process] that includes employing downgrading mechanisms with [Assignment: organization-defined strength and integrity];
MP-8 a
(CCI-002595)
The organization establishes an organization-defined information system media downgrading process that includes employing downgrading mechanisms with organization-defined strength and integrity.
MP-8 a
(CCI-002596)
The organization establishes and defines an information system media downgrading process that includes employing downgrading mechanisms with organization-defined strength and integrity.
MP-8 a
(CCI-002597)
The organization defines strength and integrity for downgrading mechanisms to establish an organization-defined information system media downgrading process.
MP-8b. Ensures that the information system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information;
MP-8 b
(CCI-002598)
The organization ensures that the information system media downgrading process is commensurate with the security category and/or classification level of the information to be removed and the access authorizations of the potential recipients of the downgraded information.
MP-8c. Identifies [Assignment: organization-defined information system media requiring downgrading]; and
MP-8 c
(CCI-002599)
The organization defines and identifies the information system media requiring downgrading.
MP-8d. Downgrades the identified information system media using the established process.
MP-8 d
(CCI-002600)
The organization downgrades the identified information system media using the established process.
DOCUMENTATION OF PROCESS
MP-8 (1) The organization documents information system media downgrading actions.
MP-8 (1)
(CCI-002587)
The organization documents information system media downgrading actions.
EQUIPMENT TESTING
MP-8 (2) The organization employs [Assignment: organization-defined tests] of downgrading equipment and procedures to verify correct performance [Assignment: organization-defined frequency].
MP-8 (2)
(CCI-002588)
The organization employs organization-defined tests of downgrading equipment in accordance with organization-defined frequency.
MP-8 (2)
(CCI-002589)
The organization employs procedures to verify correct performance of organization-defined tests of downgrading equipment in accordance with organization-defined frequency.
MP-8 (2)
(CCI-002590)
The organization defines tests to employ for downgrading equipment.
MP-8 (2)
(CCI-002591)
The organization defines the frequency with which to employ tests of downgrading equipment and procedures to verify correct performance.
CONTROLLED UNCLASSIFIED INFORMATION
MP-8 (3) The organization downgrades information system media containing [Assignment: organization-defined Controlled Unclassified Information (CUI)] prior to public release in accordance with applicable federal and organizational standards and policies.
MP-8 (3)
(CCI-002592)
The organization defines Controlled Unclassified Information (CUI).
MP-8 (3)
(CCI-002593)
The organization downgrades information system media containing organization-defined Controlled Unclassified Information (CUI) prior to public release in accordance with applicable federal and organizational standards and policies.
CLASSIFIED INFORMATION
MP-8 (4) The organization downgrades information system media containing classified information prior to release to individuals without required access authorizations in accordance with NSA standards and policies.
MP-8 (4)
(CCI-002594)
The organization downgrades information system media containing classified information prior to release to individuals without required access authorizations in accordance with NSA standards and policies.
PE-1 PHYSICAL AND ENVIRONMENTAL PROTECTION : PHYSICAL AND ENVIRONMENTAL PROTECTION POLICY AND PROCEDURES
PE-1 The organization:
PE-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
PE-1a.1. A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
PE-1 a 1
(CCI-000904)
The organization develops and documents a physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
PE-1 a 1
(CCI-000905)
The organization disseminates a physical and environmental protection policy to organization-defined personnel or roles.
PE-1 a 1
(CCI-002908)
The organization defines the personnel or roles to whom a physical and environmental protection policy is disseminated.
PE-1a.2. Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and
PE-1 a 2
(CCI-000908)
The organization develops and documents procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls.
PE-1 a 2
(CCI-000909)
The organization disseminates physical and environmental protection procedures to organization-defined personnel or roles.
PE-1 a 2
(CCI-002909)
The organization defines the personnel or roles to whom the physical and environmental protection procedures are disseminated.
PE-1b. Reviews and updates the current:
PE-1b.1. Physical and environmental protection policy [Assignment: organization-defined frequency]; and
PE-1 b 1
(CCI-000906)
The organization reviews and updates the current physical and environmental protection policy in accordance with organization-defined frequency.
PE-1 b 1
(CCI-000907)
The organization defines the frequency with which to review and update the physical and environmental protection policy.
PE-1b.2. Physical and environmental protection procedures [Assignment: organization-defined frequency].
PE-1 b 2
(CCI-000910)
The organization reviews and updates the current physical and environmental protection procedures in accordance with organization-defined frequency.
PE-1 b 2
(CCI-000911)
The organization defines the frequency with which to review and update the physical and environmental protection procedures.
PE-2 PHYSICAL AND ENVIRONMENTAL PROTECTION : PHYSICAL ACCESS AUTHORIZATIONS
PE-2 The organization:
PE-2a. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
PE-2 a
(CCI-000912)
The organization develops a list of individuals with authorized access to the facility where the information system resides.
PE-2 a
(CCI-002910)
The organization approves a list of individuals with authorized access to the facility where the information system resides.
PE-2 a
(CCI-002911)
The organization maintains a list of individuals with authorized access to the facility where the information system resides.
PE-2b. Issues authorization credentials for facility access;
PE-2 b
(CCI-000913)
The organization issues authorization credentials for facility access.
PE-2c. Reviews the access list detailing authorized facility access by individuals [Assignment: organization-defined frequency]; and
PE-2 c
(CCI-000914)
The organization reviews the access list detailing authorized facility access by individuals in accordance with organization-defined frequency.
PE-2 c
(CCI-000915)
The organization defines the frequency with which to review the access list detailing authorized facility access by individuals.
PE-2d. Removes individuals from the facility access list when access is no longer required.
PE-2 d
(CCI-001635)
The organization removes individuals from the facility access list when access is no longer required.
ACCESS BY POSITION / ROLE
PE-2 (1) The organization authorizes physical access to the facility where the information system resides based on position or role.
PE-2 (1)
(CCI-000916)
The organization authorizes physical access to the facility where the information system resides based on position or role.
TWO FORMS OF IDENTIFICATION
PE-2 (2) The organization requires two forms of identification from [Assignment: organization-defined list of acceptable forms of identification] for visitor access to the facility where the information system resides.
PE-2 (2)
(CCI-000917)
The organization requires two forms of identification from an organization-defined list of acceptable forms of identification for visitor access to the facility where the information system resides.
PE-2 (2)
(CCI-002912)
The organization defines a list of acceptable forms of identification for visitor access to the facility where the information system resides.
RESTRICT UNESCORTED ACCESS
PE-2 (3) The organization restricts unescorted access to the facility where the information system resides to personnel with [Selection (one or more): security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; [Assignment: organization-defined credentials]].
PE-2 (3)
(CCI-002913)
The organization restricts unescorted access to the facility where the information system resides to personnel with one or more of the following: security clearances for all information contained within the system; formal access authorizations for all information contained within the system; need for access to all information contained within the system; organization-defined credentials.
PE-2 (3)
(CCI-002914)
The organization defines the credentials required for personnel to have unescorted access to the facility where the information system resides.
PE-3 PHYSICAL AND ENVIRONMENTAL PROTECTION : PHYSICAL ACCESS CONTROL
PE-3 The organization:
PE-3a. Enforces physical access authorizations at [Assignment: organization-defined entry/exit points to the facility where the information system resides] by;
PE-3 a
(CCI-000919)
The organization enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides.
PE-3 a
(CCI-002915)
The organization defines the entry/exit points to the facility where the information system resides.
PE-3a.1. Verifying individual access authorizations before granting access to the facility; and
PE-3 a 1
(CCI-000920)
The organization verifies individual access authorizations before granting access to the facility.
PE-3a.2. Controlling ingress/egress to the facility using [Selection (one or more): [Assignment: organization-defined physical access control systems/devices]; guards];
PE-3 a 2
(CCI-000921)
The organization controls ingress/egress to the facility where the information system resides using one or more organization-defined physical access control systems/devices or guards.
PE-3 a 2
(CCI-002916)
The organization defines the physical access control systems/devices or guards that control ingress/egress to the facility where the information system resides.
PE-3b. Maintains physical access audit logs for [Assignment: organization-defined entry/exit points];
PE-3 b
(CCI-002917)
The organization maintains physical access audit logs for organization-defined entry/exit points to the facility where the information system resides.
PE-3 b
(CCI-002918)
The organization defines entry/exit points to the facility where the information system resides that require physical access audit logs be maintained.
PE-3c. Provides [Assignment: organization-defined security safeguards] to control access to areas within the facility officially designated as publicly accessible;
PE-3 c
(CCI-002919)
The organization provides organization-defined security safeguards to control access to areas within the facility where the information system resides officially designated as publicly accessible.
PE-3 c
(CCI-002920)
The organization defines security safeguards to control access to areas within the facility where the information system resides officially designated as publicly accessible.
PE-3d. Escorts visitors and monitors visitor activity [Assignment: organization-defined circumstances requiring visitor escorts and monitoring];
PE-3 d
(CCI-002921)
The organization escorts visitors in the facility where the information system resides during organization-defined circumstances requiring visitor escorts.
PE-3 d
(CCI-002922)
The organization defines circumstances requiring visitor escorts in the facility where the information system resides.
PE-3 d
(CCI-002923)
The organization monitors visitor activity in the facility where the information system resides during organization-defined circumstances requiring visitor monitoring.
PE-3 d
(CCI-002924)
The organization defines circumstances requiring visitor monitoring in the facility where the information system resides.
PE-3e. Secures keys, combinations, and other physical access devices;
PE-3 e
(CCI-000923)
The organization secures keys, combinations, and other physical access devices.
PE-3f. Inventories [Assignment: organization-defined physical access devices] every [Assignment: organization-defined frequency]; and
PE-3 f
(CCI-000924)
The organization inventories organization-defined physical access devices on an organization-defined frequency.
PE-3 f
(CCI-000925)
The organization defines the frequency for conducting inventories of organization-defined physical access devices.
PE-3 f
(CCI-002925)
The organization defines the physical access devices to inventory.
PE-3g. Changes combinations and keys [Assignment: organization-defined frequency] and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
PE-3 g
(CCI-000926)
The organization changes combinations and keys in accordance with organization-defined frequency and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
PE-3 g
(CCI-000927)
The organization defines a frequency for changing combinations and keys.
INFORMATION SYSTEM ACCESS
PE-3 (1) The organization enforces physical access authorizations to the information system in addition to the physical access controls for the facility at [Assignment: organization-defined physical spaces containing one or more components of the information system].
PE-3 (1)
(CCI-000928)
The organization enforces physical access authorizations to the information system in addition to the physical access controls for the facility where the information system resides at organization-defined physical spaces containing one or more components of the information system.
PE-3 (1)
(CCI-002926)
The organization defines the physical spaces containing one or more components of the information system that require physical access authorizations and controls at the facility where the information system resides.
FACILITY / INFORMATION SYSTEM BOUNDARIES
PE-3 (2) The organization performs security checks [Assignment: organization-defined frequency] at the physical boundary of the facility or information system for unauthorized exfiltration of information or removal of information system components.
PE-3 (2)
(CCI-000929)
The organization performs security checks in accordance with organization-defined frequency at the physical boundary of the facility or information system for unauthorized exfiltration of information or removal of information system components.
PE-3 (2)
(CCI-002927)
The organization defines the frequency with which to perform security checks at the physical boundary of the facility or information system for unauthorized exfiltration of information or removal of information system components.
CONTINUOUS GUARDS / ALARMS / MONITORING
PE-3 (3) The organization employs guards and/or alarms to monitor every physical access point to the facility where the information system resides 24 hours per day, 7 days per week.
PE-3 (3)
(CCI-000930)
The organization employs guards and/or alarms to monitor every physical access point to the facility where the information system resides 24 hours per day, 7 days per week.
LOCKABLE CASINGS
PE-3 (4) The organization uses lockable physical casings to protect [Assignment: organization-defined information system components] from unauthorized physical access.
PE-3 (4)
(CCI-000931)
The organization uses lockable physical casings to protect organization-defined information system components from unauthorized physical access.
PE-3 (4)
(CCI-000932)
The organization defines information system components to be protected from unauthorized physical access using lockable physical casings.
TAMPER PROTECTION
PE-3 (5) The organization employs [Assignment: organization-defined security safeguards] to [Selection (one or more): detect; prevent] physical tampering or alteration of [Assignment: organization-defined hardware components] within the information system.
PE-3 (5)
(CCI-000933)
The organization employs organization-defined security safeguards to deter and/or prevent physical tampering or alteration of organization-defined hardware components within the information system.
PE-3 (5)
(CCI-002928)
The organization defines security safeguards to detect and prevent physical tampering or alteration of organization-defined hardware components within the information system.
PE-3 (5)
(CCI-002929)
The organization defines hardware components within the information system for which to employ organization-defined security safeguards to detect and prevent physical tampering or alteration.
FACILITY PENETRATION TESTING
PE-3 (6) The organization employs a penetration testing process that includes [Assignment: organization-defined frequency], unannounced attempts to bypass or circumvent security controls associated with physical access points to the facility.
PE-3 (6)
(CCI-000934)
The organization employs a penetration testing process that includes unannounced attempts to bypass or circumvent security controls associated with physical access points to the facility on an organization-defined frequency.
PE-3 (6)
(CCI-000935)
The organization defines the frequency of unannounced attempts to be included in a penetration testing process to bypass or circumvent security controls associated with physical access points to the facility.
PE-4 PHYSICAL AND ENVIRONMENTAL PROTECTION : ACCESS CONTROL FOR TRANSMISSION MEDIUM
PE-4 The organization controls physical access to [Assignment: organization-defined information system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security safeguards].
PE-4
(CCI-000936)
The organization controls physical access to organization-defined information system distribution and transmission lines within organizational facilities using organization-defined security safeguards.
PE-4
(CCI-002930)
The organization defines information system distribution and transmission lines within organizational facilities to control physical access to using organization-defined security safeguards.
PE-4
(CCI-002931)
The organization defines security safeguards to control physical access to organization-defined information system distribution and transmission lines within organizational facilities.
PE-5 PHYSICAL AND ENVIRONMENTAL PROTECTION : ACCESS CONTROL FOR OUTPUT DEVICES
PE-5 The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
PE-5
(CCI-000937)
The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
ACCESS TO OUTPUT BY AUTHORIZED INDIVIDUALS
PE-5 (1) The organization:
PE-5 (1)(a) Controls physical access to output from [Assignment: organization-defined output devices]; and
PE-5 (1) (a)
(CCI-002932)
The organization controls physical access to output from organization-defined output devices.
PE-5 (1) (a)
(CCI-002933)
The organization defines output devices for which physical access to output is controlled.
PE-5 (1)(b) Ensures that only authorized individuals receive output from the device.
PE-5 (1) (b)
(CCI-002934)
The organization ensures that only authorized individuals receive output from organization-defined output devices.
ACCESS TO OUTPUT BY INDIVIDUAL IDENTITY
PE-5 (2) The information system:
PE-5 (2)(a) Controls physical access to output from [Assignment: organization-defined output devices]; and
PE-5 (2) (a)
(CCI-002935)
The information system controls physical access to output from organization-defined output devices.
PE-5 (2)(b) Links individual identity to receipt of the output from the device.
PE-5 (2) (b)
(CCI-002936)
The information system links individual identity to receipt of output from organization-defined output devices.
MARKING OUTPUT DEVICES
PE-5 (3) The organization marks [Assignment: organization-defined information system output devices] indicating the appropriate security marking of the information permitted to be output from the device.
PE-5 (3)
(CCI-002937)
The organization marks organization-defined information system output devices indicating the appropriate security marking of the information permitted to be output from the device.
PE-5 (3)
(CCI-002938)
The organization defines the information system output devices marked indicating the appropriate security marking of the information permitted to be output from the device.
PE-6 PHYSICAL AND ENVIRONMENTAL PROTECTION : MONITORING PHYSICAL ACCESS
PE-6 The organization:
PE-6a. Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;
PE-6 a
(CCI-002939)
The organization monitors physical access to the facility where the information system resides to detect and respond to physical security incidents.
PE-6b. Reviews physical access logs [Assignment: organization-defined frequency] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and
PE-6 b
(CCI-000939)
The organization reviews physical access logs in accordance with organization-defined frequency.
PE-6 b
(CCI-000940)
The organization defines a frequency for reviewing physical access logs.
PE-6 b
(CCI-002940)
The organization reviews physical access logs upon occurrence of organization-defined events or potential indications of events.
PE-6 b
(CCI-002941)
The organization defines events or potential indications of events requiring review of physical access logs.
PE-6c. Coordinates results of reviews and investigations with the organizational incident response capability.
PE-6 c
(CCI-000941)
The organization coordinates results of reviews and investigations with the organization's incident response capability.
INTRUSION ALARMS / SURVEILLANCE EQUIPMENT
PE-6 (1) The organization monitors physical intrusion alarms and surveillance equipment.
PE-6 (1)
(CCI-000942)
The organization monitors physical intrusion alarms and surveillance equipment.
AUTOMATED INTRUSION RECOGNITION / RESPONSES
PE-6 (2) The organization employs automated mechanisms to recognize [Assignment: organization-defined classes/types of intrusions] and initiate [Assignment: organization-defined response actions].
PE-6 (2)
(CCI-002942)
The organization employs automated mechanisms to recognize organization-defined classes/types of intrusions.
PE-6 (2)
(CCI-002943)
The organization defines classes/types of intrusions to recognize using automated mechanisms.
PE-6 (2)
(CCI-002944)
The organization employs automated mechanisms to initiate organization-defined response actions to organization-defined classes/types of intrusions.
PE-6 (2)
(CCI-002945)
The organization defines response actions to initiate when organization-defined classes/types of intrusions are recognized.
VIDEO SURVEILLANCE
PE-6 (3) The organization employs video surveillance of [Assignment: organization-defined operational areas] and retains video recordings for [Assignment: organization-defined time period].
PE-6 (3)
(CCI-002946)
The organization employs video surveillance of organization-defined operational areas.
PE-6 (3)
(CCI-002947)
The organization defines the operational areas in which to employ video surveillance.
PE-6 (3)
(CCI-002948)
The organization retains video surveillance recordings for an organization-defined time period.
PE-6 (3)
(CCI-002949)
The organization defines the time period to retain video surveillance recordings.
MONITORING PHYSICAL ACCESS TO INFORMATION SYSTEMS
PE-6 (4) The organization monitors physical access to the information system in addition to the physical access monitoring of the facility as [Assignment: organization-defined physical spaces containing one or more components of the information system].
PE-6 (4)
(CCI-002950)
The organization monitors physical access to the information system in addition to the physical access monitoring of the facility as organization-defined physical spaces containing one or more components of the information system.
PE-6 (4)
(CCI-002951)
The organization defines physical spaces containing one or more components of the information system in which physical access is monitored.
PE-7 PHYSICAL AND ENVIRONMENTAL PROTECTION : VISITOR CONTROL
PE-7 [Withdrawn: Incorporated into PE-2 and PE-3].
PE-8 PHYSICAL AND ENVIRONMENTAL PROTECTION : VISITOR ACCESS RECORDS
PE-8 The organization:
PE-8a. Maintains visitor access records to the facility where the information system resides for [Assignment: organization-defined time period]; and
PE-8 a
(CCI-000947)
The organization maintains visitor access records to the facility where the information system resides for an organization-defined time period.
PE-8 a
(CCI-002952)
The organization defines the time period to maintain visitor access records to the facility where the information system resides.
PE-8b. Reviews visitor access records [Assignment: organization-defined frequency].
PE-8 b
(CCI-000948)
The organization reviews visitor access records in accordance with organization-defined frequency.
PE-8 b
(CCI-000949)
The organization defines the frequency with which to review the visitor access records for the facility where the information system resides.
AUTOMATED RECORDS MAINTENANCE / REVIEW
PE-8 (1) The organization employs automated mechanisms to facilitate the maintenance and review of visitor access records.
PE-8 (1)
(CCI-000950)
The organization employs automated mechanisms to facilitate the maintenance and review of access records.
PHYSICAL ACCESS RECORDS
PE-8 (2) [Withdrawn: Incorporated into PE-2].
PE-9 PHYSICAL AND ENVIRONMENTAL PROTECTION : POWER EQUIPMENT AND CABLING
PE-9 The organization protects power equipment and power cabling for the information system from damage and destruction.
PE-9
(CCI-000952)
The organization protects power equipment and power cabling for the information system from damage and destruction.
REDUNDANT CABLING
PE-9 (1) The organization employs redundant power cabling paths that are physically separated by [Assignment: organization-defined distance].
PE-9 (1)
(CCI-002953)
The organization employs redundant power cabling paths that are physically separated by an organization-defined distance.
PE-9 (1)
(CCI-002954)
The organization defines the distance by which to physically separate redundant power cabling paths.
AUTOMATIC VOLTAGE CONTROLS
PE-9 (2) The organization employs automatic voltage controls for [Assignment: organization-defined critical information system components].
PE-9 (2)
(CCI-000954)
The organization employs automatic voltage controls for organization-defined critical information system components.
PE-9 (2)
(CCI-000955)
The organization defines critical information system components that require automatic voltage controls.
PE-10 PHYSICAL AND ENVIRONMENTAL PROTECTION : EMERGENCY SHUTOFF
PE-10 The organization:
PE-10a. Provides the capability of shutting off power to the information system or individual system components in emergency situations;
PE-10 a
(CCI-000956)
The organization provides the capability of shutting off power to the information system or individual system components in emergency situations.
PE-10b. Places emergency shutoff switches or devices in [Assignment: organization-defined location by information system or system component] to facilitate safe and easy access for personnel; and
PE-10 b
(CCI-000957)
The organization places emergency shutoff switches or devices in an organization-defined location by information system or system component to facilitate safe and easy access for personnel.
PE-10 b
(CCI-000958)
The organization defines a location for emergency shutoff switches or devices by information system or system component.
PE-10c. Protects emergency power shutoff capability from unauthorized activation.
PE-10 c
(CCI-000959)
The organization protects emergency power shutoff capability from unauthorized activation.
ACCIDENTAL / UNAUTHORIZED ACTIVATION
PE-10 (1) [Withdrawn: Incorporated into PE-10].
PE-11 PHYSICAL AND ENVIRONMENTAL PROTECTION : EMERGENCY POWER
PE-11 The organization provides a short-term uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the information system; transition of the information system to long-term alternate power] in the event of a primary power source loss.
PE-11
(CCI-002955)
The organization provides a short-term uninterruptible power supply to facilitate an orderly shutdown of the information system and/or transition of the information system to long-term alternate power in the event of a primary power source loss.
LONG-TERM ALTERNATE POWER SUPPLY - MINIMAL OPERATIONAL CAPABILITY
PE-11 (1) The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.
PE-11 (1)
(CCI-000961)
The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability in the event of an extended loss of the primary power source.
LONG-TERM ALTERNATE POWER SUPPLY - SELF-CONTAINED
PE-11 (2) The organization provides a long-term alternate power supply for the information system that is:
PE-11 (2)(a) Self-contained;
PE-11 (2) (a)
(CCI-002956)
The organization provides a long-term alternate power supply for the information system that is self-contained.
PE-11 (2)(b) Not reliant on external power generation; and
PE-11 (2) (b)
(CCI-002957)
The organization provides a long-term alternate power supply for the information system that is not reliant on external power generation.
PE-11 (2)(c) Capable of maintaining [Selection: minimally required operational capability; full operational capability] in the event of an extended loss of the primary power source.
PE-11 (2) (c)
(CCI-002958)
The organization provides a long-term alternate power supply for the information system that is capable of maintaining minimally required operational capability or full operational capability in the event of an extended loss of the primary power source.
PE-12 PHYSICAL AND ENVIRONMENTAL PROTECTION : EMERGENCY LIGHTING
PE-12 The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
PE-12
(CCI-000963)
The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
ESSENTIAL MISSIONS / BUSINESS FUNCTIONS
PE-12 (1) The organization provides emergency lighting for all areas within the facility supporting essential missions and business functions.
PE-12 (1)
(CCI-002959)
The organization provides emergency lighting for all areas within the facility supporting essential missions.
PE-12 (1)
(CCI-002960)
The organization provides emergency lighting for all areas within the facility supporting essential business functions.
PE-13 PHYSICAL AND ENVIRONMENTAL PROTECTION : FIRE PROTECTION
PE-13 The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
PE-13
(CCI-000965)
The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
DETECTION DEVICES / SYSTEMS
PE-13 (1) The organization employs fire detection devices/systems for the information system that activate automatically and notify [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders] in the event of a fire.
PE-13 (1)
(CCI-002961)
The organization employs fire detection devices/systems for the information system that activate automatically.
PE-13 (1)
(CCI-002962)
The organization employs fire detection devices/systems for the information system that automatically activate to notify organization-defined personnel or roles and organization-defined emergency responders in the event of a fire.
PE-13 (1)
(CCI-002963)
The organization defines the personnel or roles to be notified in the event of a fire.
PE-13 (1)
(CCI-002964)
The organization defines the emergency responders to be notified in the event of a fire.
SUPPRESSION DEVICES / SYSTEMS
PE-13 (2) The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation to Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].
PE-13 (2)
(CCI-002965)
The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation to organization-defined personnel or roles and organization-defined emergency responders.
PE-13 (2)
(CCI-002966)
The organization defines the personnel or roles to be automatically notified of any activation of fire suppression devices/systems for the information system.
PE-13 (2)
(CCI-002967)
The organization defines the emergency responders to be automatically notified of any activation of fire suppression devices/systems for the information system.
AUTOMATIC FIRE SUPPRESSION
PE-13 (3) The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.
PE-13 (3)
(CCI-000968)
The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.
INSPECTIONS
PE-13 (4) The organization ensures that the facility undergoes [Assignment: organization-defined frequency] inspections by authorized and qualified inspectors and resolves identified deficiencies within [Assignment: organization-defined time period].
PE-13 (4)
(CCI-002968)
The organization ensures that the facility undergoes, on an organization-defined frequency, fire protection inspections by authorized and qualified inspectors.
PE-13 (4)
(CCI-002969)
The organization defines a frequency with which the facility undergoes fire protection inspections.
PE-13 (4)
(CCI-002970)
The organization resolves deficiencies identified during facility fire protection inspections within an organization-defined time period.
PE-13 (4)
(CCI-002971)
The organization defines the time period within which to resolve deficiencies identified during facility fire protection inspections.
PE-14 PHYSICAL AND ENVIRONMENTAL PROTECTION : TEMPERATURE AND HUMIDITY CONTROLS
PE-14 The organization:
PE-14a. Maintains temperature and humidity levels within the facility where the information system resides at [Assignment: organization-defined acceptable levels]; and
PE-14 a
(CCI-000971)
The organization maintains temperature and humidity levels within the facility where the information system resides at organization-defined acceptable levels.
PE-14 a
(CCI-000972)
The organization defines acceptable temperature and humidity levels to be maintained within the facility where the information system resides.
PE-14b. Monitors temperature and humidity levels [Assignment: organization-defined frequency].
PE-14 b
(CCI-000973)
The organization monitors temperature and humidity levels in accordance with organization-defined frequency.
PE-14 b
(CCI-000974)
The organization defines a frequency for monitoring temperature and humidity levels.
AUTOMATIC CONTROLS
PE-14 (1) The organization employs automatic temperature and humidity controls in the facility to prevent fluctuations potentially harmful to the information system.
PE-14 (1)
(CCI-000975)
The organization employs automatic temperature and humidity controls in the facility to prevent fluctuations potentially harmful to the information system.
MONITORING WITH ALARMS / NOTIFICATIONS
PE-14 (2) The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.
PE-14 (2)
(CCI-000976)
The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.
PE-15 PHYSICAL AND ENVIRONMENTAL PROTECTION : WATER DAMAGE PROTECTION
PE-15 The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.
PE-15
(CCI-000977)
The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible.
PE-15
(CCI-000978)
The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are working properly.
PE-15
(CCI-000979)
Key personnel have knowledge of the master water shutoff or isolation valves.
AUTOMATION SUPPORT
PE-15 (1) The organization employs automated mechanisms to detect the presence of water in the vicinity of the information system and alerts [Assignment: organization-defined personnel or roles].
PE-15 (1)
(CCI-002972)
The organization employs automated mechanisms to detect the presence of water in the vicinity of the information system and alerts organization-defined personnel or roles.
PE-15 (1)
(CCI-002973)
The organization defines the personnel or roles to be alerted when automated mechanisms detect the presence of water in the vicinity of the information system.
PE-16 PHYSICAL AND ENVIRONMENTAL PROTECTION : DELIVERY AND REMOVAL
PE-16 The organization authorizes, monitors, and controls [Assignment: organization-defined types of information system components] entering and exiting the facility and maintains records of those items.
PE-16
(CCI-000981)
The organization authorizes organization-defined types of information system components entering and exiting the facility.
PE-16
(CCI-000982)
The organization monitors organization-defined types of information system components entering and exiting the facility.
PE-16
(CCI-000983)
The organization controls organization-defined types of information system components entering and exiting the facility.
PE-16
(CCI-000984)
The organization maintains records of information system components entering and exiting the facility.
PE-16
(CCI-002974)
The organization defines types of information system components to authorize, monitor, and control entering and exiting the facility and to maintain records.
PE-17 PHYSICAL AND ENVIRONMENTAL PROTECTION : ALTERNATE WORK SITE
PE-17 The organization:
PE-17a. Employs [Assignment: organization-defined security controls] at alternate work sites;
PE-17 a
(CCI-000985)
The organization employs organization-defined security controls at alternate work sites.
PE-17 a
(CCI-002975)
The organization defines security controls to employ at alternate work sites.
PE-17b. Assesses as feasible, the effectiveness of security controls at alternate work sites; and
PE-17 b
(CCI-000987)
The organization assesses as feasible, the effectiveness of security controls at alternate work sites.
PE-17c. Provides a means for employees to communicate with information security personnel in case of security incidents or problems.
PE-17 c
(CCI-000988)
The organization provides a means for employees to communicate with information security personnel in case of security incidents or problems.
PE-18 PHYSICAL AND ENVIRONMENTAL PROTECTION : LOCATION OF INFORMATION SYSTEM COMPONENTS
PE-18 The organization positions information system components within the facility to minimize potential damage from [Assignment: organization-defined physical and environmental hazards] and to minimize the opportunity for unauthorized access.
PE-18
(CCI-000989)
The organization positions information system components within the facility to minimize potential damage from organization-defined physical and environmental hazards.
PE-18
(CCI-000991)
The organization positions information system components within the facility to minimize the opportunity for unauthorized access.
PE-18
(CCI-002976)
The organization defines physical and environmental hazards that could cause potential damage to information system components within the facility.
FACILITY SITE
PE-18 (1) The organization plans the location or site of the facility where the information system resides with regard to physical and environmental hazards and for existing facilities, considers the physical and environmental hazards in its risk mitigation strategy.
PE-18 (1)
(CCI-002977)
The organization plans the location or site of the facility where the information system resides with regard to physical and environmental hazards.
PE-18 (1)
(CCI-002978)
The organization considers the physical and environmental hazards in its risk mitigation strategy for existing facilities.
PE-19 PHYSICAL AND ENVIRONMENTAL PROTECTION : INFORMATION LEAKAGE
PE-19 The organization protects the information system from information leakage due to electromagnetic signals emanations.
PE-19
(CCI-000993)
The organization protects the information system from information leakage due to electromagnetic signals emanations.
NATIONAL EMISSIONS / TEMPEST POLICIES AND PROCEDURES
PE-19 (1) The organization ensures that information system components, associated data communications, and networks are protected in accordance with national emissions and TEMPEST policies and procedures based on the security category or classification of the information.
PE-19 (1)
(CCI-000994)
The organization ensures that information system components, associated data communications, and networks are protected in accordance with national emissions and TEMPEST policies and procedures based on the security category or classification of the information.
PE-20 PHYSICAL AND ENVIRONMENTAL PROTECTION : ASSET MONITORING AND TRACKING
PE-20 The organization:
PE-20a. Employs [Assignment: organization-defined asset location technologies] to track and monitor the location and movement of [Assignment: organization-defined assets] within [Assignment: organization-defined controlled areas]; and
PE-20 a
(CCI-002979)
The organization employs organization-defined asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
PE-20 a
(CCI-002980)
The organization defines asset location technologies to track and monitor the location and movement of organization-defined assets within organization-defined controlled areas.
PE-20 a
(CCI-002981)
The organization defines the assets within the organization-defined controlled areas which are to be tracked and monitored for their location and movement.
PE-20 a
(CCI-002982)
The organization defines controlled areas where the location and movement of organization-defined assets are tracked and monitored.
PE-20b. Ensures that asset location technologies are employed in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance.
PE-20 b
(CCI-002983)
The organization ensures that asset location technologies are employed in accordance with applicable federal laws, Executive Orders, directives, regulations, policies, standards, and guidance.
PL-1 PLANNING : SECURITY PLANNING POLICY AND PROCEDURES
PL-1 The organization:
PL-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
PL-1a.1. A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
PL-1 a 1
(CCI-000563)
The organization develops and documents a security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
PL-1 a 1
(CCI-000564)
The organization disseminates a security planning policy to organization-defined personnel or roles.
PL-1 a 1
(CCI-003047)
The organization defines the personnel or roles to whom a security planning policy is disseminated.
PL-1a.2. Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and
PL-1 a 2
(CCI-000566)
The organization develops and documents procedures to facilitate the implementation of the security planning policy and associated security planning controls.
PL-1 a 2
(CCI-000567)
The organization disseminates security planning procedures to organization-defined personnel or roles.
PL-1 a 2
(CCI-003048)
The organization defines the personnel or roles to whom the security planning procedures are disseminated.
PL-1b. Reviews and updates the current:
PL-1b.1. Security planning policy [Assignment: organization-defined frequency]; and
PL-1 b 1
(CCI-001636)
The organization defines the frequency with which to review and update the current security planning policy.
PL-1 b 1
(CCI-001637)
The organization reviews and updates the current security planning policy in accordance with organization-defined frequency.
PL-1b.2. Security planning procedures [Assignment: organization-defined frequency].
PL-1 b 2
(CCI-001638)
The organization defines the frequency with which to review and update the current security planning procedures.
PL-1 b 2
(CCI-000568)
The organization reviews and updates the current security planning procedures in accordance with organization-defined frequency.
PL-2 PLANNING : SYSTEM SECURITY PLAN
PL-2 The organization:
PL-2a. Develops a security plan for the information system that:
PL-2 a
(CCI-003049)
The organization develops a security plan for the information system.
PL-2a.1. Is consistent with the organization�s enterprise architecture;
PL-2 a 1
(CCI-003050)
The organization's security plan for the information system is consistent with the organization's enterprise architecture.
PL-2a.2. Explicitly defines the authorization boundary for the system;
PL-2 a 2
(CCI-003051)
The organization's security plan for the information system explicitly defines the authorization boundary for the system.
PL-2a.3. Describes the operational context of the information system in terms of missions and business processes;
PL-2 a 3
(CCI-003052)
The organization's security plan for the information system describes the operational context of the information system in terms of missions and business processes.
PL-2a.4. Provides the security categorization of the information system including supporting rationale;
PL-2 a 4
(CCI-003053)
The organization's security plan for the information system provides the security categorization of the information system, including supporting rationale.
PL-2a.5. Describes the operational environment for the information system and relationships with or connections to other information systems;
PL-2 a 5
(CCI-003054)
The organization's security plan for the information system describes the operational environment for the information system and relationships with, or connections to, other information systems.
PL-2a.6. Provides an overview of the security requirements for the system;
PL-2 a 6
(CCI-003055)
The organization's security plan for the information system provides an overview of the security requirements for the system.
PL-2a.7. Identifies any relevant overlays, if applicable;
PL-2 a 7
(CCI-003056)
The organization's security plan for the information system identifies any relevant overlays, if applicable.
PL-2a.8. Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and
PL-2 a 8
(CCI-003057)
The organization's security plan for the information system describes the security controls in place or planned for meeting those requirements, including a rationale for the tailoring decisions.
PL-2a.9. Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;
PL-2 a 9
(CCI-000571)
The organization's security plan for the information system is reviewed and approved by the authorizing official or designated representative prior to plan implementation.
PL-2b. Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles];
PL-2 b
(CCI-003058)
The organization distributes copies of the security plan to organization-defined personnel or roles.
PL-2 b
(CCI-003059)
The organization distributes copies of the security plan to organization-defined personnel or roles.
PL-2 b
(CCI-003060)
The organization defines the personnel or roles to whom copies of the security plan are distributed.
PL-2 b
(CCI-003061)
The organization communicates subsequent changes to the security plan to organization-defined personnel or roles.
PL-2 b
(CCI-003062)
The organization defines the personnel or roles to whom changes to the security plan are communicated.
PL-2c. Reviews the security plan for the information system [Assignment: organization-defined frequency];
PL-2 c
(CCI-000572)
The organization defines the frequency for reviewing the security plan for the information system.
PL-2 c
(CCI-000573)
The organization reviews the security plan for the information system in accordance with organization-defined frequency.
PL-2d. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and
PL-2 d
(CCI-000574)
The organization updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments.
PL-2e. Protects the security plan from unauthorized disclosure and modification.
PL-2 e
(CCI-003063)
The organization protects the security plan from unauthorized disclosure.
PL-2 e
(CCI-003064)
The organization protects the security plan from unauthorized modification.
CONCEPT OF OPERATIONS
PL-2 (1) [Withdrawn: Incorporated into PL-7].
FUNCTIONAL ARCHITECTURE
PL-2 (2) [Withdrawn: Incorporated into PL-8].
PLAN / COORDINATE WITH OTHER ORGANIZATIONAL ENTITIES
PL-2 (3) The organization plans and coordinates security-related activities affecting the information system with [Assignment: organization-defined individuals or groups] before conducting such activities in order to reduce the impact on other organizational entities.
PL-2 (3)
(CCI-003065)
The organization plans and coordinates security-related activities affecting the information system with organization-defined individuals or groups before conducting such activities in order to reduce the impact on other organizational entities.
PL-2 (3)
(CCI-003066)
The organization defines the individuals or groups with whom security-related activities are planned and coordinated.
PL-2 (3)
(CCI-003067)
The organization defines the individuals or groups with whom security-related activities are planned and coordinated.
PL-3 PLANNING : SYSTEM SECURITY PLAN UPDATE
PL-3 [Withdrawn: Incorporated into PL-2].
PL-4 PLANNING : RULES OF BEHAVIOR
PL-4 The organization:
PL-4a. Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;
PL-4 a
(CCI-001639)
The organization makes readily available to individuals requiring access to the information system the rules that describe their responsibilities and expected behavior with regard to information and information system usage.
PL-4 a
(CCI-000592)
The organization establishes the rules describing the responsibilities and expected behavior, with regard to information and information system usage, for individuals requiring access to the information system.
PL-4b. Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;
PL-4 b
(CCI-000593)
The organization receives a signed acknowledgment from individuals requiring access to the information system, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system.
PL-4c. Reviews and updates the rules of behavior [Assignment: organization-defined frequency]; and
PL-4 c
(CCI-003068)
The organization reviews and updates the rules of behavior in accordance with organization-defined frequency.
PL-4 c
(CCI-003069)
The organization defines the frequency with which to review and update the rules of behavior.
PL-4d. Requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
PL-4 d
(CCI-003070)
The organization requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
SOCIAL MEDIA AND NETWORKING RESTRICTIONS
PL-4 (1) The organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites.
PL-4 (1)
(CCI-000594)
The organization includes in the rules of behavior explicit restrictions on the use of social media/networking sites.
PL-4 (1)
(CCI-000595)
The organization includes in the rules of behavior explicit restrictions on posting organizational information on public websites.
PL-5 PLANNING : PRIVACY IMPACT ASSESSMENT
PL-5 [Withdrawn: Incorporated into Appendix J, AR-2].
PL-6 PLANNING : SECURITY-RELATED ACTIVITY PLANNING
PL-6 [Withdrawn: Incorporated into PL-2].
PL-7 PLANNING : SECURITY CONCEPT OF OPERATIONS
PL-7 The organization:
PL-7a. Develops a security Concept of Operations (CONOPS) for the information system containing at a minimum, how the organization intends to operate the system from the perspective of information security; and
PL-7 a
(CCI-003071)
The organization develops a security Concept of Operations (CONOPS) for the information system containing, at a minimum, how the organization intends to operate the system from the perspective of information security.
PL-7b. Reviews and updates the CONOPS [Assignment: organization-defined frequency].
PL-7 b
(CCI-000577)
The organization defines the frequency with which to review and update the security CONOPS.
PL-7 b
(CCI-000578)
The organization reviews and updates the security CONOPS in accordance with organization-defined frequency.
PL-8 PLANNING : INFORMATION SECURITY ARCHITECTURE
PL-8 The organization:
PL-8a. Develops an information security architecture for the information system that:
PL-8 a
(CCI-003072)
The organization develops an information security architecture for the information system.
PL-8a.1. Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;
PL-8 a 1
(CCI-003073)
The organization's information security architecture for the information system describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information.
PL-8a.2. Describes how the information security architecture is integrated into and supports the enterprise architecture; and
PL-8 a 2
(CCI-003074)
The organization's information security architecture for the information system describes how the information security architecture is integrated into and supports the enterprise architecture.
PL-8a.3. Describes any information security assumptions about, and dependencies on, external services;
PL-8 a 3
(CCI-003075)
The organization's information security architecture for the information system describes any information security assumptions about, and dependencies on, external services.
PL-8b. Reviews and updates the information security architecture [Assignment: organization-defined frequency] to reflect updates in the enterprise architecture; and
PL-8 b
(CCI-003076)
The organization reviews and updates the information security architecture in accordance with organization-defined frequency to reflect updates in the enterprise architecture.
PL-8 b
(CCI-003077)
The organization defines the frequency with which to review and update the information system architecture.
PL-8c. Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements/acquisitions.
PL-8 c
(CCI-003078)
The organization ensures that planned information security architecture changes are reflected in the security plan.
PL-8 c
(CCI-003079)
The organization ensures that planned information security architecture changes are reflected in the security Concept of Operations (CONOPS).
PL-8 c
(CCI-003080)
The organization ensures that planned information security architecture changes are reflected in organizational procurements/acquisitions.
DEFENSE-IN-DEPTH
PL-8 (1) The organization designs its security architecture using a defense-in-depth approach that:
PL-8 (1)(a) Allocates [Assignment: organization-defined security safeguards] to [Assignment: organization-defined locations and architectural layers]; and
PL-8 (1) (a)
(CCI-003081)
The organization designs its security architecture using a defense-in-depth approach that allocates organization-defined security safeguards to organization-defined locations.
PL-8 (1) (a)
(CCI-003082)
The organization designs its security architecture using a defense-in-depth approach that allocates organization-defined security safeguards to organization-defined architectural layers.
PL-8 (1) (a)
(CCI-003083)
The organization defines the security safeguards to be allocated to organization-defined locations.
PL-8 (1) (a)
(CCI-003084)
The organization defines the security safeguards to be allocated to organization-defined architectural layers.
PL-8 (1) (a)
(CCI-003085)
The organization defines the locations to which it allocates organization-defined security safeguards in the security architecture.
PL-8 (1) (a)
(CCI-003086)
The organization defines the architectural layers to which it allocates organization-defined security safeguards in the security architecture.
PL-8 (1)(b) Ensures that the allocated security safeguards operate in a coordinated and mutually reinforcing manner.
PL-8 (1) (b)
(CCI-003087)
The organization designs its security architecture using a defense-in-depth approach that ensures that the allocated security safeguards operate in a coordinated and mutually reinforcing manner.
SUPPLIER DIVERSITY
PL-8 (2) The organization requires that [Assignment: organization-defined security safeguards] allocated to [Assignment: organization-defined locations and architectural layers] are obtained from different suppliers.
PL-8 (2)
(CCI-003088)
The organization requires that organization-defined security safeguards allocated to organization-defined locations and architectural layers be obtained from different suppliers.
PL-9 PLANNING : CENTRAL MANAGEMENT
PL-9 The organization centrally manages [Assignment: organization-defined security controls and related processes].
PL-9
(CCI-003117)
The organization centrally manages organization-defined security controls and related processes.
PL-9
(CCI-003118)
The organization defines security controls and related processes to be centrally managed.
PS-1 PERSONNEL SECURITY : PERSONNEL SECURITY POLICY AND PROCEDURES
PS-1 The organization:
PS-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
PS-1a.1. A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
PS-1 a 1
(CCI-001504)
The organization develops and documents a personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
PS-1 a 1
(CCI-001505)
The organization disseminates a personnel security policy to organization-defined personnel or roles.
PS-1 a 1
(CCI-003017)
The organization defines the personnel or roles to whom a personnel security policy is disseminated.
PS-1a.2. Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and
PS-1 a 2
(CCI-001509)
The organization develops and documents procedures to facilitate the implementation of the personnel security policy and associated personnel security controls.
PS-1 a 2
(CCI-001510)
The organization disseminates personnel security procedures to organization-defined personnel or roles.
PS-1 a 2
(CCI-003018)
The organization defines the personnel or roles to whom the personnel security procedures are disseminated.
PS-1b. Reviews and updates the current:
PS-1b.1. Personnel security policy [Assignment: organization-defined frequency]; and
PS-1 b 1
(CCI-001507)
The organization defines the frequency with which to review and update the current personnel security policy.
PS-1b.2. Personnel security procedures [Assignment: organization-defined frequency].
PS-1 b 2
(CCI-001506)
The organization reviews and updates the current personnel security policy in accordance with organization-defined frequency.
PS-1 b 2
(CCI-001508)
The organization defines the frequency with which to review and update the current personnel security procedures.
PS-1 b 2
(CCI-001511)
The organization reviews and updates the current personnel security procedures in accordance with organization-defined frequency.
PS-2 PERSONNEL SECURITY : POSITION RISK DESIGNATION
PS-2 The organization:
PS-2a. Assigns a risk designation to all organizational positions;
PS-2 a
(CCI-001512)
The organization assigns a risk designation to all organizational positions.
PS-2b. Establishes screening criteria for individuals filling those positions; and
PS-2 b
(CCI-001513)
The organization establishes screening criteria for individuals filling organizational positions.
PS-2c. Reviews and updates position risk designations [Assignment: organization-defined frequency].
PS-2 c
(CCI-001514)
The organization reviews and updates position risk designations in accordance with organization-defined frequency.
PS-2 c
(CCI-001515)
The organization defines the frequency with which to review and update position risk designations.
PS-3 PERSONNEL SECURITY : PERSONNEL SCREENING
PS-3 The organization:
PS-3a. Screens individuals prior to authorizing access to the information system; and
PS-3 a
(CCI-001516)
The organization screens individuals prior to authorizing access to the information system.
PS-3b. Rescreens individuals according to [Assignment: organization-defined conditions requiring rescreening and, where rescreening is so indicated, the frequency of such rescreening].
PS-3 b
(CCI-001517)
The organization rescreens individuals with authorized access to the information system according to organization-defined conditions requiring rescreening, and where rescreening is so indicated, on the organization-defined frequency of such rescreening.
PS-3 b
(CCI-001518)
The organization defines the conditions requiring rescreening of individuals with authorized access to the information system.
PS-3 b
(CCI-001519)
The organization defines the frequency for rescreening individuals with authorized access to the information system when organization-defined conditions requiring rescreening are met.
CLASSIFIED INFORMATION
PS-3 (1) The organization ensures that individuals accessing an information system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.
PS-3 (1)
(CCI-001520)
The organization ensures that individuals accessing an information system processing, storing, or transmitting classified information are cleared and indoctrinated to the highest classification level of the information to which they have access on the system.
FORMAL INDOCTRINATION
PS-3 (2) The organization ensures that individuals accessing an information system processing, storing, or transmitting types of classified information which require formal indoctrination, are formally indoctrinated for all of the relevant types of information to which they have access on the system.
PS-3 (2)
(CCI-001521)
The organization ensures that individuals accessing an information system processing, storing, or transmitting types of classified information which require formal indoctrination, are formally indoctrinated for all of the relevant types of information to which they have access on the system.
INFORMATION WITH SPECIAL PROTECTION MEASURES
PS-3 (3) The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection:
PS-3 (3)(a) Have valid access authorizations that are demonstrated by assigned official government duties; and
PS-3 (3) (a)
(CCI-003019)
The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection have valid access authorizations that are demonstrated by assigned official government duties.
PS-3 (3)(b) Satisfy [Assignment: organization-defined additional personnel screening criteria].
PS-3 (3) (b)
(CCI-003020)
The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection satisfy organization-defined additional personnel screening criteria.
PS-3 (3) (b)
(CCI-003021)
The organization defines additional personnel screening criteria that individuals accessing an information system processing, storing, or transmitting information requiring protection must satisfy.
PS-4 PERSONNEL SECURITY : PERSONNEL TERMINATION
PS-4 The organization, upon termination of individual employment:
PS-4a. Disables information system access within [Assignment: organization-defined time period];
PS-4 a
(CCI-001522)
The organization, upon termination of individual employment, disables information system access within an organization-defined time period.
PS-4 a
(CCI-003022)
The organization defines the time period within which to disable information system access upon termination of individual employment.
PS-4b. Terminates/revokes any authenticators/credentials associated with the individual;
PS-4 b
(CCI-003023)
The organization, upon termination of individual employment, terminates/revokes any authenticators/credentials associated with the individual.
PS-4c. Conducts exit interviews that include a discussion of [Assignment: organization-defined information security topics];
PS-4 c
(CCI-001523)
The organization, upon termination of individual employment, conducts exit interviews that include a discussion of organization-defined information security topics.
PS-4 c
(CCI-003024)
The organization defines information security topics to be discussed while conducting exit interviews.
PS-4d. Retrieves all security-related organizational information system-related property;
PS-4 d
(CCI-001524)
The organization, upon termination of individual employment, retrieves all security-related organizational information system-related property.
PS-4e. Retains access to organizational information and information systems formerly controlled by terminated individual; and
PS-4 e
(CCI-001525)
The organization, upon termination of individual employment, retains access to organizational information formerly controlled by the terminated individual.
PS-4 e
(CCI-001526)
The organization, upon termination of individual employment, retains access to organizational information systems formerly controlled by the terminated individual.
PS-4f. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
PS-4 f
(CCI-003016)
The organization, upon termination of individual employment, notifies organization-defined personnel or roles within an organization-defined time period.
PS-4 f
(CCI-003025)
The organization defines personnel or roles to notify upon termination of individual employment.
PS-4 f
(CCI-003026)
The organization defines the time period within which to notify organization-defined personnel or roles upon termination of individual employment.
POST-EMPLOYMENT REQUIREMENTS
PS-4 (1) The organization:
PS-4 (1)(a) Notifies terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information; and
PS-4 (1) (a)
(CCI-003027)
The organization notifies terminated individuals of applicable, legally binding post-employment requirements for the protection of organizational information.
PS-4 (1)(b) Requires terminated individuals to sign an acknowledgment of post-employment requirements as part of the organizational termination process.
PS-4 (1) (b)
(CCI-003028)
The organization requires terminated individuals to sign an acknowledgment of post-employment requirements as part of the organizational termination process.
AUTOMATED NOTIFICATION
PS-4 (2) The organization employs automated mechanisms to notify [Assignment: organization-defined personnel or roles] upon termination of an individual.
PS-4 (2)
(CCI-003029)
The organization employs automated mechanisms to notify organization-defined personnel or roles upon termination of an individual.
PS-4 (2)
(CCI-003030)
The organization defines the personnel or roles to be notified by automated mechanism upon termination of an individual.
PS-5 PERSONNEL SECURITY : PERSONNEL TRANSFER
PS-5 The organization:
PS-5a. Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization;
PS-5 a
(CCI-001527)
The organization reviews and confirms the ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization.
PS-5b. Initiates [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];
PS-5 b
(CCI-001528)
The organization initiates organization-defined transfer or reassignment actions within an organization-defined time period following the formal personnel transfer action.
PS-5 b
(CCI-001529)
The organization defines transfer or reassignment actions to initiate within an organization-defined time period following the formal personnel transfer action.
PS-5 b
(CCI-001530)
The organization defines the time period within which the organization initiates organization-defined transfer or reassignment actions following the formal personnel transfer action.
PS-5c. Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and
PS-5 c
(CCI-003031)
The organization modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer.
PS-5d. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
PS-5 d
(CCI-003032)
The organization notifies organization-defined personnel or roles within an organization-defined time period when individuals are transferred or reassigned to other positions within the organization.
PS-5 d
(CCI-003033)
The organization defines personnel or roles to be notified when individuals are transferred or reassigned to other positions within the organization.
PS-5 d
(CCI-003034)
The organization defines the time period within which organization-defined personnel or roles are to be notified when individuals are transferred or reassigned to other positions within the organization.
PS-6 PERSONNEL SECURITY : ACCESS AGREEMENTS
PS-6 The organization:
PS-6a. Develops and documents access agreements for organizational information systems;
PS-6 a
(CCI-003035)
The organization develops and documents access agreements for organizational information systems.
PS-6b. Reviews and updates the access agreements [Assignment: organization-defined frequency]; and
PS-6 b
(CCI-001532)
The organization reviews and updates access agreements for organizational information systems in accordance with organization-defined frequency.
PS-6 b
(CCI-001533)
The organization defines the frequency with which to review and update access agreements for organizational information systems.
PS-6c. Ensures that individuals requiring access to organizational information and information systems:
PS-6c.1. Sign appropriate access agreements prior to being granted access; and
PS-6 c 1
(CCI-001531)
The organization ensures that individuals requiring access to organizational information and information systems sign appropriate access agreements prior to being granted access.
PS-6c.2. Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or [Assignment: organization-defined frequency].
PS-6 c 2
(CCI-003036)
The organization ensures that individuals requiring access to organizational information and information systems re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or in accordance with organization-defined frequency.
PS-6 c 2
(CCI-003037)
The organization defines the frequency for individuals requiring access to organization information and information systems to re-sign access agreements.
INFORMATION REQUIRING SPECIAL PROTECTION
PS-6 (1) [Withdrawn: Incorporated into PS-3].
CLASSIFIED INFORMATION REQUIRING SPECIAL PROTECTION
PS-6 (2) The organization ensures that access to classified information requiring special protection is granted only to individuals who:
PS-6 (2)(a) Have a valid access authorization that is demonstrated by assigned official government duties;
PS-6 (2) (a)
(CCI-001536)
The organization ensures that access to classified information requiring special protection is granted only to individuals who have a valid access authorization that is demonstrated by assigned official government duties.
PS-6 (2)(b) Satisfy associated personnel security criteria; and
PS-6 (2) (b)
(CCI-001537)
The organization ensures that access to classified information requiring special protection is granted only to individuals who satisfy associated personnel security criteria.
PS-6 (2)(c) Have read, understood, and signed a nondisclosure agreement.
PS-6 (2) (c)
(CCI-001538)
The organization ensures that access to classified information requiring special protection is granted only to individuals who have read, understood, and signed a nondisclosure agreement.
POST-EMPLOYMENT REQUIREMENTS
PS-6 (3) The organization:
PS-6 (3)(a) Notifies individuals of applicable, legally binding post-employment requirements for protection of organizational information; and
PS-6 (3) (a)
(CCI-003038)
The organization notifies individuals of applicable, legally binding post-employment requirements for protection of organizational information.
PS-6 (3)(b) Requires individuals to sign an acknowledgment of these requirements, if applicable, as part of granting initial access to covered information.
PS-6 (3) (b)
(CCI-003039)
The organization requires individuals to sign an acknowledgement of legally binding post-employment requirements for protection of organizational information, if applicable, as part of granting initial access to covered information.
PS-7 PERSONNEL SECURITY : THIRD-PARTY PERSONNEL SECURITY
PS-7 The organization:
PS-7a. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
PS-7 a
(CCI-001539)
The organization establishes personnel security requirements including security roles and responsibilities for third-party providers.
PS-7b. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
PS-7 b
(CCI-003040)
The organization requires third-party providers to comply with personnel security policies and procedures established by the organization.
PS-7c. Documents personnel security requirements;
PS-7 c
(CCI-001540)
The organization documents personnel security requirements for third-party providers.
PS-7d. Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [Assignment: organization-defined time period]; and
PS-7 d
(CCI-003041)
The organization requires third-party providers to notify organization-defined personnel or roles of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within an organization-defined time period.
PS-7 d
(CCI-003042)
The organization defines personnel or roles whom third-party providers are to notify when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
PS-7 d
(CCI-003043)
The organization defines the time period for third-party providers to notify organization-defined personnel or roles when third-party personnel who possess organizational credentials and /or badges or who have information system privileges are transferred or terminated.
PS-7e. Monitors provider compliance.
PS-7 e
(CCI-001541)
The organization monitors third-party provider compliance with personnel security requirements.
PS-8 PERSONNEL SECURITY : PERSONNEL SANCTIONS
PS-8 The organization:
PS-8a. Employs a formal sanctions process for individuals failing to comply with established information security policies and procedures; and
PS-8 a
(CCI-001542)
The organization employs a formal sanctions process for individuals failing to comply with established information security policies and procedures.
PS-8b. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
PS-8 b
(CCI-003044)
The organization notifies organization-defined personnel or roles within an organization-defined time period when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
PS-8 b
(CCI-003045)
The organization defines personnel or roles who are to be notified when a formal employee sanctions process is initiated.
PS-8 b
(CCI-003046)
The organization defines the time period within which to notify organization-defined personnel or roles when a formal employee sanctions process is initiated.
RA-1 RISK ASSESSMENT : RISK ASSESSMENT POLICY AND PROCEDURES
RA-1 The organization:
RA-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
RA-1a.1. A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
RA-1 a 1
(CCI-001037)
The organization develops and documents a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
RA-1 a 1
(CCI-001038)
The organization disseminates a risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance to organization-defined personnel or roles.
RA-1 a 1
(CCI-002368)
The organization defines the personnel or roles to whom the risk assessment policy is disseminated.
RA-1a.2. Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and
RA-1 a 2
(CCI-001041)
The organization develops and documents procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls.
RA-1 a 2
(CCI-001042)
The organization disseminates risk assessment procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls to organization-defined personnel or roles.
RA-1 a 2
(CCI-002369)
The organization defines the personnel or roles to whom the risk assessment procedures are disseminated.
RA-1b. Reviews and updates the current:
RA-1b.1. Risk assessment policy [Assignment: organization-defined frequency]; and
RA-1 b 1
(CCI-001039)
The organization reviews and updates the current risk assessment policy in accordance with organization-defined frequency.
RA-1 b 1
(CCI-001040)
The organization defines the frequency with which to review and update the current risk assessment policy.
RA-1b.2. Risk assessment procedures [Assignment: organization-defined frequency].
RA-1 b 2
(CCI-001043)
The organization reviews and updates the current risk assessment procedures in accordance with organization-defined frequency.
RA-1 b 2
(CCI-001044)
The organization defines the frequency with which to review and update the current risk assessment procedures.
RA-2 RISK ASSESSMENT : SECURITY CATEGORIZATION
RA-2 The organization:
RA-2a. Categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
RA-2 a
(CCI-001045)
The organization categorizes information and the information system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
RA-2b. Documents the security categorization results (including supporting rationale) in the security plan for the information system; and
RA-2 b
(CCI-001046)
The organization documents the security categorization results (including supporting rationale) in the security plan for the information system.
RA-2c. Ensures that the security categorization decision is reviewed and approved by the authorizing official or authorizing official designated representative.
RA-2 c
(CCI-001047)
The organization ensures the security categorization decision is reviewed and approved by the authorizing official or authorizing official designated representative.
RA-3 RISK ASSESSMENT : RISK ASSESSMENT
RA-3 The organization:
RA-3a. Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;
RA-3 a
(CCI-001048)
The organization conducts an assessment of risk of the information system and the information it processes, stores, or transmits that includes the likelihood and magnitude of harm from the unauthorized access, use, disclosure, disruption, modification, or destruction.
RA-3b. Documents risk assessment results in [Selection: security plan; risk assessment report; [Assignment: organization-defined document]];
RA-3 b
(CCI-001642)
The organization defines the organizational document in which risk assessment results are documented (e.g., security plan, risk assessment report).
RA-3 b
(CCI-001049)
The organization documents risk assessment results in the organization-defined document.
RA-3c. Reviews risk assessment results [Assignment: organization-defined frequency];
RA-3 c
(CCI-001050)
The organization reviews risk assessment results on an organization-defined frequency.
RA-3 c
(CCI-001051)
The organization defines a frequency for reviewing risk assessment results.
RA-3d. Disseminates risk assessment results to [Assignment: organization-defined personnel or roles]; and
RA-3 d
(CCI-002370)
The organization disseminates risk assessment results to organization-defined personnel or roles.
RA-3 d
(CCI-002371)
The organization defines the personnel or roles to whom the risk assessment results will be disseminated.
RA-3e. Updates the risk assessment [Assignment: organization-defined frequency] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
RA-3 e
(CCI-001052)
The organization updates the risk assessment on an organization-defined frequency or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
RA-3 e
(CCI-001053)
The organization defines a frequency for updating the risk assessment.
RA-4 RISK ASSESSMENT : RISK ASSESSMENT UPDATE
RA-4 [Withdrawn: Incorporated into RA-3].
RA-5 RISK ASSESSMENT : VULNERABILITY SCANNING
RA-5 The organization:
RA-5a. Scans for vulnerabilities in the information system and hosted applications [Assignment: organization-defined frequency and/or randomly in accordance with organization-defined process] and when new vulnerabilities potentially affecting the system/applications are identified and reported;
RA-5 a
(CCI-001641)
The organization defines the process for conducting random vulnerability scans on the information system and hosted applications.
RA-5 a
(CCI-001643)
The organization scans for vulnerabilities in the information system and hosted applications in accordance with the organization-defined process for random scans.
RA-5 a
(CCI-001054)
The organization scans for vulnerabilities in the information system and hosted applications on an organization-defined frequency.
RA-5 a
(CCI-001055)
The organization defines a frequency for scanning for vulnerabilities in the information system and hosted applications.
RA-5 a
(CCI-001056)
The organization scans for vulnerabilities in the information system and hosted applications when new vulnerabilities potentially affecting the system/applications are identified and reported.
RA-5b. Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
RA-5 b
(CCI-001057)
The organization employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for: enumerating platforms, software flaws, and improper configurations; formatting checklists and test procedures; and measuring vulnerability impact.
RA-5b.1. Enumerating platforms, software flaws, and improper configurations;
RA-5b.2. Formatting checklists and test procedures; and
RA-5b.3. Measuring vulnerability impact;
RA-5c. Analyzes vulnerability scan reports and results from security control assessments;
RA-5 c
(CCI-001058)
The organization analyzes vulnerability scan reports and results from security control assessments.
RA-5d. Remediates legitimate vulnerabilities [Assignment: organization-defined response times] in accordance with an organizational assessment of risk; and
RA-5 d
(CCI-001059)
The organization remediates legitimate vulnerabilities in organization-defined response times in accordance with an organizational assessment risk.
RA-5 d
(CCI-001060)
The organization defines response times for remediating legitimate vulnerabilities in accordance with an organization assessment of risk.
RA-5e. Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
RA-5 e
(CCI-001061)
The organization shares information obtained from the vulnerability scanning process and security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
RA-5 e
(CCI-002376)
The organization defines the personnel or roles with whom the information obtained from the vulnerability scanning process and security control assessments will be shared.
UPDATE TOOL CAPABILITY
RA-5 (1) The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned.
RA-5 (1)
(CCI-001062)
The organization employs vulnerability scanning tools that include the capability to readily update the information system vulnerabilities to be scanned.
UPDATE BY FREQUENCY / PRIOR TO NEW SCAN / WHEN IDENTIFIED
RA-5 (2) The organization updates the information system vulnerabilities scanned [Selection (one or more): [Assignment: organization-defined frequency]; prior to a new scan; when new vulnerabilities are identified and reported].
RA-5 (2)
(CCI-001063)
The organization updates the information system vulnerabilities scanned on an organization-defined frequency, prior to a new scan, and/or when new vulnerabilities are identified and reported.
RA-5 (2)
(CCI-001064)
The organization defines a frequency for updating the information system vulnerabilities scanned.
BREADTH / DEPTH OF COVERAGE
RA-5 (3) The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).
RA-5 (3)
(CCI-002373)
The organization employs vulnerability scanning procedures that can identify the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).
DISCOVERABLE INFORMATION
RA-5 (4) The organization determines what information about the information system is discoverable by adversaries and subsequently takes [Assignment: organization-defined corrective actions].
RA-5 (4)
(CCI-001066)
The organization determines what information about the information system is discoverable by adversaries.
RA-5 (4)
(CCI-002374)
The organization defines the corrective actions when information about the information system is discoverable by adversaries.
RA-5 (4)
(CCI-002375)
The organization takes organization-defined corrective actions when information about the information system is discoverable by adversaries.
PRIVILEGED ACCESS
RA-5 (5) The information system implements privileged access authorization to [Assignment: organization-identified information system components] for selected [Assignment: organization-defined vulnerability scanning activities].
RA-5 (5)
(CCI-001645)
The organization identifies the information system components to which privileged access is authorized for selected organization-defined vulnerability scanning activities.
RA-5 (5)
(CCI-001067)
The information system implements privileged access authorization to organization-identified information system components for selected organization-defined vulnerability scanning activities.
RA-5 (5)
(CCI-002906)
The organization defines the vulnerability scanning activities in which the information system implements privileged access authorization to organization-identified information system components.
AUTOMATED TREND ANALYSES
RA-5 (6) The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
RA-5 (6)
(CCI-001068)
The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
AUTOMATED DETECTION AND NOTIFICATION OF UNAUTHORIZED COMPONENTS
RA-5 (7) [Withdrawn: Incorporated into CM-8].
REVIEW HISTORIC AUDIT LOGS
RA-5 (8) The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
RA-5 (8)
(CCI-001071)
The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
PENETRATION TESTING AND ANALYSES
RA-5 (9) [Withdrawn: Incorporated into CA-8].
CORRELATE SCANNING INFORMATION
RA-5 (10) The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
RA-5 (10)
(CCI-002372)
The organization correlates the output from vulnerability scanning tools to determine the presence of multi-vulnerability/multi-hop attack vectors.
RA-6 RISK ASSESSMENT : TECHNICAL SURVEILLANCE COUNTERMEASURES SURVEY
RA-6 The organization employs a technical surveillance countermeasures survey at [Assignment: organization-defined locations] [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined events or indicators occur]].
RA-6
(CCI-003119)
The organization employs a technical surveillance countermeasures survey at organization-defined locations on an organization-defined frequency or when organization-defined events or indicators occur.
RA-6
(CCI-003120)
The organization defines the locations where technical surveillance countermeasures surveys are to be employed.
RA-6
(CCI-003121)
The organization defines the frequency on which to employ technical surveillance countermeasures surveys.
RA-6
(CCI-003122)
The organization defines the events or indicators upon which technical surveillance countermeasures surveys are to be employed.
SA-1 SYSTEM AND SERVICES ACQUISITION : SYSTEM AND SERVICES ACQUISITION POLICY AND PROCEDURES
SA-1 The organization:
SA-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
SA-1a.1. A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
SA-1 a 1
(CCI-000602)
The organization develops and documents a system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
SA-1 a 1
(CCI-000603)
The organization disseminates to organization-defined personnel or roles a system and services acquisition policy.
SA-1 a 1
(CCI-003089)
The organization defines the personnel or roles to whom the system and services acquisition policy is disseminated.
SA-1a.2. Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and
SA-1 a 2
(CCI-000605)
The organization develops and documents procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
SA-1 a 2
(CCI-000606)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls.
SA-1 a 2
(CCI-003090)
The organization defines the personnel or roles to whom procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls are disseminated.
SA-1b. Reviews and updates the current:
SA-1b.1. System and services acquisition policy [Assignment: organization-defined frequency]; and
SA-1 b 1
(CCI-000601)
The organization defines the frequency with which to review and update the current system and services acquisition policy.
SA-1 b 1
(CCI-000604)
The organization reviews and updates the current system and services acquisition policy in accordance with organization-defined frequency.
SA-1b.2. System and services acquisition procedures [Assignment: organization-defined frequency].
SA-1 b 2
(CCI-000607)
The organization reviews and updates the current system and services acquisition procedures in accordance with organization-defined frequency.
SA-1 b 2
(CCI-001646)
The organization defines the frequency with which to review and update the current system and services acquisition procedures.
SA-2 SYSTEM AND SERVICES ACQUISITION : ALLOCATION OF RESOURCES
SA-2 The organization:
SA-2a. Determines information security requirements for the information system or information system service in mission/business process planning;
SA-2b. Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and
SA-2 b
(CCI-000610)
The organization determines the resources required to protect the information system or information system service as part of its capital planning and investment control process.
SA-2 b
(CCI-000611)
The organization documents the resources required to protect the information system or information system service as part of its capital planning and investment control process.
SA-2 b
(CCI-000612)
The organization allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process.
SA-2c. Establishes a discrete line item for information security in organizational programming and budgeting documentation.
SA-2 c
(CCI-000613)
The organization establishes a discrete line item for information security in organizational programming documentation.
SA-2 c
(CCI-000614)
The organization establishes a discrete line item for information security in organizational budgeting documentation.
SA-3 SYSTEM AND SERVICES ACQUISITION : SYSTEM DEVELOPMENT LIFE CYCLE
SA-3 The organization:
SA-3a. Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations;
SA-3 a
(CCI-000615)
The organization manages the information system using an organization-defined system development life cycle that incorporates information security considerations.
SA-3 a
(CCI-003092)
The organization defines a system development life cycle that is used to manage the information system.
SA-3b. Defines and documents information security roles and responsibilities throughout the system development life cycle;
SA-3 b
(CCI-000616)
The organization defines and documents information system security roles and responsibilities throughout the system development life cycle.
SA-3c. Identifies individuals having information security roles and responsibilities; and
SA-3 c
(CCI-000618)
The organization identifies individuals having information system security roles and responsibilities.
SA-3d. Integrates the organizational information security risk management process into system development life cycle activities.
SA-3 d
(CCI-003093)
The organization integrates the organizational information security risk management process into system development life cycle activities.
SA-4 SYSTEM AND SERVICES ACQUISITION : ACQUISITION PROCESS
SA-4 The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs:
SA-4a. Security functional requirements;
SA-4 a
(CCI-003094)
The organization includes the security functional requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4b. Security strength requirements;
SA-4 b
(CCI-003095)
The organization includes the security strength requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4c. Security assurance requirements;
SA-4 c
(CCI-003096)
The organization includes the security assurance requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4d. Security-related documentation requirements;
SA-4 d
(CCI-003097)
The organization includes the security-related documentation requirements, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4e. Requirements for protecting security-related documentation;
SA-4 e
(CCI-003098)
The organization includes requirements for protecting security-related documentation, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4f. Description of the information system development environment and environment in which the system is intended to operate; and
SA-4 f
(CCI-003099)
The organization includes description of the information system development environment and environment in which the system is intended to operate, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
SA-4g. Acceptance criteria.
SA-4 g
(CCI-003100)
The organization includes acceptance criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs.
FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
SA-4 (1) The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.
SA-4 (1)
(CCI-000623)
The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.
DESIGN / IMPLEMENTATION INFORMATION FOR SECURITY CONTROLS
SA-4 (2) The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: [Selection (one or more): security-relevant external system interfaces; high-level design; low-level design; source code or hardware schematics; [Assignment: organization-defined design/implementation information]] at [Assignment: organization-defined level of detail].
SA-4 (2)
(CCI-003101)
The organization requires the developer of the information system, system component, or information system service to provide design information for the security controls to be employed that includes security-relevant external system interfaces, high-level design, low-level design, source code, hardware schematics, and/or organization-defined design information at an organization-defined level of detail.
SA-4 (2)
(CCI-003102)
The organization requires the developer of the information system, system component, or information system service to provide implementation information for the security controls to be employed that includes security-relevant external system interfaces, high-level design, low-level design, source code, hardware schematics, and/or organization-defined implementation information at an organization-defined level of detail.
SA-4 (2)
(CCI-003103)
The organization defines the design information that the developer of the information system, system component, or information system service is required to provide for the security controls to be employed.
SA-4 (2)
(CCI-003104)
The organization defines the implementation information that the developer of the information system, system component, or information system service is required to provide for the security controls to be employed.
SA-4 (2)
(CCI-003105)
The organization defines the level of detail for the design information of the security controls that is required to be provided by the developer of the information system, system component, or information system services.
SA-4 (2)
(CCI-003106)
The organization defines the level of detail for the implementation information of the security controls that is required to be provided by the developer of the information system, system component, or information system services.
DEVELOPMENT METHODS / TECHNIQUES / PRACTICES
SA-4 (3) The organization requires the developer of the information system, system component, or information system service to demonstrate the use of a system development life cycle that includes [Assignment: organization-defined state-of-the-practice system/security engineering methods, software development methods, testing/evaluation/validation techniques, and quality control processes].
SA-4 (3)
(CCI-003107)
The organization requires the developer of the information system, system component, or information system service to demonstrate the use of a system development life cycle that includes organization-defined state-of-the-practice system/security engineering methods, software development methods, testing/evaluation/validation techniques, and quality control processes.
SA-4 (3)
(CCI-003108)
The organization defines the state-of-the-practice system/security engineering methods, software development methods, testing/evaluation/validation techniques, and quality control processes that the developer of the information system, system component, or information system service is required to include when demonstrating the use of a system development life cycle.
ASSIGNMENT OF COMPONENTS TO SYSTEMS
SA-4 (4) [Withdrawn: Incorporated into CM-8 (9)].
SYSTEM / COMPONENT / SERVICE CONFIGURATIONS
SA-4 (5) The organization requires the developer of the information system, system component, or information system service to:
SA-4 (5)(a) Deliver the system, component, or service with [Assignment: organization-defined security configurations] implemented; and
SA-4 (5) (a)
(CCI-003109)
The organization requires the developer of the information system, system component, or information system service to deliver the system, component, or service with organization-defined security configurations implemented.
SA-4 (5) (a)
(CCI-003110)
The organization defines the security configurations required to be implemented when the developer delivers the information system, system component, or information system service.
SA-4 (5)(b) Use the configurations as the default for any subsequent system, component, or service reinstallation or upgrade.
SA-4 (5) (b)
(CCI-003111)
The organization requires the developer of the information system, system component, or information system service to use the organization-defined security configurations as the default for any subsequent system, component, or service reinstallation or upgrade.
USE OF INFORMATION ASSURANCE PRODUCTS
SA-4 (6) The organization:
SA-4 (6)(a) Employs only government off-the-shelf (GOTS) or commercial off-the-shelf (COTS) information assurance (IA) and IA-enabled information technology products that compose an NSA-approved solution to protect classified information when the networks used to transmit the information are at a lower classification level than the information being transmitted; and
SA-4 (6) (a)
(CCI-000631)
The organization employs only government off-the-shelf (GOTS) or commercial off-the-shelf (COTS) information assurance (IA) and IA-enabled information technology products that compose an NSA-approved solution to protect classified information when the networks used to transmit the information are at a lower classification level than the information being transmitted.
SA-4 (6)(b) Ensures that these products have been evaluated and/or validated by NSA or in accordance with NSA-approved procedures.
SA-4 (6) (b)
(CCI-000633)
The organization ensures that government off-the-shelf (GOTS) or commercial-off-the-shelf(COTS) information assurance (IA) and IA-enabled information technology products have been evaluated and/or validated by the NSA or in accordance with NSA-approved procedures.
NIAP-APPROVED PROTECTION PROFILES
SA-4 (7) The organization:
SA-4 (7)(a) Limits the use of commercially provided information assurance (IA) and IA-enabled information technology products to those products that have been successfully evaluated against a National Information Assurance partnership (NIAP)-approved Protection Profile for a specific technology type, if such a profile exists; and
SA-4 (7) (a)
(CCI-000634)
The organization limits the use of commercially provided information assurance (IA) and IA-enabled information technology products to those products that have been successfully evaluated against a National Information Assurance Partnership (NIAP)-approved Protection Profile for a specific technology type, if such a profile exists.
SA-4 (7)(b) Requires, if no NIAP-approved Protection Profile exists for a specific technology type but a commercially provided information technology product relies on cryptographic functionality to enforce its security policy, that the cryptographic module is FIPS-validated.
SA-4 (7) (b)
(CCI-000635)
The organization requires, if no NIAP-approved Protection Profile exists for a specific technology type but a commercially provided information technology product relies on cryptographic functionality to enforce its security policy, that the cryptographic module is FIPS-validated.
CONTINUOUS MONITORING PLAN
SA-4 (8) The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains [Assignment: organization-defined level of detail].
SA-4 (8)
(CCI-003112)
The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains an organization-defined level of detail.
SA-4 (8)
(CCI-003113)
The organization defines the level of detail to be contained in the plan for the continuous monitoring of security control effectiveness that the developer of the information system, system component, or information system services is required to produce.
FUNCTIONS / PORTS / PROTOCOLS / SERVICES IN USE
SA-4 (9) The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
SA-4 (9)
(CCI-003114)
The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
SA-4 (9)
(CCI-003115)
The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
USE OF APPROVED PIV PRODUCTS
SA-4 (10) The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.
SA-4 (10)
(CCI-003116)
The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.
SA-5 SYSTEM AND SERVICES ACQUISITION : INFORMATION SYSTEM DOCUMENTATION
SA-5 The organization:
SA-5a. Obtains administrator documentation for the information system, system component, or information system service that describes:
SA-5a.1. Secure configuration, installation, and operation of the system, component, or service;
SA-5 a 1
(CCI-003124)
The organization obtains administrator documentation for the information system, system component, or information system service that describes secure configuration of the system, component, or service.
SA-5 a 1
(CCI-003125)
The organization obtains administrator documentation for the information system, system component, or information system service that describes secure installation of the system, component, or service.
SA-5 a 1
(CCI-003126)
The organization obtains administrator documentation for the information system, system component, or information system service that describes secure operation of the system, component, or service.
SA-5a.2. Effective use and maintenance of security functions/mechanisms; and
SA-5 a 2
(CCI-003127)
The organization obtains administrator documentation for the information system, system component, or information system services that describes effective use and maintenance of security functions/mechanisms.
SA-5a.3. Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;
SA-5 a 3
(CCI-003128)
The organization obtains administrator documentation for the information system, system component, or information system service that describes known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions.
SA-5b. Obtains user documentation for the information system, system component, or information system service that describes:
SA-5b.1. User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms;
SA-5 b 1
(CCI-003129)
The organization obtains user documentation for the information system, system component, or information system service that describes user-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms.
SA-5b.2. Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and
SA-5 b 2
(CCI-003130)
The organization obtains user documentation for the information system, system component, or information system service that describes methods for user interaction which enables individuals to use the system, component, or service in a more secure manner.
SA-5b.3. User responsibilities in maintaining the security of the system, component, or service;
SA-5 b 3
(CCI-003131)
The organization obtains user documentation for the information system, system component, or information system service that describes user responsibilities in maintaining the security of the system, component, or service.
SA-5c. Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and [Assignment: organization-defined actions] in response;
SA-5 c
(CCI-000642)
The organization documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent.
SA-5 c
(CCI-003132)
The organization takes organization-defined actions in response to attempts to obtain either unavailable or nonexistent documentation for the information system, system component, or information system service.
SA-5 c
(CCI-003133)
The organization defines actions to be taken in response to attempts to obtain either unavailable or nonexistent documentation for the information system, system component, or information system service.
SA-5d. Protects documentation as required, in accordance with the risk management strategy; and
SA-5 d
(CCI-003134)
The organization protects information system, system component, or information system service documentation as required, in accordance with the risk management strategy.
SA-5e. Distributes documentation to [Assignment: organization-defined personnel or roles].
SA-5 e
(CCI-003135)
The organization distributes information system, system component, or information system service documentation to organization-defined personnel or roles.
SA-5 e
(CCI-003136)
The organization defines the personnel or roles to whom information system, system component, or information system service documentation is to be distributed.
FUNCTIONAL PROPERTIES OF SECURITY CONTROLS
SA-5 (1) [Withdrawn: Incorporated into SA-4 (1)].
SECURITY-RELEVANT EXTERNAL SYSTEM INTERFACES
SA-5 (2) [Withdrawn: Incorporated into SA-4 (2)].
HIGH-LEVEL DESIGN
SA-5 (3) [Withdrawn: Incorporated into SA-4 (2)].
LOW-LEVEL DESIGN
SA-5 (4) [Withdrawn: Incorporated into SA-4 (2)].
SOURCE CODE
SA-5 (5) [Withdrawn: Incorporated into SA-4 (2)].
SA-6 SYSTEM AND SERVICES ACQUISITION : SOFTWARE USAGE RESTRICTIONS
SA-6 [Withdrawn: Incorporated into CM-10 and SI-7].
SA-7 SYSTEM AND SERVICES ACQUISITION : USER-INSTALLED SOFTWARE
SA-7 [Withdrawn: Incorporated into CM-11 and SI-7].
SA-8 SYSTEM AND SERVICES ACQUISITION : SECURITY ENGINEERING PRINCIPLES
SA-8 The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.
SA-8
(CCI-000664)
The organization applies information system security engineering principles in the specification of the information system.
SA-8
(CCI-000665)
The organization applies information system security engineering principles in the design of the information system.
SA-8
(CCI-000666)
The organization applies information system security engineering principles in the development of the information system.
SA-8
(CCI-000667)
The organization applies information system security engineering principles in the implementation of the information system.
SA-8
(CCI-000668)
The organization applies information system security engineering principles in the modification of the information system.
SA-9 SYSTEM AND SERVICES ACQUISITION : EXTERNAL INFORMATION SYSTEM SERVICES
SA-9 The organization:
SA-9a. Requires that providers of external information system services comply with organizational information security requirements and employ [Assignment: organization-defined security controls] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
SA-9 a
(CCI-000669)
The organization requires that providers of external information system services comply with organizational information security requirements.
SA-9 a
(CCI-000670)
The organization requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
SA-9 a
(CCI-003137)
The organization defines security controls that providers of external information system services employ in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
SA-9b. Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and
SA-9 b
(CCI-000671)
The organization defines government oversight with regard to external information system services.
SA-9 b
(CCI-000672)
The organization documents government oversight with regard to external information system services.
SA-9 b
(CCI-000673)
The organization defines user roles and responsibilities with regard to external information system services.
SA-9 b
(CCI-000674)
The organization documents user roles and responsibilities with regard to external information system services.
SA-9c. Employs [Assignment: organization-defined processes, methods, and techniques] to monitor security control compliance by external service providers on an ongoing basis.
SA-9 c
(CCI-003138)
The organization employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis.
SA-9 c
(CCI-003139)
The organization defines processes, methods, and techniques to employ to monitor security control compliance by external service providers on an ongoing basis.
RISK ASSESSMENTS / ORGANIZATIONAL APPROVALS
SA-9 (1) The organization:
SA-9 (1)(a) Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services; and
SA-9 (1)(b) Ensures that the acquisition or outsourcing of dedicated information security services is approved by [Assignment: organization-defined personnel or roles].
SA-9 (1) (b)
(CCI-003141)
The organization ensures that the acquisition or outsourcing of dedicated information security services is approved by organization-defined personnel or roles.
SA-9 (1) (b)
(CCI-003142)
The organization defines the personnel or roles authorized to approve the acquisition or outsourcing of dedicated information security services.
IDENTIFICATION OF FUNCTIONS / PORTS / PROTOCOLS / SERVICES
SA-9 (2) The organization requires providers of [Assignment: organization-defined external information system services] to identify the functions, ports, protocols, and other services required for the use of such services.
SA-9 (2)
(CCI-003143)
The organization requires providers of organization-defined external information system services to identify the functions, ports, protocols, and other services required for the use of such services.
SA-9 (2)
(CCI-003144)
The organization defines the external information system services for which the providers are required to identify the functions, ports, protocols, and other services required for the use of such services.
ESTABLISH / MAINTAIN TRUST RELATIONSHIP WITH PROVIDERS
SA-9 (3) The organization establishes, documents, and maintains trust relationships with external service providers based on [Assignment: organization-defined security requirements, properties, factors, or conditions defining acceptable trust relationships].
SA-9 (3)
(CCI-003145)
The organization establishes trust relationships with external service providers based on organization-defined security requirements, properties, factors, or conditions defining acceptable trust relationships.
SA-9 (3)
(CCI-003146)
The organization documents trust relationships with external service providers based on organization-defined security requirements, properties, factors, or conditions defining acceptable trust relationships.
SA-9 (3)
(CCI-003147)
The organization maintains trust relationships with external service providers based on organization-defined security requirements, properties, factors, or conditions defining acceptable trust relationships.
SA-9 (3)
(CCI-003148)
The organization defines security requirements, properties, factors, or conditions defining acceptable trust relationships with external service providers.
CONSISTENT INTERESTS OF CONSUMERS AND PROVIDERS
SA-9 (4) The organization employs [Assignment: organization-defined security safeguards] to ensure that the interests of [Assignment: organization-defined external service providers] are consistent with and reflect organizational interests.
SA-9 (4)
(CCI-003149)
The organization employs organization-defined security safeguards to ensure that the interests of organization-defined external service providers are consistent with and reflect organizational interests.
SA-9 (4)
(CCI-003150)
The organization defines security safeguards to employ to ensure that the interests of organization-defined external service providers are consistent with and reflect organizational interests.
SA-9 (4)
(CCI-003151)
The organization defines external service providers whose interests are consistent with and reflect organizational interests.
PROCESSING, STORAGE, AND SERVICE LOCATION
SA-9 (5) The organization restricts the location of [Selection (one or more): information processing; information/data; information system services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].
SA-9 (5)
(CCI-003152)
The organization restricts the location of information processing, information/data, and/or information system services to organization-defined locations based on organization-defined requirements or conditions.
SA-9 (5)
(CCI-003153)
The organization defines the locations for which to restrict information processing, information/data, and/or information system services based on organization-defined requirements or conditions.
SA-9 (5)
(CCI-003154)
The organization defines the requirements or conditions on which to base restricting the location of information processing, information/data, and/or information system services to organization-defined locations.
SA-10 SYSTEM AND SERVICES ACQUISITION : DEVELOPER CONFIGURATION MANAGEMENT
SA-10 The organization requires the developer of the information system, system component, or information system service to:
SA-10a. Perform configuration management during system, component, or service [Selection (one or more): design; development; implementation; operation];
SA-10 a
(CCI-003155)
The organization requires the developer of the information system, system component, or information system service to perform configuration management during system, component, or service design, development, implementation and/or operation.
SA-10b. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
SA-10 b
(CCI-003156)
The organization requires the developer of the information system, system component, or information system service to document the integrity of changes to organization-defined configuration items under configuration management.
SA-10 b
(CCI-003157)
The organization requires the developer of the information system, system component, or information system service to manage the integrity of changes to organization-defined configuration items under configuration management.
SA-10 b
(CCI-003158)
The organization requires the developer of the information system, system component, or information system service to control the integrity of changes to organization-defined configuration items under configuration management.
SA-10 b
(CCI-003159)
The organization defines the configuration items under configuration management that require the integrity of changes to be documented, managed and controlled.
SA-10c. Implement only organization-approved changes to the system, component, or service;
SA-10 c
(CCI-000692)
The organization requires the developer of the information system, system component, or information system service to implement only organization-approved changes to the system, component, or service.
SA-10d. Document approved changes to the system, component, or service and the potential security impacts of such changes; and
SA-10 d
(CCI-000694)
The organization requires the developer of the information system, system component, or information system service to document approved changes to the system, component, or service.
SA-10 d
(CCI-003160)
The organization requires the developer of the information system, system component, or information system service to document the potential security impacts of approved changes to the system, component, or service.
SA-10e. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
SA-10 e
(CCI-003161)
The organization requires the developer of the information system, system component, or information system service to track security flaws within the system, component, or service.
SA-10 e
(CCI-003162)
The organization requires the developer of the information system, system component, or information system service to track flaw resolution within the system, component, or service.
SA-10 e
(CCI-003163)
The organization requires the developer of the information system, system component, or information system service to report findings of security flaws and flaw resolution within the system, component, or service to organization-defined personnel.
SA-10 e
(CCI-003164)
The organization defines the personnel to whom security flaw findings and flaw resolution within the system, component, or service are reported.
SOFTWARE / FIRMWARE INTEGRITY VERIFICATION
SA-10 (1) The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.
SA-10 (1)
(CCI-000698)
The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.
ALTERNATIVE CONFIGURATION MANAGEMENT PROCESSES
SA-10 (2) The organization provides an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
SA-10 (2)
(CCI-000700)
The organization provides an alternate configuration management process using organizational personnel in the absence of a dedicated developer configuration management team.
HARDWARE INTEGRITY VERIFICATION
SA-10 (3) The organization requires the developer of the information system, system component, or information system service to enable integrity verification of hardware components.
SA-10 (3)
(CCI-003165)
The organization requires the developer of the information system, system component, or information system service to enable integrity verification of hardware components.
TRUSTED GENERATION
SA-10 (4) The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions and software/firmware source and object code with previous versions.
SA-10 (4)
(CCI-003166)
The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of security-relevant hardware descriptions with previous versions.
SA-10 (4)
(CCI-003167)
The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of software/firmware source code with previous versions.
SA-10 (4)
(CCI-003168)
The organization requires the developer of the information system, system component, or information system service to employ tools for comparing newly generated versions of object code with previous versions.
MAPPING INTEGRITY FOR VERSION CONTROL
SA-10 (5) The organization requires the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.
SA-10 (5)
(CCI-003169)
The organization requires the developer of the information system, system component, or information system service to maintain the integrity of the mapping between the master build data (hardware drawings and software/firmware code) describing the current version of security-relevant hardware, software, and firmware and the on-site master copy of the data for the current version.
TRUSTED DISTRIBUTION
SA-10 (6) The organization requires the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.
SA-10 (6)
(CCI-003170)
The organization requires the developer of the information system, system component, or information system service to execute procedures for ensuring that security-relevant hardware, software, and firmware updates distributed to the organization are exactly as specified by the master copies.
SA-11 SYSTEM AND SERVICES ACQUISITION : DEVELOPER SECURITY TESTING AND EVALUATION
SA-11 The organization requires the developer of the information system, system component, or information system service to:
SA-11a. Create and implement a security assessment plan;
SA-11 a
(CCI-003171)
The organization requires the developer of the information system, system component, or information system service to create a security assessment plan.
SA-11 a
(CCI-003172)
The organization requires the developer of the information system, system component, or information system service to implement a security assessment plan.
SA-11b. Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation at [Assignment: organization-defined depth and coverage];
SA-11 b
(CCI-003173)
The organization requires the developer of the information system, system component, or information system service to perform unit, integration, system, and/or regression testing/evaluation at an organization-defined depth and coverage.
SA-11 b
(CCI-003174)
The organization defines the depth and coverage at which to perform unit, integration, system, and/or regression testing/evaluation.
SA-11c. Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation;
SA-11 c
(CCI-003175)
The organization requires the developer of the information system, system component, or information system service to produce evidence of the execution of the security assessment plan.
SA-11 c
(CCI-003176)
The organization requires the developer of the information system, system component, or information system service to produce the results of the security testing/evaluation.
SA-11d. Implement a verifiable flaw remediation process; and
SA-11 d
(CCI-003177)
The organization requires the developer of the information system, system component, or information system service to implement a verifiable flaw remediation process.
SA-11e. Correct flaws identified during security testing/evaluation.
SA-11 e
(CCI-003178)
The organization requires the developer of the information system, system component, or information system service to correct flaws identified during security testing/evaluation.
STATIC CODE ANALYSIS
SA-11 (1) The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
SA-11 (1)
(CCI-003179)
The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws.
SA-11 (1)
(CCI-003180)
The organization requires the developer of the information system, system component, or information system service to document the results of static code analysis.
THREAT AND VULNERABILITY ANALYSES
SA-11 (2) The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.
SA-11 (2)
(CCI-003181)
The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analysis.
SA-11 (2)
(CCI-003182)
The organization requires the developer of the information system, system component, or information system service to perform testing/evaluation of the as-built system, component, or service subsequent to threat and vulnerability analysis.
INDEPENDENT VERIFICATION OF ASSESSMENT PLANS / EVIDENCE
SA-11 (3) The organization:
SA-11 (3)(a) Requires an independent agent satisfying [Assignment: organization-defined independence criteria] to verify the correct implementation of the developer security assessment plan and the evidence produced during security testing/evaluation; and
SA-11 (3) (a)
(CCI-003183)
The organization requires an independent agent satisfying organization-defined independence criteria to verify the correct implementation of the developer security assessment plan.
SA-11 (3) (a)
(CCI-003184)
The organization requires an independent agent satisfying organization-defined independence criteria to verify the evidence produced during security testing/evaluation.
SA-11 (3) (a)
(CCI-003185)
The organization defines the independence criteria the independent agent must satisfy prior to verifying the correct implementation of the developer security assessment plan and the evidence produced during security testing/evaluation.
SA-11 (3)(b) Ensures that the independent agent either is provided with sufficient information to complete the verification process or has been granted the authority to obtain such information.
SA-11 (3) (b)
(CCI-003186)
The organization ensures that the independent agent either is provided with sufficient information to complete the verification process or has been granted the authority to obtain such information.
MANUAL CODE REVIEWS
SA-11 (4) The organization requires the developer of the information system, system component, or information system service to perform a manual code review of [Assignment: organization-defined specific code] using [Assignment: organization-defined processes, procedures, and/or techniques].
SA-11 (4)
(CCI-003187)
The organization requires the developer of the information system, system component, or information system service to perform a manual code review of organization-defined specific code using organization-defined processes, procedures, and/or techniques.
SA-11 (4)
(CCI-003188)
The organization defines the specific code for which the developer of the information system, system component, or information system service is required to perform a manual code review using organization-defined process, procedures, and/or techniques.
SA-11 (4)
(CCI-003189)
The organization defines the processes, procedures, and/or techniques to be used by the developer of the information system, system component, or information system service to perform a manual code review of organization-defined specific code.
PENETRATION TESTING / ANALYSIS
SA-11 (5) The organization requires the developer of the information system, system component, or information system service to perform penetration testing at [Assignment: organization-defined breadth/depth] and with [Assignment: organization-defined constraints].
SA-11 (5)
(CCI-003190)
The organization requires the developer of the information system, system component, or information system service to perform penetration testing at an organization-defined breadth/depth and with organization-defined constraints.
SA-11 (5)
(CCI-003191)
The organization defines the breadth/depth at which the developer of the information system, system component, or information system service is required to perform penetration testing.
SA-11 (5)
(CCI-003192)
The organization defines the constraints on penetration testing performed by the developer of the information system, system component, or information system service.
ATTACK SURFACE REVIEWS
SA-11 (6) The organization requires the developer of the information system, system component, or information system service to perform attack surface reviews.
SA-11 (6)
(CCI-003193)
The organization requires the developer of the information system, system component, or information system service to perform attack surface reviews.
VERIFY SCOPE OF TESTING / EVALUATION
SA-11 (7) The organization requires the developer of the information system, system component, or information system service to verify that the scope of security testing/evaluation provides complete coverage of required security controls at [Assignment: organization-defined depth of testing/evaluation].
SA-11 (7)
(CCI-003194)
The organization requires the developer of the information system, system component, or information system service to verify that the scope of security testing/evaluation provides complete coverage of required security controls at an organization-defined depth of testing/evaluation.
SA-11 (7)
(CCI-003195)
The organization defines the depth of testing/evaluation to which the developer of the information system, system component, or information system service is required to verify that the scope of security testing/evaluation provides complete coverage of the required security controls.
DYNAMIC CODE ANALYSIS
SA-11 (8) The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
SA-11 (8)
(CCI-003196)
The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws.
SA-11 (8)
(CCI-003197)
The organization requires the developer of the information system, system component, or information system service to document the results of the dynamic code analysis.
SA-12 SYSTEM AND SERVICES ACQUISITION : SUPPLY CHAIN PROTECTION
SA-12 The organization protects against supply chain threats to the information system, system component, or information system service by employing [Assignment: organization-defined security safeguards] as part of a comprehensive, defense-in-breadth information security strategy.
SA-12
(CCI-000722)
The organization defines the security safeguards to employ to protect against supply chain threats to the information system, system component, or information system service.
SA-12
(CCI-000723)
The organization protects against supply chain threats to the information system, system component, or information system service by employing organization-defined security safeguards as part of a comprehensive, defense-in-breadth information security strategy.
ACQUISITION STRATEGIES / TOOLS / METHODS
SA-12 (1) The organization employs [Assignment: organization-defined tailored acquisition strategies, contract tools, and procurement methods] for the purchase of the information system, system component, or information system service from suppliers.
SA-12 (1)
(CCI-003198)
The organization employs organization-defined tailored acquisition strategies, contract tools, and procurement methods for the purchase of the information system, system component, or information system service from suppliers.
SA-12 (1)
(CCI-003199)
The organization defines tailored acquisition strategies, contract tools, and procurement methods to employ for the purchase of the information system, system component, or information system service from suppliers.
SA-12 (1)
(CCI-003207)
The organization employs organization-defined tailored acquisition strategies, contract tools, and procurement methods for the purchase of the information system, system component, or information system service from suppliers.
SA-12 (1)
(CCI-003208)
The organization employs organization-defined tailored acquisition strategies, contract tools, and procurement methods for the purchase of the information system, system component, or information system service from suppliers.
SA-12 (1)
(CCI-003209)
The organization employs organization-defined tailored acquisition strategies, contract tools, and procurement methods for the purchase of the information system, system component, or information system service from suppliers.
SUPPLIER REVIEWS
SA-12 (2) The organization conducts a supplier review prior to entering into a contractual agreement to acquire the information system, system component, or information system service.
SA-12 (2)
(CCI-003200)
The organization conducts a supplier review prior to entering into a contractual agreement to acquire the information system, system component, or information system service.
TRUSTED SHIPPING AND WAREHOUSING
SA-12 (3) [Withdrawn: Incorporated into SA-12 (1)].
DIVERSITY OF SUPPLIERS
SA-12 (4) [Withdrawn: Incorporated into SA-12 (13)].
LIMITATION OF HARM
SA-12 (5) The organization employs [Assignment: organization-defined security safeguards] to limit harm from potential adversaries identifying and targeting the organizational supply chain.
SA-12 (5)
(CCI-003201)
The organization employs organization-defined security safeguards to limit harm from potential adversaries identifying and targeting the organizational supply chain.
SA-12 (5)
(CCI-003202)
The organization defines security safeguards to employ to limit harm from potential adversaries identifying and targeting the organizational supply chain.
MINIMIZING PROCUREMENT TIME
SA-12 (6) [Withdrawn: Incorporated into SA-12 (1)].
ASSESSMENTS PRIOR TO SELECTION / ACCEPTANCE / UPDATE
SA-12 (7) The organization conducts an assessment of the information system, system component, or information system service prior to selection, acceptance, or update.
SA-12 (7)
(CCI-003203)
The organization conducts an assessment of the information system, system component, or information system service prior to selection, acceptance, or update.
SA-12 (7)
(CCI-003204)
The organization conducts an assessment of the information system, system component, or information system service prior to selection, acceptance, or update.
USE OF ALL-SOURCE INTELLIGENCE
SA-12 (8) The organization uses all-source intelligence analysis of suppliers and potential suppliers of the information system, system component, or information system service.
SA-12 (8)
(CCI-003205)
The organization uses all-source intelligence analysis of suppliers and potential suppliers of the information system, system component, or information system service.
OPERATIONS SECURITY
SA-12 (9) The organization employs [Assignment: organization-defined Operations Security (OPSEC) safeguards] in accordance with classification guides to protect supply chain-related information for the information system, system component, or information system service.
SA-12 (9)
(CCI-003206)
The organization employs organization-defined Operations Security (OPSEC) safeguards in accordance with classification guides to protect supply chain-related information for the information system, system component, or information system service.
SA-12 (9)
(CCI-003210)
The organization defines the Operations Security (OPSEC) safeguards to be employed in accordance with classification guides to protect supply chain-related information for the information system, system component, or information system service.
SA-12 (9)
(CCI-003211)
The organization defines the Operations Security (OPSEC) safeguards to be employed in accordance with classification guides to protect supply chain-related information for the information system, system component, or information system service.
VALIDATE AS GENUINE AND NOT ALTERED
SA-12 (10) The organization employs [Assignment: organization-defined security safeguards] to validate that the information system or system component received is genuine and has not been altered.
SA-12 (10)
(CCI-003212)
The organization employs organization-defined security safeguards to validate that the information system or system component received is genuine and has not been altered.
SA-12 (10)
(CCI-003213)
The organization defines the security safeguards to be employed to validate that the information system or system component received is genuine and has not been altered.
PENETRATION TESTING / ANALYSIS OF ELEMENTS, PROCESSES, AND ACTORS
SA-12 (11) The organization employs [Selection (one or more): organizational analysis, independent third-party analysis, organizational penetration testing, independent third-party penetration testing] of [Assignment: organization-defined supply chain elements, processes, and actors] associated with the information system, system component, or information system service.
SA-12 (11)
(CCI-003214)
The organization employs organizational analysis, independent third-party analysis, organizational penetration testing and/or independent third-party penetration testing of organization-defined supply chain elements, processes, and actors associated with the information system, system component, or information system service.
SA-12 (11)
(CCI-003215)
The organization defines the supply chain elements, processes, and actors associated with the information system, system component, or information system service for organizational analysis, independent third-party analysis, organizational penetration testing and/or independent third-party penetration testing.
INTER-ORGANIZATIONAL AGREEMENTS
SA-12 (12) The organization establishes inter-organizational agreements and procedures with entities involved in the supply chain for the information system, system component, or information system service.
SA-12 (12)
(CCI-003216)
The organization establishes inter-organizational agreements with entities involved in the supply chain for the information system, system component, or information system service.
SA-12 (12)
(CCI-003217)
The organization establishes inter-organizational procedures with entities involved in the supply chain for the information system, system component, or information system service.
CRITICAL INFORMATION SYSTEM COMPONENTS
SA-12 (13) The organization employs [Assignment: organization-defined security safeguards] to ensure an adequate supply of [Assignment: organization-defined critical information system components].
SA-12 (13)
(CCI-003218)
The organization employs organization-defined security safeguards to ensure an adequate supply of organization-defined critical information system components.
SA-12 (13)
(CCI-003219)
The organization defines the security safeguards to be employed to ensure an adequate supply of organization-defined critical information system components.
SA-12 (13)
(CCI-003220)
The organization defines the critical information system components for which organization-defined security safeguards are employed to ensure adequate supply.
IDENTITY AND TRACEABILITY
SA-12 (14) The organization establishes and retains unique identification of [Assignment: organization-defined supply chain elements, processes, and actors] for the information system, system component, or information system service.
SA-12 (14)
(CCI-003221)
The organization establishes unique identification of organization-defined supply chain elements, processes, and actors for the information system, system component, or information system service.
SA-12 (14)
(CCI-003222)
The organization retains unique identification of organization-defined supply chain elements, processes, and actors for the information system, system component, or information system service.
SA-12 (14)
(CCI-003223)
The organization defines the supply chain elements, processes, and actors for the information system, system component, or information system service to establish and retain unique identification.
PROCESSES TO ADDRESS WEAKNESSES OR DEFICIENCIES
SA-12 (15) The organization establishes a process to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
SA-12 (15)
(CCI-003224)
The organization establishes a process to address weaknesses or deficiencies in supply chain elements identified during independent or organizational assessments of such elements.
SA-13 SYSTEM AND SERVICES ACQUISITION : TRUSTWORTHINESS
SA-13 The organization:
SA-13a. Describes the trustworthiness required in the [Assignment: organization-defined information system, information system component, or information system service] supporting its critical missions/business functions; and
SA-13 a
(CCI-003225)
The organization describes the trustworthiness required in the organization-defined information system, information system component, or information system service supporting its critical missions/business functions.
SA-13 a
(CCI-003226)
The organization defines the information system, information system component, or information system service supporting its critical missions/business functions in which the trustworthiness must be described.
SA-13b. Implements [Assignment: organization-defined assurance overlay] to achieve such trustworthiness.
SA-13 b
(CCI-003227)
The organization implements an organization-defined assurance overlay to achieve trustworthiness required to support its critical missions/business functions.
SA-13 b
(CCI-003228)
The organization defines an assurance overlay to be implemented to achieve trustworthiness required to support its critical missions/business functions.
SA-14 SYSTEM AND SERVICES ACQUISITION : CRITICALITY ANALYSIS
SA-14 The organization identifies critical information system components and functions by performing a criticality analysis for [Assignment: organization-defined information systems, information system components, or information system services] at [Assignment: organization-defined decision points in the system development life cycle].
SA-14
(CCI-003229)
The organization identifies critical information system components by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
SA-14
(CCI-003230)
The organization identifies critical information system functions by performing a criticality analysis for organization-defined information systems, information system components, or information system services at organization-defined decision points in the system development life cycle.
SA-14
(CCI-003231)
The organization defines the information systems, information system components, or information system services for which the organization identifies critical information system components and functions for criticality analysis.
SA-14
(CCI-003232)
The organization defines the decision points in the system development life cycle at which to perform a criticality analysis to identify critical information system components and functions for organization-defined information systems, information system components, or information system services.
CRITICAL COMPONENTS WITH NO VIABLE ALTERNATIVE SOURCING
SA-14 (1) [Withdrawn: Incorporated into SA-20].
SA-15 SYSTEM AND SERVICES ACQUISITION : DEVELOPMENT PROCESS, STANDARDS, AND TOOLS
SA-15 The organization:
SA-15
(CCI-003233)
The organization requires the developer of the information system, system component, or information system service to follow a documented development process.
SA-15a. Requires the developer of the information system, system component, or information system service to follow a documented development process that:
SA-15a.1. Explicitly addresses security requirements;
SA-15 a 1
(CCI-003234)
The documented information system, system component, or information system service development process explicitly addresses security requirements.
SA-15a.2. Identifies the standards and tools used in the development process;
SA-15 a 2
(CCI-003235)
The documented information system, system component, or information system service development process identifies the standards used in the development process.
SA-15 a 2
(CCI-003236)
The documented information system, system component, or information system service development process identifies the tools used in the development process.
SA-15a.3. Documents the specific tool options and tool configurations used in the development process; and
SA-15 a 3
(CCI-003237)
The documented information system, system component, or information system service development process documents the specific tool options and tool configurations used in the development process.
SA-15a.4. Documents, manages, and ensures the integrity of changes to the process and/or tools used in development; and
SA-15 a 4
(CCI-003238)
The documented information system, system component, or information system service development process documents changes to the process and/or tools used in development.
SA-15 a 4
(CCI-003239)
The documented information system, system component, or information system service development process manages changes to the process and/or tools used in development.
SA-15 a 4
(CCI-003240)
The documented information system, system component, or information system service development process ensures the integrity of changes to the process and/or tools used in development.
SA-15b. Reviews the development process, standards, tools, and tool options/configurations [Assignment: organization-defined frequency] to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy [Assignment: organization-defined security requirements].
SA-15 b
(CCI-003241)
The organization reviews the development process in accordance with organization-defined frequency to determine if the development process selected and employed can satisfy organization-defined security requirements.
SA-15 b
(CCI-003242)
The organization reviews the development standards in accordance with organization-defined frequency to determine if the development standards selected and employed can satisfy organization-defined security requirements.
SA-15 b
(CCI-003243)
The organization reviews the development tools in accordance with organization-defined frequency to determine if the development tools selected and employed can satisfy organization-defined security requirements.
SA-15 b
(CCI-003244)
The organization reviews the development tool options/configurations in accordance with organization-defined frequency to determine if the development tool options/configurations selected and employed can satisfy organization-defined security requirements.
SA-15 b
(CCI-003245)
The organization defines the frequency on which to review the development process, standards, tools, and tool options/configurations to determine if the process, standards, tools, and tool options/configurations selected and employed can satisfy organization-defined security requirements.
SA-15 b
(CCI-003246)
The organization defines the security requirements that must be satisfied by conducting a review of the development process, standards, tools, and tool options/configurations.
QUALITY METRICS
SA-15 (1) The organization requires the developer of the information system, system component, or information system service to:
SA-15 (1)(a) Define quality metrics at the beginning of the development process; and
SA-15 (1) (a)
(CCI-003247)
The organization requires the developer of the information system, system component, or information system service to define quality metrics at the beginning of the development process.
SA-15 (1)(b) Provide evidence of meeting the quality metrics [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined program review milestones]; upon delivery].
SA-15 (1) (b)
(CCI-003248)
The organization requires the developer of the information system, system component, or information system service to provide evidence of meeting the quality metrics in accordance with organization-defined frequency, organization-defined program review milestones and/or upon delivery.
SA-15 (1) (b)
(CCI-003249)
The organization defines the frequency on which the developer of the information system, system component, or information system service is required to provide evidence of meeting the quality metrics.
SA-15 (1) (b)
(CCI-003250)
The organization defines the program review milestones at which the developer of the information system, system component, or information system service is required to provide evidence of meeting the quality metrics.
SECURITY TRACKING TOOLS
SA-15 (2) The organization requires the developer of the information system, system component, or information system service to select and employ a security tracking tool for use during the development process.
SA-15 (2)
(CCI-003251)
The organization requires the developer of the information system, system component, or information system service to select a security tracking tool for use during the development process.
SA-15 (2)
(CCI-003252)
The organization requires the developer of the information system, system component, or information system service to employ a security tracking tool for use during the development process.
CRITICALITY ANALYSIS
SA-15 (3) The organization requires the developer of the information system, system component, or information system service to perform a criticality analysis at [Assignment: organization-defined breadth/depth] and at [Assignment: organization-defined decision points in the system development life cycle].
SA-15 (3)
(CCI-003253)
The organization requires the developer of the information system, system component, or information system service to perform a criticality analysis at an organization-defined breadth/depth and at organization-defined decision points in the system development life cycle.
SA-15 (3)
(CCI-003254)
The organization defines the breadth/depth at which the developer of the information system, system component, or information system service is required to perform a criticality analysis.
SA-15 (3)
(CCI-003255)
The organization defines decision points in the system development life cycle at which the developer of the information system, system component, or information system service is required to perform a criticality analysis.
THREAT MODELING / VULNERABILITY ANALYSIS
SA-15 (4) The organization requires that developers perform threat modeling and a vulnerability analysis for the information system at [Assignment: organization-defined breadth/depth] that:
SA-15 (4)
(CCI-003256)
The organization requires that developers perform threat modeling for the information system at an organization-defined breadth/depth.
SA-15 (4)
(CCI-003257)
The organization requires that developers perform a vulnerability analysis for the information system at an organization-defined breadth/depth.
SA-15 (4)
(CCI-003258)
The organization defines the breadth/depth at which threat modeling for the information system must be performed by developers.
SA-15 (4)
(CCI-003259)
The organization defines the breadth/depth at which vulnerability analysis for the information system must be performed by developers.
SA-15 (4)(a) Uses [Assignment: organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels];
SA-15 (4) (a)
(CCI-003260)
Threat modeling performed by the developer for the information system uses organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels.
SA-15 (4) (a)
(CCI-003261)
Vulnerability analysis performed by the developer for the information system uses organization-defined information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels.
SA-15 (4) (a)
(CCI-003262)
The organization defines information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels to be used to perform threat modeling for the information system by the developer.
SA-15 (4) (a)
(CCI-003263)
The organization defines information concerning impact, environment of operations, known or assumed threats, and acceptable risk levels to be used to perform a vulnerability analysis for the information system by the developer.
SA-15 (4)(b) Employs [Assignment: organization-defined tools and methods]; and
SA-15 (4) (b)
(CCI-003264)
The organization requires the threat modeling performed by the developers employ organization-defined tools and methods.
SA-15 (4) (b)
(CCI-003265)
The organization requires the vulnerability analysis performed by the developers employ organization-defined tools and methods.
SA-15 (4) (b)
(CCI-003266)
The organization defines tools and methods to be employed to perform threat modeling for the information system by the developer.
SA-15 (4) (b)
(CCI-003267)
The organization defines tools and methods to be employed to perform a vulnerability analysis for the information system by the developer.
SA-15 (4)(c) Produces evidence that meets [Assignment: organization-defined acceptance criteria].
SA-15 (4) (c)
(CCI-003268)
The organization requires that developers performing threat modeling for the information system produce evidence that meets organization-defined acceptance criteria.
SA-15 (4) (c)
(CCI-003269)
The organization requires that developers performing vulnerability analysis for the information system produce evidence that meets organization-defined acceptance criteria.
SA-15 (4) (c)
(CCI-003270)
The organization defines the acceptance criteria that must be met when threat modeling of the information system is performed by the developer.
SA-15 (4) (c)
(CCI-003271)
The organization defines the acceptance criteria that must be met when vulnerability analysis of the information system is performed by the developer.
ATTACK SURFACE REDUCTION
SA-15 (5) The organization requires the developer of the information system, system component, or information system service to reduce attack surfaces to [Assignment: organization-defined thresholds].
SA-15 (5)
(CCI-003272)
The organization requires the developer of the information system, system component, or information system service to reduce attack surfaces to organization-defined thresholds.
SA-15 (5)
(CCI-003273)
The organization defines the thresholds to which the developer of the information system, system component, or information system service is required to reduce attack surfaces.
CONTINUOUS IMPROVEMENT
SA-15 (6) The organization requires the developer of the information system, system component, or information system service to implement an explicit process to continuously improve the development process.
SA-15 (6)
(CCI-003274)
The organization requires the developer of the information system, system component, or information system service to implement an explicit process to continuously improve the development process.
AUTOMATED VULNERABILITY ANALYSIS
SA-15 (7) The organization requires the developer of the information system, system component, or information system service to:
SA-15 (7)(a) Perform an automated vulnerability analysis using [Assignment: organization-defined tools];
SA-15 (7) (a)
(CCI-003275)
The organization requires the developer of the information system, system component, or information system services to perform an automated vulnerability analysis using organization-defined tools.
SA-15 (7) (a)
(CCI-003276)
The organization defines the tools the developer of the information system, system component, or information system services uses to perform an automated vulnerability analysis.
SA-15 (7)(b) Determine the exploitation potential for discovered vulnerabilities;
SA-15 (7) (b)
(CCI-003277)
The organization requires the developer of the information system, system component, or information system services to determine the exploitation potential for discovered vulnerabilities.
SA-15 (7)(c) Determine potential risk mitigations for delivered vulnerabilities; and
SA-15 (7) (c)
(CCI-003278)
The organization requires the developer of the information system, system component, or information system services to determine potential risk mitigations for delivered vulnerabilities.
SA-15 (7)(d) Deliver the outputs of the tools and results of the analysis to [Assignment: organization-defined personnel or roles].
SA-15 (7) (d)
(CCI-003279)
The organization requires the developer of the information system, system component, or information system services to deliver the outputs of the tools and results of the vulnerability analysis to organization-defined personnel or roles.
SA-15 (7) (d)
(CCI-003280)
The organization defines the personnel or roles to whom the outputs of the tools and results of the vulnerability analysis are delivered.
REUSE OF THREAT / VULNERABILITY INFORMATION
SA-15 (8) The organization requires the developer of the information system, system component, or information system service to use threat modeling and vulnerability analyses from similar systems, components, or services to inform the current development process.
SA-15 (8)
(CCI-003281)
The organization requires the developer of the information system, system component, or information system service to use threat modeling from similar systems, components, or services to inform the current development process.
SA-15 (8)
(CCI-003282)
The organization requires the developer of the information system, system component, or information system service to use vulnerability analysis from similar systems, components, or services to inform the current development process.
USE OF LIVE DATA
SA-15 (9) The organization approves, documents, and controls the use of live data in development and test environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003283)
The organization approves the use of live data in development environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003284)
The organization approves the use of live data in test environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003285)
The organization documents the use of live data in development environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003286)
The organization documents the use of live data in test environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003287)
The organization controls the use of live data in development environments for the information system, system component, or information system service.
SA-15 (9)
(CCI-003288)
The organization controls the use of live data in test environments for the information system, system component, or information system service.
INCIDENT RESPONSE PLAN
SA-15 (10) The organization requires the developer of the information system, system component, or information system service to provide an incident response plan.
SA-15 (10)
(CCI-003289)
The organization requires the developer of the information system, system component, or information system service to provide an incident response plan.
ARCHIVE INFORMATION SYSTEM / COMPONENT
SA-15 (11) The organization requires the developer of the information system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security review.
SA-15 (11)
(CCI-003290)
The organization requires the developer of the information system or system component to archive the system or component to be released or delivered together with the corresponding evidence supporting the final security review.
SA-16 SYSTEM AND SERVICES ACQUISITION : DEVELOPER-PROVIDED TRAINING
SA-16 The organization requires the developer of the information system, system component, or information system service to provide [Assignment: organization-defined training] on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
SA-16
(CCI-003291)
The organization requires the developer of the information system, system component, or information system service to provide organization-defined training on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
SA-16
(CCI-003292)
The organization defines the training the developer of the information system, system component, or information system service is required to provide on the correct use and operation of the implemented security functions, controls, and/or mechanisms.
SA-17 SYSTEM AND SERVICES ACQUISITION : DEVELOPER SECURITY ARCHITECTURE AND DESIGN
SA-17 The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture that:
SA-17
(CCI-003293)
The organization requires the developer of the information system, system component, or information system service to produce a design specification and security architecture.
SA-17a. Is consistent with and supportive of the organization�s security architecture which is established within and is an integrated part of the organization�s enterprise architecture;
SA-17 a
(CCI-003294)
The design specification and security architecture is consistent with and supportive of the organization's security architecture which is established within and is an integrated part of the organization's enterprise architecture.
SA-17b. Accurately and completely describes the required security functionality, and the allocation of security controls among physical and logical components; and
SA-17 b
(CCI-003295)
The design specification and security architecture accurately and completely describes the required security functionality.
SA-17 b
(CCI-003296)
The design specification and security architecture accurately and completely describes the allocation of security controls among physical and logical components.
SA-17c. Expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection.
SA-17 c
(CCI-003297)
The design specification and security architecture expresses how individual security functions, mechanisms, and services work together to provide required security capabilities and a unified approach to protection.
FORMAL POLICY MODEL
SA-17 (1) The organization requires the developer of the information system, system component, or information system service to:
SA-17 (1)(a) Produce, as an integral part of the development process, a formal policy model describing the [Assignment: organization-defined elements of organizational security policy] to be enforced; and
SA-17 (1) (a)
(CCI-003298)
The organization requires the developer of the information system, system component, or information system to produce, as an integral part of the development process, a formal policy model describing the organization-defined elements of organizational security policy to be enforced.
SA-17 (1) (a)
(CCI-003299)
The organization defines the elements of organization security policy to be described in the formal policy model for enforcement on the information system, system component, or information system service.
SA-17 (1)(b) Prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security policy when implemented.
SA-17 (1) (b)
(CCI-003300)
The organization requires the developer of the information system, system component, or information system service to prove that the formal policy model is internally consistent and sufficient to enforce the defined elements of the organizational security policy when implemented.
SECURITY-RELEVANT COMPONENTS
SA-17 (2) The organization requires the developer of the information system, system component, or information system service to:
SA-17 (2)(a) Define security-relevant hardware, software, and firmware; and
SA-17 (2) (a)
(CCI-003301)
The organization requires the developer of the information system, system component, or information system service to define security-relevant hardware.
SA-17 (2) (a)
(CCI-003302)
The organization requires the developer of the information system, system component, or information system service to define security-relevant hardware.
SA-17 (2) (a)
(CCI-003303)
The organization requires the developer of the information system, system component, or information system service to define security-relevant software.
SA-17 (2) (a)
(CCI-003304)
The organization requires the developer of the information system, system component, or information system service to define security-relevant firmware.
SA-17 (2) (a)
(CCI-003305)
The organization requires the developer of the information system, system component, or information system service to provide a rationale that the definition for security-relevant hardware is complete.
SA-17 (2)(b) Provide a rationale that the definition for security-relevant hardware, software, and firmware is complete.
SA-17 (2) (b)
(CCI-003306)
The organization requires the developer of the information system, system component, or information system service to provide a rationale that the definition for security-relevant software is complete.
SA-17 (2) (b)
(CCI-003307)
The organization requires the developer of the information system, system component, or information system service to provide a rationale that the definition for security-relevant firmware is complete.
FORMAL CORRESPONDENCE
SA-17 (3) The organization requires the developer of the information system, system component, or information system service to:
SA-17 (3)(a) Produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects;
SA-17 (3) (a)
(CCI-003308)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant hardware in terms of exceptions, error messages, and effects.
SA-17 (3) (a)
(CCI-003309)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant software in terms of exceptions, error messages, and effects.
SA-17 (3) (a)
(CCI-003310)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, a formal top-level specification that specifies the interfaces to security-relevant firmware in terms of exceptions, error messages, and effects.
SA-17 (3)(b) Show via proof to the extent feasible with additional informal demonstration as necessary, that the formal top-level specification is consistent with the formal policy model;
SA-17 (3) (b)
(CCI-003311)
The organization requires the developer of the information system, system component, or information system service to show via proof to the extent feasible with additional informal demonstration as necessary, that the formal top-level specification is consistent with the formal policy model.
SA-17 (3)(c) Show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware;
SA-17 (3) (c)
(CCI-003312)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant hardware.
SA-17 (3) (c)
(CCI-003313)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant software.
SA-17 (3) (c)
(CCI-003314)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the formal top-level specification completely covers the interfaces to security-relevant firmware.
SA-17 (3)(d) Show that the formal top-level specification is an accurate description of the implemented security-relevant hardware, software, and firmware; and
SA-17 (3) (d)
(CCI-003315)
The organization requires the developer of the information system, system component, or information system service to show that the formal top-level specification is an accurate description of the implemented security-relevant hardware.
SA-17 (3) (d)
(CCI-003316)
The organization requires the developer of the information system, system component, or information system service to show that the formal top-level specification is an accurate description of the implemented security-relevant software.
SA-17 (3) (d)
(CCI-003317)
The organization requires the developer of the information system, system component, or information system service to show that the formal top-level specification is an accurate description of the implemented security-relevant firmware.
SA-17 (3)(e) Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant hardware, software, and firmware.
SA-17 (3) (e)
(CCI-003318)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant hardware mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant hardware.
SA-17 (3) (e)
(CCI-003319)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant software mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant software.
SA-17 (3) (e)
(CCI-003320)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant firmware mechanisms not addressed in the formal top-level specification but strictly internal to the security-relevant firmware.
INFORMAL CORRESPONDENCE
SA-17 (4) The organization requires the developer of the information system, system component, or information system service to:
SA-17 (4)(a) Produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant hardware, software, and firmware in terms of exceptions, error messages, and effects;
SA-17 (4) (a)
(CCI-003321)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant hardware in terms of exceptions, error messages, and effects.
SA-17 (4) (a)
(CCI-003322)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant software in terms of exceptions, error messages, and effects.
SA-17 (4) (a)
(CCI-003323)
The organization requires the developer of the information system, system component, or information system service to produce, as an integral part of the development process, an informal descriptive top-level specification that specifies the interfaces to security-relevant firmware in terms of exceptions, error messages, and effects.
SA-17 (4)(b) Show via [Selection: informal demonstration, convincing argument with formal methods as feasible] that the descriptive top-level specification is consistent with the formal policy model;
SA-17 (4) (b)
(CCI-003324)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration or convincing argument with formal methods as feasible that the descriptive top-level specification is consistent with the formal policy model.
SA-17 (4)(c) Show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant hardware, software, and firmware;
SA-17 (4) (c)
(CCI-003325)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant hardware.
SA-17 (4) (c)
(CCI-003326)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant software.
SA-17 (4) (c)
(CCI-003327)
The organization requires the developer of the information system, system component, or information system service to show via informal demonstration, that the descriptive top-level specification completely covers the interfaces to security-relevant firmware.
SA-17 (4)(d) Show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware, software, and firmware; and
SA-17 (4) (d)
(CCI-003328)
The organization requires the developer of the information system, system component, or information system service to show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant hardware.
SA-17 (4) (d)
(CCI-003329)
The organization requires the developer of the information system, system component, or information system service to show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant software.
SA-17 (4) (d)
(CCI-003330)
The organization requires the developer of the information system, system component, or information system service to show that the descriptive top-level specification is an accurate description of the interfaces to security-relevant firmware.
SA-17 (4)(e) Describe the security-relevant hardware, software, and firmware mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant hardware, software, and firmware.
SA-17 (4) (e)
(CCI-003331)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant hardware mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant hardware.
SA-17 (4) (e)
(CCI-003332)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant software mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant software.
SA-17 (4) (e)
(CCI-003333)
The organization requires the developer of the information system, system component, or information system service to describe the security-relevant firmware mechanisms not addressed in the descriptive top-level specification but strictly internal to the security-relevant firmware.
CONCEPTUALLY SIMPLE DESIGN
SA-17 (5) The organization requires the developer of the information system, system component, or information system service to:
SA-17 (5)(a) Design and structure the security-relevant hardware, software, and firmware to use a complete, conceptually simple protection mechanism with precisely defined semantics; and
SA-17 (5) (a)
(CCI-003334)
The organization requires the developer of the information system, system component, or information system service to design and structure the security-relevant hardware to use a complete, conceptually simple protection mechanism with precisely defined semantics.
SA-17 (5) (a)
(CCI-003335)
The organization requires the developer of the information system, system component, or information system service to design and structure the security-relevant software to use a complete, conceptually simple protection mechanism with precisely defined semantics.
SA-17 (5) (a)
(CCI-003336)
The organization requires the developer of the information system, system component, or information system service to design and structure the security-relevant firmware to use a complete, conceptually simple protection mechanism with precisely defined semantics.
SA-17 (5)(b) Internally structure the security-relevant hardware, software, and firmware with specific regard for this mechanism.
SA-17 (5) (b)
(CCI-003337)
The organization requires the developer of the information system, system component, or information system service to internally structure the security-relevant hardware with specific regard for the complete, conceptually simple protection mechanism with precisely defined semantics.
SA-17 (5) (b)
(CCI-003338)
The organization requires the developer of the information system, system component, or information system service to internally structure the security-relevant software with specific regard for the complete, conceptually simple protection mechanism with precisely defined semantics.
SA-17 (5) (b)
(CCI-003339)
The organization requires the developer of the information system, system component, or information system service to internally structure the security-relevant firmware with specific regard for the complete, conceptually simple protection mechanism with precisely defined semantics.
STRUCTURE FOR TESTING
SA-17 (6) The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate testing.
SA-17 (6)
(CCI-003340)
The organization requires the developer of the information system, component, or information system service to structure security-relevant hardware to facilitate testing.
SA-17 (6)
(CCI-003341)
The organization requires the developer of the information system, component, or information system service to structure security-relevant software to facilitate testing.
SA-17 (6)
(CCI-003342)
The organization requires the developer of the information system, component, or information system service to structure security-relevant firmware to facilitate testing.
STRUCTURE FOR LEAST PRIVILEGE
SA-17 (7) The organization requires the developer of the information system, system component, or information system service to structure security-relevant hardware, software, and firmware to facilitate controlling access with least privilege.
SA-17 (7)
(CCI-003343)
The organization requires the developer of the information system, component, or information system service to structure security-relevant hardware to facilitate controlling access with least privilege.
SA-17 (7)
(CCI-003344)
The organization requires the developer of the information system, component, or information system service to structure security-relevant software to facilitate controlling access with least privilege.
SA-17 (7)
(CCI-003345)
The organization requires the developer of the information system, component, or information system service to structure security-relevant firmware to facilitate controlling access with least privilege.
SA-18 SYSTEM AND SERVICES ACQUISITION : TAMPER RESISTANCE AND DETECTION
SA-18 The organization implements a tamper protection program for the information system, system component, or information system service.
SA-18
(CCI-003346)
The organization implements a tamper protection program for the information system, system component, or information system service.
MULTIPLE PHASES OF SDLC
SA-18 (1) The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including design, development, integration, operations, and maintenance.
SA-18 (1)
(CCI-003347)
The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including design.
SA-18 (1)
(CCI-003348)
The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including development.
SA-18 (1)
(CCI-003349)
The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including integration.
SA-18 (1)
(CCI-003350)
The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including operations.
SA-18 (1)
(CCI-003351)
The organization employs anti-tamper technologies and techniques during multiple phases in the system development life cycle including maintenance.
INSPECTION OF INFORMATION SYSTEMS, COMPONENTS, OR DEVICES
SA-18 (2) The organization inspects [Assignment: organization-defined information systems, system components, or devices] [Selection (one or more): at random; at [Assignment: organization-defined frequency], upon [Assignment: organization-defined indications of need for inspection]] to detect tampering.
SA-18 (2)
(CCI-003352)
The organization inspects organization-defined information systems, system components, or devices at random, at an organization-defined frequency, and/or upon organization-defined indications of need for inspection to detect tampering.
SA-18 (2)
(CCI-003353)
The organization defines the information systems, system components, or devices to inspect at random, at an organization-defined frequency, and/or upon organization-defined indications of need for inspection to detect tampering.
SA-18 (2)
(CCI-003354)
The organization defines the frequency on which to inspect organization-defined information systems, system components, or devices to detect tampering.
SA-18 (2)
(CCI-003355)
The organization defines indications of need for inspection to detect tampering during inspections of organization-defined information systems, system components, or devices.
SA-19 SYSTEM AND SERVICES ACQUISITION : COMPONENT AUTHENTICITY
SA-19 The organization:
SA-19a. Develops and implements anti-counterfeit policy and procedures that include the means to detect and prevent counterfeit components from entering the information system; and
SA-19 a
(CCI-003356)
The organization develops an anti-counterfeit policy that includes the means to detect counterfeit components from entering the information system.
SA-19 a
(CCI-003357)
The organization develops an anti-counterfeit policy that includes the means to prevent counterfeit components from entering the information system.
SA-19 a
(CCI-003358)
The organization develops anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
SA-19 a
(CCI-003359)
The organization develops anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
SA-19 a
(CCI-003360)
The organization implements an anti-counterfeit policy that includes the means to detect counterfeit components from entering the information system.
SA-19 a
(CCI-003361)
The organization implements an anti-counterfeit policy that includes the means to prevent counterfeit components from entering the information system.
SA-19 a
(CCI-003362)
The organization implements anti-counterfeit procedures that include the means to detect counterfeit components from entering the information system.
SA-19 a
(CCI-003363)
The organization implements anti-counterfeit procedures that include the means to prevent counterfeit components from entering the information system.
SA-19b. Reports counterfeit information system components to [Selection (one or more): source of counterfeit component; [Assignment: organization-defined external reporting organizations]; [Assignment: organization-defined personnel or roles]].
SA-19 b
(CCI-003364)
The organization reports counterfeit information system components to the source of the counterfeit component, organization-defined external reporting organizations, and/or organization-defined personnel or roles.
SA-19 b
(CCI-003365)
The organization defines the external reporting organizations to which counterfeit information system components are to be reported.
SA-19 b
(CCI-003366)
The organization defines the personnel or roles to whom counterfeit information system components are to be reported.
ANTI-COUNTERFEIT TRAINING
SA-19 (1) The organization trains [Assignment: organization-defined personnel or roles] to detect counterfeit information system components (including hardware, software, and firmware).
SA-19 (1)
(CCI-003367)
The organization trains organization-defined personnel or roles to detect counterfeit information system components (including hardware, software, and firmware).
SA-19 (1)
(CCI-003368)
The organization defines the personnel or roles to be trained to detect counterfeit information system components (including hardware, software, and firmware).
CONFIGURATION CONTROL FOR COMPONENT SERVICE / REPAIR
SA-19 (2) The organization maintains configuration control over [Assignment: organization-defined information system components] awaiting service/repair and serviced/repaired components awaiting return to service.
SA-19 (2)
(CCI-003369)
The organization maintains configuration control over organization-defined information system components awaiting service/repair.
SA-19 (2)
(CCI-003370)
The organization defines the information system components awaiting service/repair over which configuration control must be maintained.
SA-19 (2)
(CCI-003371)
The organization maintains configuration control over serviced/repaired components awaiting return to service.
COMPONENT DISPOSAL
SA-19 (3) The organization disposes of information system components using [Assignment: organization-defined techniques and methods].
SA-19 (3)
(CCI-003390)
The organization defines the techniques and methods used to dispose of information system components.
SA-19 (3)
(CCI-003391)
The organization disposes of information system components using organization-defined techniques and methods.
ANTI-COUNTERFEIT SCANNING
SA-19 (4) The organization scans for counterfeit information system components [Assignment: organization-defined frequency].
SA-19 (4)
(CCI-003388)
The organization defines the frequency on which to scan for counterfeit information system components.
SA-19 (4)
(CCI-003389)
The organization scans for counterfeit information system components in accordance with organization-defined frequency.
SA-20 SYSTEM AND SERVICES ACQUISITION : CUSTOMIZED DEVELOPMENT OF CRITICAL COMPONENTS
SA-20 The organization re-implements or custom develops [Assignment: organization-defined critical information system components].
SA-20
(CCI-003386)
The organization defines the critical information system components to re-implement or custom develop.
SA-20
(CCI-003387)
The organization re-implements or custom develops organization-defined critical information system components.
SA-21 SYSTEM AND SERVICES ACQUISITION : DEVELOPER SCREENING
SA-21 The organization requires that the developer of [Assignment: organization-defined information system, system component, or information system service]:
SA-21a. Have appropriate access authorizations as determined by assigned [Assignment: organization-defined official government duties]; and
SA-21 a
(CCI-003383)
The organization defines the official government duties to be assigned to the developer of an organization-defined information system, system component, or information system service.
SA-21 a
(CCI-003385)
The organization requires that the developer of an organization-defined information system, system component, or information system service have appropriate access authorizations as determined by assigned organization-defined official government duties.
SA-21b. Satisfy [Assignment: organization-defined additional personnel screening criteria].
SA-21 b
(CCI-003381)
The organization defines additional personnel screening criteria that must be satisfied by the developer of an organization-defined information system, system component, or information system service.
SA-21 b
(CCI-003382)
The organization requires that the developer of an organization-defined information system, system component, or information system service satisfy organization-defined additional personnel screening criteria.
VALIDATION OF SCREENING
SA-21 (1) The organization requires the developer of the information system, system component, or information system service take [Assignment: organization-defined actions] to ensure that the required access authorizations and screening criteria are satisfied.
SA-21 (1)
(CCI-003377)
The organization defines the actions the developer of the information system, system component, or information system service must take to ensure the required screening criteria are satisfied.
SA-21 (1)
(CCI-003378)
The organization defines the actions the developer of the information system, system component, or information system service must take to ensure the required access authorizations are satisfied.
SA-21 (1)
(CCI-003379)
The organization requires the developer of the information system, system component, or information system service take organization-defined actions to ensure the required screening criteria are satisfied.
SA-21 (1)
(CCI-003380)
The organization requires the developer of the information system, system component, or information system service take organization-defined actions to ensure the required access authorizations are satisfied.
SA-22 SYSTEM AND SERVICES ACQUISITION : UNSUPPORTED SYSTEM COMPONENTS
SA-22 The organization:
SA-22a. Replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer; and
SA-22 a
(CCI-003376)
The organization replaces information system components when support for the components is no longer available from the developer, vendor, or manufacturer.
SA-22b. Provides justification and documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
SA-22 b
(CCI-003374)
The organization documents approval for the continued use of unsupported system components required to satisfy mission/business needs.
SA-22 b
(CCI-003375)
The organization provides justification for the continued use of unsupported system components required to satisfy mission/business needs.
ALTERNATIVE SOURCES FOR CONTINUED SUPPORT
SA-22 (1) The organization provides [Selection (one or more): in-house support; [Assignment: organization-defined support from external providers]] for unsupported information system components.
SA-22 (1)
(CCI-003372)
The organization defines the support from external providers to be provided for unsupported information system components.
SA-22 (1)
(CCI-003373)
The organization provides in-house support and/or organization-defined support from external providers for unsupported information system components.
SC-1 SYSTEM AND COMMUNICATIONS PROTECTION : SYSTEM AND COMMUNICATIONS PROTECTION POLICY AND PROCEDURES
SC-1 The organization:
SC-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
SC-1a.1. A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
SC-1 a 1
(CCI-001074)
The organization develops a system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
SC-1 a 1
(CCI-001075)
The organization disseminates to organization-defined personnel or roles the system and communications protection policy.
SC-1 a 1
(CCI-002377)
The organization documents the system and communications protection policy.
SC-1 a 1
(CCI-002378)
The organization defines the personnel or roles to be recipients of the system and communications protection policy.
SC-1a.2. Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and
SC-1 a 2
(CCI-001078)
The organization develops system and communications protection procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
SC-1 a 2
(CCI-001079)
The organization disseminates to organization-defined personnel or roles the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
SC-1 a 2
(CCI-002379)
The organization documents procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
SC-1 a 2
(CCI-002380)
The organization defines the personnel or roles to be recipients of the procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls.
SC-1b. Reviews and updates the current:
SC-1b.1. System and communications protection policy [Assignment: organization-defined frequency]; and
SC-1 b 1
(CCI-001076)
The organization reviews and updates the system and communications protection policy in accordance with organization-defined frequency.
SC-1 b 1
(CCI-001077)
The organization defines the frequency for reviewing and updating the system and communications protection policy.
SC-1b.2. System and communications protection procedures [Assignment: organization-defined frequency].
SC-1 b 2
(CCI-001080)
The organization reviews and updates the system and communications protection procedures in accordance with organization-defined frequency.
SC-1 b 2
(CCI-001081)
The organization defines the frequency of system and communications protection procedure reviews and updates.
SC-2 SYSTEM AND COMMUNICATIONS PROTECTION : APPLICATION PARTITIONING
SC-2 The information system separates user functionality (including user interface services) from information system management functionality.
SC-2
(CCI-001082)
The information system separates user functionality (including user interface services) from information system management functionality.
INTERFACES FOR NON-PRIVILEGED USERS
SC-2 (1) The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
SC-2 (1)
(CCI-001083)
The information system prevents the presentation of information system management-related functionality at an interface for non-privileged users.
SC-3 SYSTEM AND COMMUNICATIONS PROTECTION : SECURITY FUNCTION ISOLATION
SC-3 The information system isolates security functions from nonsecurity functions.
SC-3
(CCI-001084)
The information system isolates security functions from nonsecurity functions.
HARDWARE SEPARATION
SC-3 (1) The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
SC-3 (1)
(CCI-001085)
The information system utilizes underlying hardware separation mechanisms to implement security function isolation.
ACCESS / FLOW CONTROL FUNCTIONS
SC-3 (2) The information system isolates security functions enforcing access and information flow control from nonsecurity functions and from other security functions.
SC-3 (2)
(CCI-001086)
The information system isolates security functions enforcing access and information flow control from both nonsecurity functions and from other security functions.
MINIMIZE NONSECURITY FUNCTIONALITY
SC-3 (3) The organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
SC-3 (3)
(CCI-002381)
The organization minimizes the number of nonsecurity functions included within the isolation boundary containing security functions.
MODULE COUPLING AND COHESIVENESS
SC-3 (4) The organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
SC-3 (4)
(CCI-002382)
The organization implements security functions as largely independent modules that maximize internal cohesiveness within modules and minimize coupling between modules.
LAYERED STRUCTURES
SC-3 (5) The organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
SC-3 (5)
(CCI-001089)
The organization implements security functions as a layered structure minimizing interactions between layers of the design and avoiding any dependence by lower layers on the functionality or correctness of higher layers.
SC-4 SYSTEM AND COMMUNICATIONS PROTECTION : INFORMATION IN SHARED RESOURCES
SC-4 The information system prevents unauthorized and unintended information transfer via shared system resources.
SC-4
(CCI-001090)
The information system prevents unauthorized and unintended information transfer via shared system resources.
SECURITY LEVELS
SC-4 (1) [Withdrawn: Incorporated into SC-4].
PERIODS PROCESSING
SC-4 (2) The information system prevents unauthorized information transfer via shared resources in accordance with [Assignment: organization-defined procedures] when system processing explicitly switches between different information classification levels or security categories.
SC-4 (2)
(CCI-002383)
The organization defines the procedures to be employed to prevent unauthorized information transfer via shared resources when system processing explicitly switches between different information classification levels or security categories.
SC-4 (2)
(CCI-002384)
The information system prevents unauthorized information transfer via shared resources in accordance with organization-defined procedures when system processing explicitly switches between different information classification levels or security categories.
SC-5 SYSTEM AND COMMUNICATIONS PROTECTION : DENIAL OF SERVICE PROTECTION
SC-5 The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or reference to source for such information] by employing [Assignment: organization-defined security safeguards].
SC-5
(CCI-001093)
The organization defines the types of denial of service attacks (or provides references to sources of current denial of service attacks) that can be addressed by the information system.
SC-5
(CCI-002385)
The information system protects against or limits the effects of organization-defined types of denial of service attacks by employing organization-defined security safeguards.
SC-5
(CCI-002386)
The organization defines the security safeguards to be employed to protect the information system against, or limit the effects of, denial of service attacks.
RESTRICT INTERNAL USERS
SC-5 (1) The information system restricts the ability of individuals to launch [Assignment: organization-defined denial of service attacks] against other information systems.
SC-5 (1)
(CCI-001094)
The information system restricts the ability of individuals to launch organization-defined denial of service attacks against other information systems.
SC-5 (1)
(CCI-002387)
The organization defines the denial of service attacks against other information systems that the information system is to restrict the ability of individuals to launch.
EXCESS CAPACITY / BANDWIDTH / REDUNDANCY
SC-5 (2) The information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding denial of service attacks.
SC-5 (2)
(CCI-001095)
The information system manages excess capacity, bandwidth, or other redundancy to limit the effects of information flooding types of denial of service attacks.
DETECTION / MONITORING
SC-5 (3) The organization:
SC-5 (3)(a) Employs [Assignment: organization-defined monitoring tools] to detect indicators of denial of service attacks against the information system; and
SC-5 (3) (a)
(CCI-002388)
The organization defines a list of monitoring tools to be employed to detect indicators of denial of service attacks against the information system.
SC-5 (3) (a)
(CCI-002389)
The organization employs an organization-defined list of monitoring tools to detect indicators of denial of service attacks against the information system.
SC-5 (3)(b) Monitors [Assignment: organization-defined information system resources] to determine if sufficient resources exist to prevent effective denial of service attacks.
SC-5 (3) (b)
(CCI-002390)
The organization defines the information system resources to be monitored to determine if sufficient resources exist to prevent effective denial of service attacks.
SC-5 (3) (b)
(CCI-002391)
The organization monitors organization-defined information system resources to determine if sufficient resources exist to prevent effective denial of service attacks.
SC-6 SYSTEM AND COMMUNICATIONS PROTECTION : RESOURCE AVAILABILITY
SC-6 The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].
SC-6
(CCI-002392)
The organization defines the resources to be allocated to protect the availability of information system resources.
SC-6
(CCI-002393)
The organization defines the security safeguards to be employed to protect the availability of information system resources.
SC-6
(CCI-002394)
The information system protects the availability of resources by allocating organization-defined resources based on priority, quota, and/or organization-defined security safeguards.
SC-7 SYSTEM AND COMMUNICATIONS PROTECTION : BOUNDARY PROTECTION
SC-7 The information system:
SC-7a. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system;
SC-7 a
(CCI-001097)
The information system monitors and controls communications at the external boundary of the information system and at key internal boundaries within the system.
SC-7b. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and
SC-7 b
(CCI-002395)
The information system implements subnetworks for publicly accessible system components that are physically and/or logically separated from internal organizational networks.
SC-7c. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
SC-7 c
(CCI-001098)
The information system connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
PHYSICALLY SEPARATED SUBNETWORKS
SC-7 (1) [Withdrawn: Incorporated into SC-7].
PUBLIC ACCESS
SC-7 (2) [Withdrawn: Incorporated into SC-7].
ACCESS POINTS
SC-7 (3) The organization limits the number of external network connections to the information system.
SC-7 (3)
(CCI-001101)
The organization limits the number of external network connections to the information system.
EXTERNAL TELECOMMUNICATIONS SERVICES
SC-7 (4) The organization:
SC-7 (4)(a) Implements a managed interface for each external telecommunication service;
SC-7 (4) (a)
(CCI-001102)
The organization implements a managed interface for each external telecommunication service.
SC-7 (4)(b) Establishes a traffic flow policy for each managed interface;
SC-7 (4) (b)
(CCI-001103)
The organization establishes a traffic flow policy for each managed interface for each external telecommunication service.
SC-7 (4)(c) Protects the confidentiality and integrity of the information being transmitted across each interface;
SC-7 (4) (c)
(CCI-002396)
The organization protects the confidentiality and integrity of the information being transmitted across each interface for each external telecommunication service.
SC-7 (4)(d) Documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and
SC-7 (4) (d)
(CCI-001105)
The organization documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need for each external telecommunication service.
SC-7 (4)(e) Reviews exceptions to the traffic flow policy [Assignment: organization-defined frequency] and removes exceptions that are no longer supported by an explicit mission/business need.
SC-7 (4) (e)
(CCI-001106)
The organization reviews exceptions to the traffic flow policy on an organization-defined frequency for each external telecommunication service.
SC-7 (4) (e)
(CCI-001107)
The organization defines a frequency for the review of exceptions to the traffic flow policy for each external telecommunication service.
SC-7 (4) (e)
(CCI-001108)
The organization removes traffic flow policy exceptions that are no longer supported by an explicit mission/business need for each external telecommunication service.
DENY BY DEFAULT / ALLOW BY EXCEPTION
SC-7 (5) The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
SC-7 (5)
(CCI-001109)
The information system at managed interfaces denies network communications traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).
RESPONSE TO RECOGNIZED FAILURES
SC-7 (6) [Withdrawn: Incorporated into SC-7 (18)].
PREVENT SPLIT TUNNELING FOR REMOTE DEVICES
SC-7 (7) The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks.
SC-7 (7)
(CCI-002397)
The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks.
ROUTE TRAFFIC TO AUTHENTICATED PROXY SERVERS
SC-7 (8) The information system routes [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.
SC-7 (8)
(CCI-001112)
The information system routes organization-defined internal communications traffic to organization-defined external networks through authenticated proxy servers at managed interfaces.
SC-7 (8)
(CCI-001113)
The organization defines the internal communications traffic to be routed to external networks.
SC-7 (8)
(CCI-001114)
The organization defines the external networks to which organization-defined internal communications traffic should be routed.
RESTRICT THREATENING OUTGOING COMMUNICATIONS TRAFFIC
SC-7 (9) The information system:
SC-7 (9)(a) Detects and denies outgoing communications traffic posing a threat to external information systems; and
SC-7 (9) (a)
(CCI-002398)
The information system detects outgoing communications traffic posing a threat to external information systems.
SC-7 (9) (a)
(CCI-002399)
The information system denies outgoing communications traffic posing a threat to external information systems.
SC-7 (9)(b) Audits the identity of internal users associated with denied communications.
SC-7 (9) (b)
(CCI-002400)
The information system audits the identity of internal users associated with denied outgoing communications traffic posing a threat to external information systems.
PREVENT UNAUTHORIZED EXFILTRATION
SC-7 (10) The organization prevents the unauthorized exfiltration of information across managed interfaces.
SC-7 (10)
(CCI-001116)
The organization prevents the unauthorized exfiltration of information across managed interfaces.
RESTRICT INCOMING COMMUNICATIONS TRAFFIC
SC-7 (11) The information system only allows incoming communications from [Assignment: organization-defined authorized sources] routed to [Assignment: organization-defined authorized destinations].
SC-7 (11)
(CCI-002401)
The organization defines the authorized sources from which the information system will allow incoming communications.
SC-7 (11)
(CCI-002402)
The organization defines the authorized destinations for routing inbound communications.
SC-7 (11)
(CCI-002403)
The information system only allows incoming communications from organization-defined authorized sources routed to organization-defined authorized destinations.
HOST-BASED PROTECTION
SC-7 (12) The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].
SC-7 (12)
(CCI-002404)
The organization defines the host-based boundary protection mechanisms that are to be implemented at organization-defined information system components.
SC-7 (12)
(CCI-002405)
The organization defines the information system components at which organization-defined host-based boundary protection mechanisms will be implemented.
SC-7 (12)
(CCI-002406)
The organization implements organization-defined host-based boundary protection mechanisms at organization-defined information system components.
ISOLATION OF SECURITY TOOLS / MECHANISMS / SUPPORT COMPONENTS
SC-7 (13) The organization isolates [Assignment: organization-defined information security tools, mechanisms, and support components] from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
SC-7 (13)
(CCI-001119)
The organization isolates organization-defined information security tools, mechanisms, and support components from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
SC-7 (13)
(CCI-001120)
The organization defines key information security tools, mechanisms, and support components to be isolated.
PROTECTS AGAINST UNAUTHORIZED PHYSICAL CONNECTIONS
SC-7 (14) The organization protects against unauthorized physical connections at [Assignment: organization-defined managed interfaces].
SC-7 (14)
(CCI-001121)
The organization protects against unauthorized physical connections at organization-defined managed interfaces.
SC-7 (14)
(CCI-001122)
The organization defines the managed interfaces where boundary protections against unauthorized physical connections are to be implemented.
SC-7 (14)
(CCI-002407)
The organization defines the managed interfaces at which the organization protects against unauthorized physical connections.
ROUTE PRIVILEGED NETWORK ACCESSES
SC-7 (15) The information system routes all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
SC-7 (15)
(CCI-001123)
The information system routes all networked, privileged accesses through a dedicated, managed interface for purposes of access control and auditing.
PREVENT DISCOVERY OF COMPONENTS / DEVICES
SC-7 (16) The information system prevents discovery of specific system components composing a managed interface.
SC-7 (16)
(CCI-001124)
The information system prevents discovery of specific system components composing a managed interface.
AUTOMATED ENFORCEMENT OF PROTOCOL FORMATS
SC-7 (17) The information system enforces adherence to protocol formats.
SC-7 (17)
(CCI-001125)
The information system enforces adherence to protocol format.
FAIL SECURE
SC-7 (18) The information system fails securely in the event of an operational failure of a boundary protection device.
SC-7 (18)
(CCI-001126)
The information system fails securely in the event of an operational failure of a boundary protection device.
BLOCKS COMMUNICATION FROM NON-ORGANIZATIONALLY CONFIGURED HOSTS
SC-7 (19) The information system blocks both inbound and outbound communications traffic between [Assignment: organization-defined communication clients] that are independently configured by end users and external service providers.
SC-7 (19)
(CCI-002408)
The organization defines the independently configured communication clients, which are configured by end users and external service providers, between which the information system will block both inbound and outbound communications traffic.
SC-7 (19)
(CCI-002409)
The information system blocks both inbound and outbound communications traffic between organization-defined communication clients that are independently configured by end users and external service providers.
DYNAMIC ISOLATION / SEGREGATION
SC-7 (20) The information system provides the capability to dynamically isolate/segregate [Assignment: organization-defined information system components] from other components of the system.
SC-7 (20)
(CCI-002410)
The organization defines information system components that are to be dynamically isolated/segregated from other components of the information system.
SC-7 (20)
(CCI-002411)
The information system provides the capability to dynamically isolate/segregate organization-defined information system components from other components of the system.
ISOLATION OF INFORMATION SYSTEM COMPONENTS
SC-7 (21) The organization employs boundary protection mechanisms to separate [Assignment: organization-defined information system components] supporting [Assignment: organization-defined missions and/or business functions].
SC-7 (21)
(CCI-002412)
The organization defines the information system components supporting organization-defined missions and/or business functions that are to be separated using boundary protection mechanisms.
SC-7 (21)
(CCI-002413)
The organization defines the information system components supporting organization-defined missions and/or business functions that are to be separated using boundary protection mechanisms.
SC-7 (21)
(CCI-002414)
The organization defines the missions and/or business functions for which boundary protection mechanisms will be employed to separate the supporting organization-defined information system components.
SC-7 (21)
(CCI-002415)
The organization employs boundary protection mechanisms to separate organization-defined information system components supporting organization-defined missions and/or business functions.
SEPARATE SUBNETS FOR CONNECTING TO DIFFERENT SECURITY DOMAINS
SC-7 (22) The information system implements separate network addresses (i.e., different subnets) to connect to systems in different security domains.
SC-7 (22)
(CCI-002416)
The information system implements separate network addresses (i.e., different subnets) to connect to systems in different security domains.
DISABLE SENDER FEEDBACK ON PROTOCOL VALIDATION FAILURE
SC-7 (23) The information system disables feedback to senders on protocol format validation failure.
SC-7 (23)
(CCI-002417)
The information system disables feedback to senders on protocol format validation failure.
SC-8 SYSTEM AND COMMUNICATIONS PROTECTION : TRANSMISSION CONFIDENTIALITY AND INTEGRITY
SC-8 The information system protects the [Selection (one or more): confidentiality; integrity] of transmitted information.
SC-8
(CCI-002418)
The information system protects the confidentiality and/or integrity of transmitted information.
CRYPTOGRAPHIC OR ALTERNATE PHYSICAL PROTECTION
SC-8 (1) The information system implements cryptographic mechanisms to [Selection (one or more): prevent unauthorized disclosure of information; detect changes to information] during transmission unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
SC-8 (1)
(CCI-002419)
The organization defines the alternative physical safeguards to be employed when cryptographic mechanisms are not implemented to protect information during transmission.
SC-8 (1)
(CCI-002421)
The information system implements cryptographic mechanisms to prevent unauthorized disclosure of information and/or detect changes to information during transmission unless otherwise protected by organization-defined alternative physical safeguards.
PRE / POST TRANSMISSION HANDLING
SC-8 (2) The information system maintains the [Selection (one or more): confidentiality; integrity] of information during preparation for transmission and during reception.
SC-8 (2)
(CCI-002420)
The information system maintains the confidentiality and/or integrity of information during preparation for transmission.
SC-8 (2)
(CCI-002422)
The information system maintains the confidentiality and/or integrity of information during reception.
CRYPTOGRAPHIC PROTECTION FOR MESSAGE EXTERNALS
SC-8 (3) The information system implements cryptographic mechanisms to protect message externals unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
SC-8 (3)
(CCI-002423)
The information system implements cryptographic mechanisms to protect message externals (e.g., message headers and routing information) unless otherwise protected by organization-defined alternative physical safeguards.
SC-8 (3)
(CCI-002427)
The organization defines the alternative physical safeguards to be employed to protect message externals (e.g., message headers and routing information) when cryptographic mechanisms are not implemented.
CONCEAL / RANDOMIZE COMMUNICATIONS
SC-8 (4) The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by [Assignment: organization-defined alternative physical safeguards].
SC-8 (4)
(CCI-002424)
The organization defines the alternative physical safeguards to be employed when cryptographic mechanisms are not implemented by the information system.
SC-8 (4)
(CCI-002425)
The information system implements cryptographic mechanisms to conceal or randomize communication patterns unless otherwise protected by organization-defined alternative physical safeguards.
SC-9 SYSTEM AND COMMUNICATIONS PROTECTION : TRANSMISSION CONFIDENTIALITY
SC-9 [Withdrawn: Incorporated into SC-8].
SC-10 SYSTEM AND COMMUNICATIONS PROTECTION : NETWORK DISCONNECT
SC-10 The information system terminates the network connection associated with a communications session at the end of the session or after [Assignment: organization-defined time period] of inactivity.
SC-10
(CCI-001133)
The information system terminates the network connection associated with a communications session at the end of the session or after an organization-defined time period of inactivity.
SC-10
(CCI-001134)
The organization defines the time period of inactivity after which the information system terminates a network connection associated with a communications session.
SC-11 SYSTEM AND COMMUNICATIONS PROTECTION : TRUSTED PATH
SC-11 The information system establishes a trusted communications path between the user and the following security functions of the system: [Assignment: organization-defined security functions to include at a minimum, information system authentication and re-authentication].
SC-11
(CCI-001661)
The organization defines the security functions, to minimally include information system authentication and re-authentication, within the information system to be included in a trusted communications path.
SC-11
(CCI-001135)
The information system establishes a trusted communications path between the user and organization-defined security functions within the information system.
LOGICAL ISOLATION
SC-11 (1) The information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
SC-11 (1)
(CCI-002426)
The information system provides a trusted communications path that is logically isolated and distinguishable from other paths.
SC-12 SYSTEM AND COMMUNICATIONS PROTECTION : CRYPTOGRAPHIC KEY ESTABLISHMENT AND MANAGEMENT
SC-12 The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
SC-12
(CCI-002428)
The organization defines the requirements for cryptographic key generation to be employed within the information system.
SC-12
(CCI-002429)
The organization defines the requirements for cryptographic key distribution to be employed within the information system.
SC-12
(CCI-002430)
The organization defines the requirements for cryptographic key storage to be employed within the information system.
SC-12
(CCI-002431)
The organization defines the requirements for cryptographic key access to be employed within the information system.
SC-12
(CCI-002432)
The organization defines the requirements for cryptographic key destruction to be employed within the information system.
SC-12
(CCI-002433)
The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
SC-12
(CCI-002434)
The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
SC-12
(CCI-002435)
The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
SC-12
(CCI-002436)
The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
SC-12
(CCI-002437)
The organization establishes cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
SC-12
(CCI-002438)
The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation.
SC-12
(CCI-002439)
The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key distribution.
SC-12
(CCI-002440)
The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key storage.
SC-12
(CCI-002441)
The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key access.
SC-12
(CCI-002442)
The organization manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key destruction.
AVAILABILITY
SC-12 (1) The organization maintains availability of information in the event of the loss of cryptographic keys by users.
SC-12 (1)
(CCI-001139)
The organization maintains availability of information in the event of the loss of cryptographic keys by users.
SYMMETRIC KEYS
SC-12 (2) The organization produces, controls, and distributes symmetric cryptographic keys using [Selection: NIST FIPS-compliant; NSA-approved] key management technology and processes.
SC-12 (2)
(CCI-002443)
The organization produces symmetric cryptographic keys using NIST FIPS-compliant or NSA-approved key management technology and processes.
SC-12 (2)
(CCI-002444)
The organization controls symmetric cryptographic keys using NIST FIPS-compliant or NSA-approved key management technology and processes.
SC-12 (2)
(CCI-002445)
The organization distributes symmetric cryptographic keys using NIST FIPS-compliant or NSA-approved key management technology and processes.
ASYMMETRIC KEYS
SC-12 (3) The organization produces, controls, and distributes asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user�s private key].
SC-12 (3)
(CCI-002446)
The organization produces asymmetric cryptographic keys using: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; or approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user's private key.
SC-12 (3)
(CCI-002447)
The organization controls asymmetric cryptographic keys using: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; or approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user's private key.
SC-12 (3)
(CCI-002448)
The organization distributes asymmetric cryptographic keys using: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; or approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user's private key.
PKI CERTIFICATES
SC-12 (4) [Withdrawn: Incorporated into SC-12].
PKI CERTIFICATES / HARDWARE TOKENS
SC-12 (5) [Withdrawn: Incorporated into SC-12].
SC-13 SYSTEM AND COMMUNICATIONS PROTECTION : CRYPTOGRAPHIC PROTECTION
SC-13 The information system implements [Assignment: organization-defined cryptographic uses and type of cryptography required for each use] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
SC-13
(CCI-002449)
The organization defines the cryptographic uses, and type of cryptography required for each use, to be implemented by the information system.
SC-13
(CCI-002450)
The information system implements organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
FIPS-VALIDATED CRYPTOGRAPHY
SC-13 (1) [Withdrawn: Incorporated into SC-13].
NSA-APPROVED CRYPTOGRAPHY
SC-13 (2) [Withdrawn: Incorporated into SC-13].
INDIVIDUALS WITHOUT FORMAL ACCESS APPROVALS
SC-13 (3) [Withdrawn: Incorporated into SC-13].
DIGITAL SIGNATURES
SC-13 (4) [Withdrawn: Incorporated into SC-13].
SC-14 SYSTEM AND COMMUNICATIONS PROTECTION : PUBLIC ACCESS PROTECTIONS
SC-14 [Withdrawn: Capability provided by AC-2, AC-3, AC-5, AC-6, SI-3, SI-4, SI-5, SI-7, SI-10].
SC-15 SYSTEM AND COMMUNICATIONS PROTECTION : COLLABORATIVE COMPUTING DEVICES
SC-15 The information system:
SC-15a. Prohibits remote activation of collaborative computing devices with the following exceptions: [Assignment: organization-defined exceptions where remote activation is to be allowed]; and
SC-15 a
(CCI-001150)
The information system prohibits remote activation of collaborative computing devices, excluding the organization-defined exceptions where remote activation is to be allowed.
SC-15 a
(CCI-001151)
The organization defines exceptions to the prohibition of collaborative computing devices where remote activation is to be allowed.
SC-15b. Provides an explicit indication of use to users physically present at the devices.
SC-15 b
(CCI-001152)
The information system provides an explicit indication of use to users physically present at collaborative computing devices.
PHYSICAL DISCONNECT
SC-15 (1) The information system provides physical disconnect of collaborative computing devices in a manner that supports ease of use.
SC-15 (1)
(CCI-001153)
The information system provides physical disconnect of collaborative computing devices in a manner that supports ease of use.
BLOCKING INBOUND / OUTBOUND COMMUNICATIONS TRAFFIC
SC-15 (2) [Withdrawn: Incorporated into SC-7].
DISABLING / REMOVAL IN SECURE WORK AREAS
SC-15 (3) The organization disables or removes collaborative computing devices from [Assignment: organization-defined information systems or information system components] in [Assignment: organization-defined secure work areas].
SC-15 (3)
(CCI-001155)
The organization disables or removes collaborative computing devices from organization-defined information systems or information system components in organization-defined secure work areas.
SC-15 (3)
(CCI-001156)
The organization defines secure work areas where collaborative computing devices are to be disabled or removed.
SC-15 (3)
(CCI-002451)
The organization defines the information systems or information system components from which collaborative computing devices in organization-defined secure work areas are to be disabled or removed.
EXPLICITLY INDICATE CURRENT PARTICIPANTS
SC-15 (4) The information system provides an explicit indication of current participants in [Assignment: organization-defined online meetings and teleconferences].
SC-15 (4)
(CCI-002452)
The organization defines the online meetings and teleconferences for which the information system provides an explicit indication of current participants.
SC-15 (4)
(CCI-002453)
The information system provides an explicit indication of current participants in organization-defined online meetings and teleconferences.
SC-16 SYSTEM AND COMMUNICATIONS PROTECTION : TRANSMISSION OF SECURITY ATTRIBUTES
SC-16 The information system associates [Assignment: organization-defined security attributes] with information exchanged between information systems and between system components.
SC-16
(CCI-001157)
The information system associates organization-defined security attributes with information exchanged between information systems.
SC-16
(CCI-002454)
The organization defines the security attributes the information system is to associate with the information being exchanged between information systems and between information system components.
SC-16
(CCI-002455)
The information system associates organization-defined security attributes with information exchanged between information system components.
INTEGRITY VALIDATION
SC-16 (1) The information system validates the integrity of transmitted security attributes.
SC-16 (1)
(CCI-001158)
The information system validates the integrity of transmitted security attributes.
SC-17 SYSTEM AND COMMUNICATIONS PROTECTION : PUBLIC KEY INFRASTRUCTURE CERTIFICATES
SC-17 The organization issues public key certificates under an [Assignment: organization-defined certificate policy] or obtains public key certificates from an approved service provider.
SC-17
(CCI-001159)
The organization issues public key certificates under an organization-defined certificate policy or obtains public key certificates from an approved service provider.
SC-17
(CCI-002456)
The organization defines the certificate policy employed to issue public key certificates.
SC-18 SYSTEM AND COMMUNICATIONS PROTECTION : MOBILE CODE
SC-18 The organization:
SC-18a. Defines acceptable and unacceptable mobile code and mobile code technologies;
SC-18 a
(CCI-001160)
The organization defines acceptable and unacceptable mobile code and mobile code technologies.
SC-18b. Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and
SC-18 b
(CCI-001162)
The organization establishes implementation guidance for acceptable mobile code and mobile code technologies.
SC-18 b
(CCI-001161)
The organization establishes usage restrictions for acceptable mobile code and mobile code technologies.
SC-18c. Authorizes, monitors, and controls the use of mobile code within the information system.
SC-18 c
(CCI-001163)
The organization authorizes the use of mobile code within the information system.
SC-18 c
(CCI-001164)
The organization monitors the use of mobile code within the information system.
SC-18 c
(CCI-001165)
The organization controls the use of mobile code within the information system.
IDENTIFY UNACCEPTABLE CODE / TAKE CORRECTIVE ACTIONS
SC-18 (1) The information system identifies [Assignment: organization-defined unacceptable mobile code] and takes [Assignment: organization-defined corrective actions].
SC-18 (1)
(CCI-001662)
The information system takes organization-defined corrective action when organization-defined unacceptable mobile code is identified.
SC-18 (1)
(CCI-001166)
The information system identifies organization-defined unacceptable mobile code.
SC-18 (1)
(CCI-002457)
The organization defines the corrective actions to be taken when organization-defined unacceptable mobile code is identified.
SC-18 (1)
(CCI-002458)
The organization defines what constitutes unacceptable mobile code for its information systems.
ACQUISITION / DEVELOPMENT / USE
SC-18 (2) The organization ensures that the acquisition, development, and use of mobile code to be deployed in the information system meets [Assignment: organization-defined mobile code requirements].
SC-18 (2)
(CCI-001167)
The organization ensures the development of mobile code to be deployed in information systems meets organization-defined mobile code requirements.
SC-18 (2)
(CCI-001168)
The organization defines requirements for the acquisition, development, and use of mobile code.
SC-18 (2)
(CCI-001687)
The organization ensures the use of mobile code to be deployed in information systems meets organization-defined mobile code requirements.
SC-18 (2)
(CCI-001688)
The organization ensures the acquisition of mobile code to be deployed in information systems meets organization-defined mobile code requirements.
PREVENT DOWNLOADING / EXECUTION
SC-18 (3) The information system prevents the download and execution of [Assignment: organization-defined unacceptable mobile code].
SC-18 (3)
(CCI-001169)
The information system prevents the download of organization-defined unacceptable mobile code.
SC-18 (3)
(CCI-001695)
The information system prevents the execution of organization-defined unacceptable mobile code.
SC-18 (3)
(CCI-002459)
The organization defines the unacceptable mobile code of which the information system is to prevent download and execution.
PREVENT AUTOMATIC EXECUTION
SC-18 (4) The information system prevents the automatic execution of mobile code in [Assignment: organization-defined software applications] and enforces [Assignment: organization-defined actions] prior to executing the code.
SC-18 (4)
(CCI-001170)
The information system prevents the automatic execution of mobile code in organization-defined software applications.
SC-18 (4)
(CCI-001171)
The organization defines software applications in which automatic mobile code execution is to be prohibited.
SC-18 (4)
(CCI-001172)
The organization defines actions to be enforced by the information system before executing mobile code.
SC-18 (4)
(CCI-002460)
The information system enforces organization-defined actions prior to executing mobile code.
ALLOW EXECUTION ONLY IN CONFINED ENVIRONMENTS
SC-18 (5) The organization allows execution of permitted mobile code only in confined virtual machine environments.
SC-18 (5)
(CCI-002461)
The organization allows execution of permitted mobile code only in confined virtual machine environments.
SC-19 SYSTEM AND COMMUNICATIONS PROTECTION : VOICE OVER INTERNET PROTOCOL
SC-19 The organization:
SC-19a. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
SC-19 a
(CCI-001173)
The organization establishes usage restrictions for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
SC-19 a
(CCI-001174)
The organization establishes implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously.
SC-19b. Authorizes, monitors, and controls the use of VoIP within the information system.
SC-19 b
(CCI-001175)
The organization authorizes the use of VoIP within the information system.
SC-19 b
(CCI-001176)
The organization monitors the use of VoIP within the information system.
SC-19 b
(CCI-001177)
The organization controls the use of VoIP within the information system.
SC-20 SYSTEM AND COMMUNICATIONS PROTECTION : SECURE NAME / ADDRESS RESOLUTION SERVICE (AUTHORITATIVE SOURCE)
SC-20 The information system:
SC-20a. Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and
SC-20 a
(CCI-001178)
The information system provides additional data origin authentication artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
SC-20 a
(CCI-002462)
The information system provides additional data integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries.
SC-20b. Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
SC-20 b
(CCI-001663)
The information system, when operating as part of a distributed, hierarchical namespace, provides the means to enable verification of a chain of trust among parent and child domains (if the child supports secure resolution services).
SC-20 b
(CCI-001179)
The information system, when operating as part of a distributed, hierarchical namespace, provides the means to indicate the security status of child zones.
CHILD SUBSPACES
SC-20 (1) [Withdrawn: Incorporated into SC-20].
DATA ORIGIN / INTEGRITY
SC-20 (2) The information system provides data origin and integrity protection artifacts for internal name/address resolution queries.
SC-20 (2)
(CCI-002463)
The information system provides data origin artifacts for internal name/address resolution queries.
SC-20 (2)
(CCI-002464)
The information system provides data integrity protection artifacts for internal name/address resolution queries.
SC-21 SYSTEM AND COMMUNICATIONS PROTECTION : SECURE NAME / ADDRESS RESOLUTION SERVICE (RECURSIVE OR CACHING RESOLVER)
SC-21 The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-21
(CCI-002465)
The information system requests data origin authentication verification on the name/address resolution responses the system receives from authoritative sources.
SC-21
(CCI-002466)
The information system requests data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-21
(CCI-002467)
The information system performs data integrity verification on the name/address resolution responses the system receives from authoritative sources.
SC-21
(CCI-002468)
The information system performs data origin verification authentication on the name/address resolution responses the system receives from authoritative sources.
DATA ORIGIN / INTEGRITY
SC-21 (1) [Withdrawn: Incorporated into SC-21].
SC-22 SYSTEM AND COMMUNICATIONS PROTECTION : ARCHITECTURE AND PROVISIONING FOR NAME / ADDRESS RESOLUTION SERVICE
SC-22 The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.
SC-22
(CCI-001182)
The information systems that collectively provide name/address resolution service for an organization are fault-tolerant.
SC-22
(CCI-001183)
The information systems that collectively provide name/address resolution service for an organization implement internal/external role separation.
SC-23 SYSTEM AND COMMUNICATIONS PROTECTION : SESSION AUTHENTICITY
SC-23 The information system protects the authenticity of communications sessions.
SC-23
(CCI-001184)
The information system protects the authenticity of communications sessions.
INVALIDATE SESSION IDENTIFIERS AT LOGOUT
SC-23 (1) The information system invalidates session identifiers upon user logout or other session termination.
SC-23 (1)
(CCI-001185)
The information system invalidates session identifiers upon user logout or other session termination.
USER-INITIATED LOGOUTS / MESSAGE DISPLAYS
SC-23 (2) [Withdrawn: Incorporated into AC-12 (1)].
UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION
SC-23 (3) The information system generates a unique session identifier for each session with [Assignment: organization-defined randomness requirements] and recognizes only session identifiers that are system-generated.
SC-23 (3)
(CCI-001664)
The information system recognizes only session identifiers that are system-generated.
SC-23 (3)
(CCI-001188)
The information system generates unique session identifiers for each session with organization-defined randomness requirements.
SC-23 (3)
(CCI-001189)
The organization defines randomness requirements for generating unique session identifiers.
UNIQUE SESSION IDENTIFIERS WITH RANDOMIZATION
SC-23 (4) [Withdrawn: Incorporated into SC-23 (3)].
ALLOWED CERTIFICATE AUTHORITIES
SC-23 (5) The information system only allows the use of [Assignment: organization-defined certificate authorities] for verification of the establishment of protected sessions.
SC-23 (5)
(CCI-002469)
The organization defines the certificate authorities the information system will allow to be used on the information system.
SC-23 (5)
(CCI-002470)
The information system only allows the use of organization-defined certificate authorities for verification of the establishment of protected sessions.
SC-24 SYSTEM AND COMMUNICATIONS PROTECTION : FAIL IN KNOWN STATE
SC-24 The information system fails to a [Assignment: organization-defined known-state] for [Assignment: organization-defined types of failures] preserving [Assignment: organization-defined system state information] in failure.
SC-24
(CCI-001665)
The information system preserves organization-defined system state information in the event of a system failure.
SC-24
(CCI-001190)
The information system fails to an organization-defined known-state for organization-defined types of failures.
SC-24
(CCI-001191)
The organization defines the known states the information system should fail to in the event of an organization-defined system failure.
SC-24
(CCI-001192)
The organization defines types of failures for which the information system should fail to an organization-defined known state.
SC-24
(CCI-001193)
The organization defines system state information that should be preserved in the event of a system failure.
SC-25 SYSTEM AND COMMUNICATIONS PROTECTION : THIN NODES
SC-25 The organization employs [Assignment: organization-defined information system components] with minimal functionality and information storage.
SC-25
(CCI-001194)
The information system employs organization-defined information system components with minimal functionality and information storage.
SC-25
(CCI-002471)
The organization defines the information system components, with minimal functionality and information storage, to be employed.
SC-26 SYSTEM AND COMMUNICATIONS PROTECTION : HONEYPOTS
SC-26 The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
SC-26
(CCI-001195)
The information system includes components specifically designed to be the target of malicious attacks for the purpose of detecting, deflecting, and analyzing such attacks.
DETECTION OF MALICIOUS CODE
SC-26 (1) [Withdrawn: Incorporated into SC-35].
SC-27 SYSTEM AND COMMUNICATIONS PROTECTION : PLATFORM-INDEPENDENT APPLICATIONS
SC-27 The information system includes: [Assignment: organization-defined platform-independent applications].
SC-27
(CCI-001197)
The information system includes organization-defined platform-independent applications.
SC-27
(CCI-001198)
The organization defines applications that are platform independent.
SC-28 SYSTEM AND COMMUNICATIONS PROTECTION : PROTECTION OF INFORMATION AT REST
SC-28 The information system protects the [Selection (one or more): confidentiality; integrity] of [Assignment: organization-defined information at rest].
SC-28
(CCI-001199)
The information system protects the confidentiality and/or integrity of organization-defined information at rest.
SC-28
(CCI-002472)
The organization defines the information at rest that is to be protected by the information system.
CRYPTOGRAPHIC PROTECTION
SC-28 (1) The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components].
SC-28 (1)
(CCI-002473)
The organization defines the information at rest for which cryptographic mechanisms will be implemented.
SC-28 (1)
(CCI-002474)
The organization defines the information system components which require the implementation of cryptographic mechanisms to prevent unauthorized disclosure and modification of organization-defined information at rest.
SC-28 (1)
(CCI-002475)
The information system implements cryptographic mechanisms to prevent unauthorized modification of organization-defined information at rest on organization-defined information system components.
SC-28 (1)
(CCI-002476)
The information system implements cryptographic mechanisms to prevent unauthorized disclosure of organization-defined information at rest on organization-defined information system components.
OFF-LINE STORAGE
SC-28 (2) The organization removes from online storage and stores off-line in a secure location [Assignment: organization-defined information].
SC-28 (2)
(CCI-002477)
The organization defines the information at rest to be removed from online storage and stored in an off-line secure location.
SC-28 (2)
(CCI-002478)
The organization removes organization-defined information at rest from online storage.
SC-28 (2)
(CCI-002479)
The organization stores organization-defined information at rest in an off-line secure location.
SC-29 SYSTEM AND COMMUNICATIONS PROTECTION : HETEROGENEITY
SC-29 The organization employs a diverse set of information technologies for [Assignment: organization-defined information system components] in the implementation of the information system.
SC-29
(CCI-001201)
The organization employs a diverse set of information technologies for organization-defined information system components in the implementation of the information system.
SC-29
(CCI-002480)
The organization defines the information system components for which a diverse set of information technologies are to be employed.
VIRTUALIZATION TECHNIQUES
SC-29 (1) The organization employs virtualization techniques to support the deployment of a diversity of operating systems and applications that are changed [Assignment: organization-defined frequency].
SC-29 (1)
(CCI-001203)
The organization employs virtualization techniques to support the deployment of a diversity of operating systems that are changed on an organization-defined frequency.
SC-29 (1)
(CCI-001204)
The organization defines the frequency of changes to operating systems and applications to support a diversity of deployments.
SC-29 (1)
(CCI-002481)
The organization employs virtualization techniques to support the deployment of a diversity of applications that are changed per organization-defined frequency.
SC-30 SYSTEM AND COMMUNICATIONS PROTECTION : CONCEALMENT AND MISDIRECTION
SC-30 The organization employs [Assignment: organization-defined concealment and misdirection techniques] for [Assignment: organization-defined information systems] at [Assignment: organization-defined time periods] to confuse and mislead adversaries.
SC-30
(CCI-002482)
The organization defines the concealment and misdirection techniques employed for organization-defined information systems to confuse and mislead adversaries.
SC-30
(CCI-002483)
The organization defines the information systems for which organization-defined concealment and misdirection techniques are to be employed.
SC-30
(CCI-002484)
The organization defines the time periods at which it will employ organization-defined concealment and misdirection techniques on organization-defined information systems.
SC-30
(CCI-002485)
The organization employs organization-defined concealment and misdirection techniques for organization-defined information systems at organization-defined time periods to confuse and mislead adversaries.
VIRTUALIZATION TECHNIQUES
SC-30 (1) [Withdrawn: Incorporated into SC-29 (1)].
RANDOMNESS
SC-30 (2) The organization employs [Assignment: organization-defined techniques] to introduce randomness into organizational operations and assets.
SC-30 (2)
(CCI-002486)
The organization defines the techniques to be employed to introduce randomness into organizational operations and assets.
SC-30 (2)
(CCI-002487)
The organization employs organization-defined techniques to introduce randomness into organizational operations.
SC-30 (2)
(CCI-002488)
The organization employs organization-defined techniques to introduce randomness into organizational assets.
CHANGE PROCESSING / STORAGE LOCATIONS
SC-30 (3) The organization changes the location of [Assignment: organization-defined processing and/or storage] [Selection: [Assignment: organization-defined time frequency]; at random time intervals]].
SC-30 (3)
(CCI-002489)
The organization defines the processing and/or storage locations to be changed at random intervals or at an organization-defined frequency.
SC-30 (3)
(CCI-002490)
The organization defines the frequency at which it changes the location of organization-defined processing and/or storage.
SC-30 (3)
(CCI-002491)
The organization changes the location of organization-defined processing and/or storage at an organization-defined time frequency or at random time intervals.
SC-30 (3)
(CCI-002492)
The organization changes the location of organization-defined processing and/or storage at an organization-defined time frequency or at random time intervals.
MISLEADING INFORMATION
SC-30 (4) The organization employs realistic, but misleading information in [Assignment: organization-defined information system components] with regard to its security state or posture.
SC-30 (4)
(CCI-002493)
The organization defines the information system components in which it will employ realistic but misleading information regarding its security state or posture.
SC-30 (4)
(CCI-002494)
The organization employs realistic, but misleading, information in organization-defined information system components with regard to its security state or posture.
CONCEALMENT OF SYSTEM COMPONENTS
SC-30 (5) The organization employs [Assignment: organization-defined techniques] to hide or conceal [Assignment: organization-defined information system components].
SC-30 (5)
(CCI-002495)
The organization defines the techniques to be employed to hide or conceal organization-defined information system components.
SC-30 (5)
(CCI-002496)
The organization defines the information system components to be hidden or concealed.
SC-30 (5)
(CCI-002497)
The organization employs organization-defined techniques to hide or conceal organization-defined information system components.
SC-31 SYSTEM AND COMMUNICATIONS PROTECTION : COVERT CHANNEL ANALYSIS
SC-31 The organization:
SC-31a. Performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert [Selection (one or more): storage; timing] channels; and
SC-31 a
(CCI-002498)
The organization performs a covert channel analysis to identify those aspects of communications within the information system that are potential avenues for covert storage and/or timing channels.
SC-31b. Estimates the maximum bandwidth of those channels.
SC-31 b
(CCI-002499)
The organization estimates the maximum bandwidth of the covert storage and timing channels.
TEST COVERT CHANNELS FOR EXPLOITABILITY
SC-31 (1) The organization tests a subset of the identified covert channels to determine which channels are exploitable.
SC-31 (1)
(CCI-001207)
The organization tests a subset of the identified covert channels to determine which channels are exploitable.
MAXIMUM BANDWIDTH
SC-31 (2) The organization reduces the maximum bandwidth for identified covert [Selection (one or more); storage; timing] channels to [Assignment: organization-defined values].
SC-31 (2)
(CCI-002500)
The organization defines the maximum bandwidth values to which covert storage and/or timing channels are to be reduced.
SC-31 (2)
(CCI-002501)
The organization reduces the maximum bandwidth for identified covert storage and/or timing channels to organization-defined values.
MEASURE BANDWIDTH IN OPERATIONAL ENVIRONMENTS
SC-31 (3) The organization measures the bandwidth of [Assignment: organization-defined subset of identified covert channels] in the operational environment of the information system.
SC-31 (3)
(CCI-002502)
The organization defines the subset of identified covert channels in the operational environment of the information system that are to have the bandwidth measured.
SC-31 (3)
(CCI-002503)
The organization measures the bandwidth of an organization-defined subset of identified covert channels in the operational environment of the information system.
SC-32 SYSTEM AND COMMUNICATIONS PROTECTION : INFORMATION SYSTEM PARTITIONING
SC-32 The organization partitions the information system into [Assignment: organization-defined information system components] residing in separate physical domains or environments based on [Assignment: organization-defined circumstances for physical separation of components].
SC-32
(CCI-002504)
The organization defines the information system components into which the information system is partitioned.
SC-32
(CCI-002505)
The organization defines the circumstances under which the information system components are to be physically separated to support partitioning.
SC-32
(CCI-002506)
The organization partitions the information system into organization-defined information system components residing in separate physical domains or environments based on organization-defined circumstances for physical separation of components.
SC-33 SYSTEM AND COMMUNICATIONS PROTECTION : TRANSMISSION PREPARATION INTEGRITY
SC-33 [Withdrawn: Incorporated into SC-8].
SC-34 SYSTEM AND COMMUNICATIONS PROTECTION : NON-MODIFIABLE EXECUTABLE PROGRAMS
SC-34 The information system at [Assignment: organization-defined information system components]:
SC-34
(CCI-001212)
The organization defines information system components on which the operating environment and organization-defined applications are loaded and executed from hardware-enforced, read-only media.
SC-34a. Loads and executes the operating environment from hardware-enforced, read-only media; and
SC-34 a
(CCI-001210)
The information system, at organization-defined information system components, loads and executes the operating environment from hardware-enforced, read-only media.
SC-34b. Loads and executes [Assignment: organization-defined applications] from hardware-enforced, read-only media.
SC-34 b
(CCI-001211)
The information system, at organization-defined information system components, loads and executes organization-defined applications from hardware-enforced, read-only media.
SC-34 b
(CCI-001213)
The organization defines applications that will be loaded and executed from hardware-enforced, read-only media.
NO WRITABLE STORAGE
SC-34 (1) The organization employs [Assignment: organization-defined information system components] with no writeable storage that is persistent across component restart or power on/off.
SC-34 (1)
(CCI-001214)
The organization employs organization-defined information system components with no writeable storage that are persistent across component restart or power on/off.
SC-34 (1)
(CCI-001215)
The organization defines the information system components to be employed with no writeable storage.
INTEGRITY PROTECTION / READ-ONLY MEDIA
SC-34 (2) The organization protects the integrity of information prior to storage on read-only media and controls the media after such information has been recorded onto the media.
SC-34 (2)
(CCI-001216)
The organization protects the integrity of information prior to storage on read-only media.
SC-34 (2)
(CCI-002507)
The organization controls read-only media after information has been recorded onto the media.
HARDWARE-BASED PROTECTION
SC-34 (3) The organization:
SC-34 (3)(a) Employs hardware-based, write-protect for [Assignment: organization-defined information system firmware components]; and
SC-34 (3) (a)
(CCI-002508)
The organization defines the information system firmware components for which hardware-based, write-protect is employed.
SC-34 (3) (a)
(CCI-002509)
The organization employs hardware-based, write-protect for organization-defined information system firmware components.
SC-34 (3)(b) Implements specific procedures for [Assignment: organization-defined authorized individuals] to manually disable hardware write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.
SC-34 (3) (b)
(CCI-002510)
The organization defines the individuals authorized to manually disable hardware-based, write-protect for firmware modifications and re-enable the write-protect prior to returning to operational mode.
SC-34 (3) (b)
(CCI-002511)
The organization implements specific procedures for organization-defined authorized individuals to manually disable hardware-based, write-protect for firmware modifications.
SC-34 (3) (b)
(CCI-002512)
The organization implements specific procedures for organization-defined authorized individuals to manually re-enable hardware write-protect prior to returning to operational mode.
SC-35 SYSTEM AND COMMUNICATIONS PROTECTION : HONEYCLIENTS
SC-35 The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
SC-35
(CCI-001196)
The information system includes components that proactively seek to identify malicious websites and/or web-based malicious code.
SC-36 SYSTEM AND COMMUNICATIONS PROTECTION : DISTRIBUTED PROCESSING AND STORAGE
SC-36 The organization distributes [Assignment: organization-defined processing and storage] across multiple physical locations.
SC-36
(CCI-002513)
The organization defines the processing that is to be distributed across multiple physical locations.
SC-36
(CCI-002514)
The organization defines the storage that is to be distributed across multiple physical locations.
SC-36
(CCI-002515)
The organization distributes organization-defined processing across multiple physical locations.
SC-36
(CCI-002516)
The organization distributes organization-defined storage across multiple physical locations.
POLLING TECHNIQUES
SC-36 (1) The organization employs polling techniques to identify potential faults, errors, or compromises to [Assignment: organization-defined distributed processing and storage components].
SC-36 (1)
(CCI-002517)
The organization defines the distributed processing components that are to be polled to identify potential faults, errors, or compromises.
SC-36 (1)
(CCI-002518)
The organization defines the distributed storage components that are to be polled to identify potential faults, errors, or compromises.
SC-36 (1)
(CCI-002519)
The organization employs polling techniques to identify potential faults, errors, or compromises to organization-defined distributed processing components.
SC-36 (1)
(CCI-002520)
The organization employs polling techniques to identify potential faults, errors, or compromises to organization-defined distributed storage components.
SC-37 SYSTEM AND COMMUNICATIONS PROTECTION : OUT-OF-BAND CHANNELS
SC-37 The organization employs [Assignment: organization-defined out-of-band channels] for the physical delivery or electronic transmission of [Assignment: organization-defined information, information system components, or devices] to [Assignment: organization-defined individuals or information systems].
SC-37
(CCI-002521)
The organization defines the out-of-band channels to be employed for the physical delivery or electronic transmission of organization-defined information, information system components, or devices.
SC-37
(CCI-002522)
The organization defines the information, information system components, or devices that are to be electronically transmitted or physically delivered via organization-defined out-of-band channels.
SC-37
(CCI-002524)
The organization employs organization-defined out-of-band channels for the electronic transmission or physical delivery of organization-defined information, information system components, or devices to organization-defined individuals or information systems.
ENSURE DELIVERY / TRANSMISSION
SC-37 (1) The organization employs [Assignment: organization-defined security safeguards] to ensure that only [Assignment: organization-defined individuals or information systems] receive the [Assignment: organization-defined information, information system components, or devices].
SC-37 (1)
(CCI-002525)
The organization defines the security safeguards to be employed to ensure only organization-defined individuals or information systems receive organization-defined information, information system components, or devices.
SC-37 (1)
(CCI-002526)
The organization defines the information, information system components, or devices which are to be received only by organization-defined individuals or information systems.
SC-37 (1)
(CCI-002527)
The organization employs organization-defined security safeguards to ensure only organization-defined individuals or information systems receive the organization-defined information, information system components, or devices.
SC-38 SYSTEM AND COMMUNICATIONS PROTECTION : OPERATIONS SECURITY
SC-38 The organization employs [Assignment: organization-defined operations security safeguards] to protect key organizational information throughout the system development life cycle.
SC-38
(CCI-002528)
The organization defines the operations security safeguards to be employed to protect key organizational information throughout the system development life cycle.
SC-38
(CCI-002529)
The organization employs organization-defined operations security safeguards to protect key organizational information throughout the system development life cycle.
SC-39 SYSTEM AND COMMUNICATIONS PROTECTION : PROCESS ISOLATION
SC-39 The information system maintains a separate execution domain for each executing process.
SC-39
(CCI-002530)
The information system maintains a separate execution domain for each executing process.
HARDWARE SEPARATION
SC-39 (1) The information system implements underlying hardware separation mechanisms to facilitate process separation.
SC-39 (1)
(CCI-002531)
The information system implements underlying hardware separation mechanisms to facilitate process separation.
THREAD ISOLATION
SC-39 (2) The information system maintains a separate execution domain for each thread in [Assignment: organization-defined multi-threaded processing].
SC-39 (2)
(CCI-002532)
The organization defines the multi-threaded processing in which a separate execution domain is maintained by the information system for each thread.
SC-39 (2)
(CCI-002533)
The information system maintains a separate execution domain for each thread in organization-defined multi-threaded processing.
SC-40 SYSTEM AND COMMUNICATIONS PROTECTION : WIRELESS LINK PROTECTION
SC-40 The information system protects external and internal [Assignment: organization-defined wireless links] from [Assignment: organization-defined types of signal parameter attacks or references to sources for such attacks].
SC-40
(CCI-002534)
The organization defines types of signal parameter attacks or references to sources for such attacks from which the information system protects organization-defined wireless links.
SC-40
(CCI-002535)
The organization defines the external and internal wireless links the information system is to protect from organization-defined types of signal parameter attacks or references to sources for such attacks.
SC-40
(CCI-002536)
The information system protects organization-defined external and internal wireless links from organization-defined types of signal parameter attacks or references to sources for such attacks.
ELECTROMAGNETIC INTERFERENCE
SC-40 (1) The information system implements cryptographic mechanisms that achieve [Assignment: organization-defined level of protection] against the effects of intentional electromagnetic interference.
SC-40 (1)
(CCI-002537)
The organization defines the level of protection against the effects of intentional electromagnetic interference to be achieved by implemented cryptographic mechanisms.
SC-40 (1)
(CCI-002538)
The information system implements cryptographic mechanisms that achieve an organization-defined level of protection against the effects of intentional electromagnetic interference.
REDUCE DETECTION POTENTIAL
SC-40 (2) The information system implements cryptographic mechanisms to reduce the detection potential of wireless links to [Assignment: organization-defined level of reduction].
SC-40 (2)
(CCI-002539)
The organization defines the level of reduction the information system is to implement to reduce the detection potential of wireless links.
SC-40 (2)
(CCI-002540)
The information system implements cryptographic mechanisms to reduce the detection potential of wireless links to an organization-defined level of reduction.
IMITATIVE OR MANIPULATIVE COMMUNICATIONS DECEPTION
SC-40 (3) The information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
SC-40 (3)
(CCI-002541)
The information system implements cryptographic mechanisms to identify and reject wireless transmissions that are deliberate attempts to achieve imitative or manipulative communications deception based on signal parameters.
SIGNAL PARAMETER IDENTIFICATION
SC-40 (4) The information system implements cryptographic mechanisms to prevent the identification of [Assignment: organization-defined wireless transmitters] by using the transmitter signal parameters.
SC-40 (4)
(CCI-002542)
The organization defines the wireless transmitters that are to have cryptographic mechanisms implemented by the information system to prevent the identification of the wireless transmitters.
SC-40 (4)
(CCI-002543)
The information system implements cryptographic mechanisms to prevent the identification of organization-defined wireless transmitters by using the transmitter signal parameters.
SC-41 SYSTEM AND COMMUNICATIONS PROTECTION : PORT AND I/O DEVICE ACCESS
SC-41 The organization physically disables or removes [Assignment: organization-defined connection ports or input/output devices] on [Assignment: organization-defined information systems or information system components].
SC-41
(CCI-002544)
The organization defines the information systems or information system components on which organization-defined connection ports or input/output devices are to be physically disabled or removed.
SC-41
(CCI-002545)
The organization defines the connection ports or input/output devices that are to be physically disabled or removed from organization-defined information systems or information system components.
SC-41
(CCI-002546)
The organization physically disables or removes organization-defined connection ports or input/output devices on organization-defined information systems or information system components.
SC-42 SYSTEM AND COMMUNICATIONS PROTECTION : SENSOR CAPABILITY AND DATA
SC-42 The information system:
SC-42a. Prohibits the remote activation of environmental sensing capabilities with the following exceptions: [Assignment: organization-defined exceptions where remote activation of sensors is allowed]; and
SC-42 a
(CCI-002547)
The organization defines the exceptions where remote activation of sensors is allowed.
SC-42 a
(CCI-002548)
The information system prohibits the remote activation of environmental sensing capabilities except for the organization-defined exceptions where remote activation of sensors is allowed.
SC-42b. Provides an explicit indication of sensor use to [Assignment: organization-defined class of users].
SC-42 b
(CCI-002549)
The organization defines the class of users to receive explicit indication of sensor use.
SC-42 b
(CCI-002550)
The information system provides an explicit indication of sensor use to the organization-defined class of users.
REPORTING TO AUTHORIZED INDIVIDUALS OR ROLES
SC-42 (1) The organization ensures that the information system is configured so that data or information collected by the [Assignment: organization-defined sensors] is only reported to authorized individuals or roles.
SC-42 (1)
(CCI-002551)
The organization defines the sensors to be configured so that collected data or information is reported only to authorized individuals or roles.
SC-42 (1)
(CCI-002552)
The organization ensures that the information system is configured so that data or information collected by the organization-defined sensors is only reported to authorized individuals or roles.
AUTHORIZED USE
SC-42 (2) The organization employs the following measures: [Assignment: organization-defined measures], so that data or information collected by [Assignment: organization-defined sensors] is only used for authorized purposes.
SC-42 (2)
(CCI-002553)
The organization defines the measures to be employed to ensure data or information collected by organization-defined sensors is used only for authorized purposes.
SC-42 (2)
(CCI-002554)
The organization defines the sensors that are to collect data or information for authorized purposes.
SC-42 (2)
(CCI-002555)
The organization employs organization-defined measures, so that data or information collected by organization-defined sensors is only used for authorized purposes.
PROHIBIT USE OF DEVICES
SC-42 (3) The organization prohibits the use of devices possessing [Assignment: organization-defined environmental sensing capabilities] in [Assignment: organization-defined facilities, areas, or systems].
SC-42 (3)
(CCI-002556)
The organization defines the environmental sensing capabilities prohibited on devices used in organization-defined facilities, areas, or systems.
SC-42 (3)
(CCI-002557)
The organization defines the facilities, areas, or systems where devices processing organization-defined environmental sensing capabilities are prohibited.
SC-42 (3)
(CCI-002558)
The organization prohibits the use of devices possessing organization-defined environmental sensing capabilities in organization-defined facilities, areas, or systems.
SC-43 SYSTEM AND COMMUNICATIONS PROTECTION : USAGE RESTRICTIONS
SC-43 The organization:
SC-43a. Establishes usage restrictions and implementation guidance for [Assignment: organization-defined information system components] based on the potential to cause damage to the information system if used maliciously; and
SC-43 a
(CCI-002559)
The organization defines the information system components for which usage restrictions and implementation guidance are to be established.
SC-43 a
(CCI-002560)
The organization establishes usage restrictions and implementation guidance for organization-defined information system components based on the potential to cause damage to the information system if used maliciously.
SC-43b. Authorizes, monitors, and controls the use of such components within the information system.
SC-43 b
(CCI-002561)
The organization authorizes the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
SC-43 b
(CCI-002562)
The organization monitors the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
SC-43 b
(CCI-002563)
The organization controls the use of organization-defined information system components which have the potential to cause damage to the information system if used maliciously.
SC-44 SYSTEM AND COMMUNICATIONS PROTECTION : DETONATION CHAMBERS
SC-44 The organization employs a detonation chamber capability within [Assignment: organization-defined information system, system component, or location].
SC-44
(CCI-002564)
The organization defines the information system, system component, or location where a detonation chamber (i.e., dynamic execution environments) capability is employed.
SC-44
(CCI-002565)
The organization employs a detonation chamber (i.e., dynamic execution environments) capability within an organization-defined information system, system component, or location.
SI-1 SYSTEM AND INFORMATION INTEGRITY : SYSTEM AND INFORMATION INTEGRITY POLICY AND PROCEDURES
SI-1 The organization:
SI-1a. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
SI-1 a
(CCI-002601)
The organization defines the personnel or roles to whom the system and information integrity policy and procedures are to be disseminated.
SI-1a.1. A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
SI-1 a 1
(CCI-001217)
The organization develops and documents a system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
SI-1 a 1
(CCI-001218)
The organization disseminates the system and information integrity policy to organization-defined personnel or roles.
SI-1a.2. Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and
SI-1 a 2
(CCI-001220)
The organization develops and documents procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
SI-1 a 2
(CCI-001221)
The organization disseminates to organization-defined personnel or roles procedures to facilitate the implementation of the system and information integrity policy and associated system integrity controls.
SI-1b. Reviews and updates the current:
SI-1b.1. System and information integrity policy [Assignment: organization-defined frequency]; and
SI-1 b 1
(CCI-001219)
The organization reviews and updates system and information integrity policy in accordance with organization-defined frequency.
SI-1 b 1
(CCI-001223)
The organization defines the frequency of system and information integrity policy reviews and updates.
SI-1b.2. System and information integrity procedures [Assignment: organization-defined frequency].
SI-1 b 2
(CCI-001222)
The organization reviews and updates system and information integrity procedures in accordance with organization-defined frequency.
SI-1 b 2
(CCI-001224)
The organization defines the frequency of system and information integrity procedure reviews and updates.
SI-2 SYSTEM AND INFORMATION INTEGRITY : FLAW REMEDIATION
SI-2 The organization:
SI-2a. Identifies, reports, and corrects information system flaws;
SI-2 a
(CCI-001225)
The organization identifies information system flaws.
SI-2 a
(CCI-001226)
The organization reports information system flaws.
SI-2 a
(CCI-001227)
The organization corrects information system flaws.
SI-2b. Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;
SI-2 b
(CCI-001228)
The organization tests software updates related to flaw remediation for effectiveness before installation.
SI-2 b
(CCI-001229)
The organization tests software updates related to flaw remediation for potential side effects before installation.
SI-2 b
(CCI-002602)
The organization tests firmware updates related to flaw remediation for effectiveness before installation.
SI-2 b
(CCI-002603)
The organization tests firmware updates related to flaw remediation for potential side effects before installation.
SI-2c. Installs security-relevant software and firmware updates within [Assignment: organization-defined time period] of the release of the updates; and
SI-2 c
(CCI-002604)
The organization defines the time period following the release of updates within which security-related software updates are to be installed.
SI-2 c
(CCI-002605)
The organization installs security-relevant software updates within an organization-defined time period of the release of the updates.
SI-2 c
(CCI-002606)
The organization defines the time period following the release of updates within which security-related firmware updates are to be installed.
SI-2 c
(CCI-002607)
The organization installs security-relevant firmware updates within an organization-defined time period of the release of the updates.
SI-2d. Incorporates flaw remediation into the organizational configuration management process.
SI-2 d
(CCI-001230)
The organization incorporates flaw remediation into the organizational configuration management process.
CENTRAL MANAGEMENT
SI-2 (1) The organization centrally manages the flaw remediation process.
SI-2 (1)
(CCI-001231)
The organization centrally manages the flaw remediation process.
AUTOMATED FLAW REMEDIATION STATUS
SI-2 (2) The organization employs automated mechanisms [Assignment: organization-defined frequency] to determine the state of information system components with regard to flaw remediation.
SI-2 (2)
(CCI-001233)
The organization employs automated mechanisms on an organization-defined frequency to determine the state of information system components with regard to flaw remediation.
SI-2 (2)
(CCI-001234)
The organization defines a frequency for employing automated mechanisms to determine the state of information system components with regard to flaw remediation.
TIME TO REMEDIATE FLAWS / BENCHMARKS FOR CORRECTIVE ACTIONS
SI-2 (3) The organization:
SI-2 (3)(a) Measures the time between flaw identification and flaw remediation; and
SI-2 (3) (a)
(CCI-001235)
The organization measures the time between flaw identification and flaw remediation.
SI-2 (3)(b) Establishes [Assignment: organization-defined benchmarks] for taking corrective actions.
SI-2 (3) (b)
(CCI-001236)
The organization defines benchmarks for the time taken to apply corrective actions after flaw identification.
SI-2 (3) (b)
(CCI-002608)
The organization establishes organization-defined benchmarks for the time taken to apply corrective actions after flaw identification.
AUTOMATED PATCH MANAGEMENT TOOLS
SI-2 (4) [Withdrawn: Incorporated into SI-2].
AUTOMATIC SOFTWARE / FIRMWARE UPDATES
SI-2 (5) The organization installs [Assignment: organization-defined security-relevant software and firmware updates] automatically to [Assignment: organization-defined information system components].
SI-2 (5)
(CCI-002609)
The organization defines the information system components on which organization-defined security-relevant software updates will be automatically installed.
SI-2 (5)
(CCI-002610)
The organization defines the information system components on which organization-defined security-relevant firmware updates will be automatically installed.
SI-2 (5)
(CCI-002611)
The organization defines the security-relevant software updates to be automatically installed on organization-defined information system components.
SI-2 (5)
(CCI-002612)
The organization defines the security-relevant firmware updates to be automatically installed on organization-defined information system components.
SI-2 (5)
(CCI-002613)
The organization installs organization-defined security-relevant software updates automatically to organization-defined information system components.
SI-2 (5)
(CCI-002614)
The organization installs organization-defined security-relevant firmware updates automatically to organization-defined information system components.
REMOVAL OF PREVIOUS VERSIONS OF SOFTWARE / FIRMWARE
SI-2 (6) The organization removes [Assignment: organization-defined software and firmware components] after updated versions have been installed.
SI-2 (6)
(CCI-002615)
The organization defines the software components to be removed (e.g., previous versions) after updated versions have been installed.
SI-2 (6)
(CCI-002616)
The organization defines the firmware components to be removed (e.g., previous versions) after updated versions have been installed.
SI-2 (6)
(CCI-002617)
The organization removes organization-defined software components (e.g., previous versions) after updated versions have been installed.
SI-2 (6)
(CCI-002618)
The organization removes organization-defined firmware components (e.g., previous versions) after updated versions have been installed.
SI-3 SYSTEM AND INFORMATION INTEGRITY : MALICIOUS CODE PROTECTION
SI-3 The organization:
SI-3a. Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;
SI-3 a
(CCI-002619)
The organization employs malicious code protection mechanisms at information system entry points to detect malicious code.
SI-3 a
(CCI-002620)
The organization employs malicious code protection mechanisms at information system exit points to detect malicious code.
SI-3 a
(CCI-002621)
The organization employs malicious code protection mechanisms at information system entry points to eradicate malicious code.
SI-3 a
(CCI-002622)
The organization employs malicious code protection mechanisms at information system exit points to eradicate malicious code.
SI-3b. Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;
SI-3 b
(CCI-001240)
The organization updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures.
SI-3c. Configures malicious code protection mechanisms to:
SI-3c.1. Perform periodic scans of the information system [Assignment: organization-defined frequency] and real-time scans of files from external sources at [Selection (one or more); endpoint; network entry/exit points] as the files are downloaded, opened, or executed in accordance with organizational security policy; and
SI-3 c 1
(CCI-001241)
The organization configures malicious code protection mechanisms to perform periodic scans of the information system on an organization-defined frequency.
SI-3 c 1
(CCI-001242)
The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at endpoints as the files are downloaded, opened, or executed in accordance with organizational security policy.
SI-3 c 1
(CCI-002623)
The organization defines the frequency for performing periodic scans of the information system for malicious code.
SI-3 c 1
(CCI-002624)
The organization configures malicious code protection mechanisms to perform real-time scans of files from external sources at network entry/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy.
SI-3c.2. [Selection (one or more): block malicious code; quarantine malicious code; send alert to administrator; [Assignment: organization-defined action]] in response to malicious code detection; and
SI-3 c 2
(CCI-001243)
The organization configures malicious code protection mechanisms to perform organization-defined action(s) in response to malicious code detection.
SI-3 c 2
(CCI-001244)
The organization defines one or more actions to perform in response to malicious code detection, such as blocking malicious code, quarantining malicious code, or sending alerts to administrators.
SI-3d. Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
SI-3 d
(CCI-001245)
The organization addresses the receipt of false positives during malicious code detection and eradication, and the resulting potential impact on the availability of the information system.
CENTRAL MANAGEMENT
SI-3 (1) The organization centrally manages malicious code protection mechanisms.
SI-3 (1)
(CCI-001246)
The organization centrally manages malicious code protection mechanisms.
AUTOMATIC UPDATES
SI-3 (2) The information system automatically updates malicious code protection mechanisms.
SI-3 (2)
(CCI-001247)
The information system automatically updates malicious code protection mechanisms.
NON-PRIVILEGED USERS
SI-3 (3) [Withdrawn: Incorporated into AC-6 (10)].
UPDATES ONLY BY PRIVILEGED USERS
SI-3 (4) The information system updates malicious code protection mechanisms only when directed by a privileged user.
SI-3 (4)
(CCI-001249)
The information system updates malicious code protection mechanisms only when directed by a privileged user.
PORTABLE STORAGE DEVICES
SI-3 (5) [Withdrawn: Incorporated into MP-7].
TESTING / VERIFICATION
SI-3 (6) The organization:
SI-3 (6)(a) Tests malicious code protection mechanisms [Assignment: organization-defined frequency] by introducing a known benign, non-spreading test case into the information system; and
SI-3 (6) (a)
(CCI-001669)
The organization defines the frequency of testing malicious code protection mechanisms.
SI-3 (6) (a)
(CCI-001251)
The organization tests malicious code protection mechanisms on an organization-defined frequency by introducing a known benign, non-spreading test case into the information system.
SI-3 (6)(b) Verifies that both detection of the test case and associated incident reporting occur.
SI-3 (6) (b)
(CCI-002625)
The organization, when testing malicious code protection mechanisms, verifies the detection of the test case occurs.
SI-3 (6) (b)
(CCI-002626)
The organization, when testing malicious code protection mechanisms, verifies the incident reporting of the test case occurs.
NONSIGNATURE-BASED DETECTION
SI-3 (7) The information system implements nonsignature-based malicious code detection mechanisms.
SI-3 (7)
(CCI-002627)
The information system implements nonsignature-based malicious code detection mechanisms.
DETECT UNAUTHORIZED COMMANDS
SI-3 (8) The information system detects [Assignment: organization-defined unauthorized operating system commands] through the kernel application programming interface at [Assignment: organization-defined information system hardware components] and [Selection (one or more): issues a warning; audits the command execution; prevents the execution of the command].
SI-3 (8)
(CCI-002628)
The organization defines the unauthorized operating system commands that are to be detected through the kernel application programming interface by organization-defined information system hardware components.
SI-3 (8)
(CCI-002629)
The organization defines the information system hardware components that are to detect organization-defined unauthorized operating system commands through the kernel programming application interface.
SI-3 (8)
(CCI-002630)
The information system detects organization-defined unauthorized operating system commands through the kernel application programming interface at organization-defined information system hardware components.
SI-3 (8)
(CCI-002631)
The information system issues a warning, audits the command execution, or prevents the execution of the command when organization-defined unauthorized operating system commands are detected.
AUTHENTICATE REMOTE COMMANDS
SI-3 (9) The information system implements [Assignment: organization-defined security safeguards] to authenticate [Assignment: organization-defined remote commands].
SI-3 (9)
(CCI-002632)
The organization defines the remote commands that are to be authenticated using organization-defined safeguards for malicious code protection.
SI-3 (9)
(CCI-002633)
The organization defines the security safeguards to be implemented to authenticate organization-defined remote commands for malicious code protection.
SI-3 (9)
(CCI-002637)
The information system implements organization-defined security safeguards to authenticate organization-defined remote commands for malicious code protection.
MALICIOUS CODE ANALYSIS
SI-3 (10) The organization:
SI-3 (10)(a) Employs [Assignment: organization-defined tools and techniques] to analyze the characteristics and behavior of malicious code; and
SI-3 (10) (a)
(CCI-002634)
The organization defines the tools to be employed to analyze the characteristics and behavior of malicious code.
SI-3 (10) (a)
(CCI-002635)
The organization defines the techniques to be employed to analyze the characteristics and behavior of malicious code.
SI-3 (10) (a)
(CCI-002636)
The organization employs organization-defined tools to analyze the characteristics and behavior of malicious code.
SI-3 (10) (a)
(CCI-002638)
The organization employs organization-defined techniques to analyze the characteristics and behavior of malicious code.
SI-3 (10)(b) Incorporates the results from malicious code analysis into organizational incident response and flaw remediation processes.
SI-3 (10) (b)
(CCI-002639)
The organization incorporates the results from malicious code analysis into organizational incident response processes.
SI-3 (10) (b)
(CCI-002640)
The organization incorporates the results from malicious code analysis into organizational flaw remediation processes.
SI-4 SYSTEM AND INFORMATION INTEGRITY : INFORMATION SYSTEM MONITORING
SI-4 The organization:
SI-4
(CCI-002653)
The organization provides organization-defined information system monitoring information to organization-defined personnel or roles as needed or per organization-defined frequency.
SI-4a. Monitors the information system to detect:
SI-4a.1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and
SI-4 a 1
(CCI-001253)
The organization defines the objectives of monitoring for attacks and indicators of potential attacks on the information system.
SI-4 a 1
(CCI-002641)
The organization monitors the information system to detect attacks and indicators of potential attacks in accordance with organization-defined monitoring objectives.
SI-4a.2. Unauthorized local, network, and remote connections;
SI-4 a 2
(CCI-002642)
The organization monitors the information system to detect unauthorized local connections.
SI-4 a 2
(CCI-002643)
The organization monitors the information system to detect unauthorized network connections.
SI-4 a 2
(CCI-002644)
The organization monitors the information system to detect unauthorized remote connections.
SI-4b. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods];
SI-4 b
(CCI-002645)
The organization defines the techniques and methods to be used to identify unauthorized use of the information system.
SI-4 b
(CCI-002646)
The organization identifies unauthorized use of the information system through organization-defined techniques and methods.
SI-4c. Deploys monitoring devices: (i) strategically within the information system to collect organization-determined essential information; and (ii) at ad hoc locations within the system to track specific types of transactions of interest to the organization;
SI-4 c
(CCI-001255)
The organization deploys monitoring devices strategically within the information system to collect organization-determined essential information.
SI-4 c
(CCI-001256)
The organization deploys monitoring devices at ad hoc locations within the system to track specific types of transactions of interest to the organization.
SI-4d. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;
SI-4 d
(CCI-002647)
The organization protects information obtained from intrusion-monitoring tools from unauthorized access.
SI-4 d
(CCI-002648)
The organization protects information obtained from intrusion-monitoring tools from unauthorized modification.
SI-4 d
(CCI-002649)
The organization protects information obtained from intrusion-monitoring tools from unauthorized deletion.
SI-4e. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;
SI-4 e
(CCI-001257)
The organization heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information.
SI-4f. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and
SI-4 f
(CCI-001258)
The organization obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
SI-4g. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].
SI-4 g
(CCI-002650)
The organization defines the information system monitoring information that is to be provided the organization-defined personnel or roles.
SI-4 g
(CCI-002651)
The organization defines the personnel or roles that are to be provided organization-defined information system monitoring information.
SI-4 g
(CCI-002652)
The organization defines the frequency at which the organization will provide the organization-defined information system monitoring information to organization-defined personnel or roles.
SI-4 g
(CCI-002654)
The organization provides organization-defined information system monitoring information to organization-defined personnel or roles as needed or per organization-defined frequency.
SYSTEM-WIDE INTRUSION DETECTION SYSTEM
SI-4 (1) The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.
SI-4 (1)
(CCI-002655)
The organization connects individual intrusion detection tools into an information system-wide intrusion detection system.
SI-4 (1)
(CCI-002656)
The organization configures individual intrusion detection tools into an information system-wide intrusion detection system.
AUTOMATED TOOLS FOR REAL-TIME ANALYSIS
SI-4 (2) The organization employs automated tools to support near real-time analysis of events.
SI-4 (2)
(CCI-001260)
The organization employs automated tools to support near real-time analysis of events.
AUTOMATED TOOL INTEGRATION
SI-4 (3) The organization employs automated tools to integrate intrusion detection tools into access control and flow control mechanisms for rapid response to attacks by enabling reconfiguration of these mechanisms in support of attack isolation and elimination.
SI-4 (3)
(CCI-002657)
The organization employs automated tools to integrate intrusion detection tools into access control mechanisms for rapid response to attacks by enabling reconfiguration of these mechanisms in support of attack isolation and elimination.
SI-4 (3)
(CCI-002658)
The organization employs automated tools to integrate intrusion detection tools into flow control mechanisms for rapid response to attacks by enabling reconfiguration of these mechanisms in support of attack isolation and elimination.
INBOUND AND OUTBOUND COMMUNICATIONS TRAFFIC
SI-4 (4) The information system monitors inbound and outbound communications traffic [Assignment: organization-defined frequency] for unusual or unauthorized activities or conditions.
SI-4 (4)
(CCI-002659)
The organization defines the frequency on which it will monitor inbound communications for unusual or unauthorized activities or conditions.
SI-4 (4)
(CCI-002660)
The organization defines the frequency on which it will monitor outbound communications for unusual or unauthorized activities or conditions.
SI-4 (4)
(CCI-002661)
The information system monitors inbound communications traffic per organization-defined frequency for unusual or unauthorized activities or conditions.
SI-4 (4)
(CCI-002662)
The information system monitors outbound communications traffic per organization-defined frequency for unusual or unauthorized activities or conditions.
SYSTEM-GENERATED ALERTS
SI-4 (5) The information system alerts [Assignment: organization-defined personnel or roles] when the following indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
SI-4 (5)
(CCI-001264)
The organization defines indicators of compromise or potential compromise to the security of the information system which will result in information system alerts being provided to organization-defined personnel or roles.
SI-4 (5)
(CCI-002663)
The organization defines the personnel or roles to receive information system alerts when organization-defined indicators of compromise or potential compromise occur.
SI-4 (5)
(CCI-002664)
The information system alerts organization-defined personnel or roles when organization-defined compromise indicators reflect the occurrence of a compromise or a potential compromise.
RESTRICT NON-PRIVILEGED USERS
SI-4 (6) [Withdrawn: Incorporated into AC-6 (10)].
AUTOMATED RESPONSE TO SUSPICIOUS EVENTS
SI-4 (7) The information system notifies [Assignment: organization-defined incident response personnel (identified by name and/or by role)] of detected suspicious events and takes [Assignment: organization-defined least-disruptive actions to terminate suspicious events].
SI-4 (7)
(CCI-001670)
The information system takes organization-defined least-disruptive actions to terminate suspicious events.
SI-4 (7)
(CCI-001266)
The information system notifies an organization-defined list of incident response personnel (identified by name and/or by role) of detected suspicious events.
SI-4 (7)
(CCI-001267)
The organization defines a list of incident response personnel (identified by name and/or by role) to be notified of detected suspicious events.
SI-4 (7)
(CCI-001268)
The organization defines a list of least-disruptive actions to be taken by the information system to terminate suspicious events.
PROTECTION OF MONITORING INFORMATION
SI-4 (8) [Withdrawn: Incorporated into SI-4].
TESTING OF MONITORING TOOLS
SI-4 (9) The organization tests intrusion-monitoring tools [Assignment: organization-defined frequency].
SI-4 (9)
(CCI-001270)
The organization tests intrusion monitoring tools at an organization-defined frequency.
SI-4 (9)
(CCI-001271)
The organization defines the frequency for testing intrusion monitoring tools.
VISIBILITY OF ENCRYPTED COMMUNICATIONS
SI-4 (10) The organization makes provisions so that [Assignment: organization-defined encrypted communications traffic] is visible to [Assignment: organization-defined information system monitoring tools].
SI-4 (10)
(CCI-002665)
The organization defines the encrypted communications traffic that is to be visible to organization-defined information system monitoring tools.
SI-4 (10)
(CCI-002666)
The organization defines the information system monitoring tools that will have visibility into organization-defined encrypted communications traffic.
SI-4 (10)
(CCI-002667)
The organization makes provisions so that organization-defined encrypted communications traffic is visible to organization-defined information system monitoring tools.
ANALYZE COMMUNICATIONS TRAFFIC ANOMALIES
SI-4 (11) The organization analyzes outbound communications traffic at the external boundary of the information system and selected [Assignment: organization-defined interior points within the system (e.g., subnetworks, subsystems)] to discover anomalies.
SI-4 (11)
(CCI-001671)
The organization analyzes outbound communications traffic at selected organization-defined interior points within the system (e.g., subnetworks, subsystems) to discover anomalies.
SI-4 (11)
(CCI-001273)
The organization analyzes outbound communications traffic at the external boundary of the information system to discover anomalies.
SI-4 (11)
(CCI-002668)
The organization defines the interior points within the information system (e.g., subnetworks, subsystems) where outbound communications will be analyzed to discover anomalies.
AUTOMATED ALERTS
SI-4 (12) The organization employs automated mechanisms to alert security personnel of the following inappropriate or unusual activities with security implications: [Assignment: organization-defined activities that trigger alerts].
SI-4 (12)
(CCI-001274)
The organization employs automated mechanisms to alert security personnel of organization-defined inappropriate or unusual activities with security implications.
SI-4 (12)
(CCI-001275)
The organization defines the activities which will trigger alerts to security personnel of inappropriate or unusual activities.
ANALYZE TRAFFIC / EVENT PATTERNS
SI-4 (13) The organization:
SI-4 (13)(a) Analyzes communications traffic/event patterns for the information system;
SI-4 (13) (a)
(CCI-001276)
The organization analyzes communications traffic/event patterns for the information system.
SI-4 (13)(b) Develops profiles representing common traffic patterns and/or events; and
SI-4 (13) (b)
(CCI-001277)
The organization develops profiles representing common traffic patterns and/or events.
SI-4 (13)(c) Uses the traffic/event profiles in tuning system-monitoring devices to reduce the number of false positives and the number of false negatives.
SI-4 (13) (c)
(CCI-002669)
The organization uses the traffic/event profiles in tuning system-monitoring devices to reduce the number of false positives and false negatives.
WIRELESS INTRUSION DETECTION
SI-4 (14) The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.
SI-4 (14)
(CCI-001673)
The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.
WIRELESS TO WIRELINE COMMUNICATIONS
SI-4 (15) The organization employs an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
SI-4 (15)
(CCI-001282)
The organization employs an intrusion detection system to monitor wireless communications traffic as the traffic passes from wireless to wireline networks.
CORRELATE MONITORING INFORMATION
SI-4 (16) The organization correlates information from monitoring tools employed throughout the information system.
SI-4 (16)
(CCI-001283)
The organization correlates information from monitoring tools employed throughout the information system.
INTEGRATED SITUATIONAL AWARENESS
SI-4 (17) The organization correlates information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.
SI-4 (17)
(CCI-001284)
The organization correlates information from monitoring physical, cyber, and supply chain activities to achieve integrated, organization-wide situational awareness.
ANALYZE TRAFFIC / COVERT EXFILTRATION
SI-4 (18) The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) and at [Assignment: organization-defined interior points within the system (e.g., subsystems, subnetworks)] to detect covert exfiltration of information.
SI-4 (18)
(CCI-002670)
The organization defines the interior points within the system (e.g., subsystems, subnetworks) where outbound communications will be analyzed to detect covert exfiltration of information.
SI-4 (18)
(CCI-002671)
The organization analyzes outbound communications traffic at the external boundary of the information system (i.e., system perimeter) to detect covert exfiltration of information.
SI-4 (18)
(CCI-002672)
The organization analyzes outbound communications traffic at organization-defined interior points within the system (e.g., subsystems, subnetworks) to detect covert exfiltration of information.
INDIVIDUALS POSING GREATER RISK
SI-4 (19) The organization implements [Assignment: organization-defined additional monitoring] of individuals who have been identified by [Assignment: organization-defined sources] as posing an increased level of risk.
SI-4 (19)
(CCI-002673)
The organization defines the additional monitoring to be implemented for individuals identified as posing an increased level of risk.
SI-4 (19)
(CCI-002674)
The organization defines the sources that may be used to identify individuals who pose an increased level of risk.
SI-4 (19)
(CCI-002675)
The organization implements organization-defined additional monitoring of individuals who have been identified by organization-defined sources as posing an increased level of risk.
PRIVILEGED USER
SI-4 (20) The organization implements [Assignment: organization-defined additional monitoring] of privileged users.
SI-4 (20)
(CCI-002676)
The organization defines additional monitoring to be implemented for privileged users.
SI-4 (20)
(CCI-002677)
The organization implements organization-defined additional monitoring of privileged users.
PROBATIONARY PERIODS
SI-4 (21) The organization implements [Assignment: organization-defined additional monitoring] of individuals during [Assignment: organization-defined probationary period].
SI-4 (21)
(CCI-002678)
The organization defines additional monitoring to be implemented for individuals during an organization-defined probationary period.
SI-4 (21)
(CCI-002679)
The organization defines the probationary period during which additional monitoring will be implemented for individuals.
SI-4 (21)
(CCI-002680)
The organization implements organization-defined additional monitoring of individuals during an organization-defined probationary period.
UNAUTHORIZED NETWORK SERVICES
SI-4 (22) The information system detects network services that have not been authorized or approved by [Assignment: organization-defined authorization or approval processes] and [Selection (one or more): audits; alerts [Assignment: organization-defined personnel or roles]].
SI-4 (22)
(CCI-002681)
The organization defines the authorization or approval process for network services.
SI-4 (22)
(CCI-002682)
The organization defines the personnel or roles to be alerted when unauthorized or unapproved network services are detected.
SI-4 (22)
(CCI-002683)
The information system detects network services that have not been authorized or approved by the organization-defined authorization or approval processes.
SI-4 (22)
(CCI-002684)
The information system audits and/or alerts organization-defined personnel when unauthorized network services are detected.
HOST-BASED DEVICES
SI-4 (23) The organization implements [Assignment: organization-defined host-based monitoring mechanisms] at [Assignment: organization-defined information system components].
SI-4 (23)
(CCI-002685)
The organization defines the host-based monitoring mechanisms to be implemented at organization-defined information system components.
SI-4 (23)
(CCI-002686)
The organization defines the information system components at which organization-defined host-based monitoring mechanisms are to be implemented.
SI-4 (23)
(CCI-002687)
The organization implements organization-defined host-based monitoring mechanisms at organization-defined information system components.
INDICATORS OF COMPROMISE
SI-4 (24) The information system discovers, collects, distributes, and uses indicators of compromise.
SI-4 (24)
(CCI-002688)
The information system discovers indicators of compromise.
SI-4 (24)
(CCI-002689)
The information system collects indicators of compromise.
SI-4 (24)
(CCI-002690)
The information system distributes indicators of compromise.
SI-4 (24)
(CCI-002691)
The information system uses indicators of compromise.
SI-5 SYSTEM AND INFORMATION INTEGRITY : SECURITY ALERTS, ADVISORIES, AND DIRECTIVES
SI-5 The organization:
SI-5a. Receives information system security alerts, advisories, and directives from [Assignment: organization-defined external organizations] on an ongoing basis;
SI-5 a
(CCI-001285)
The organization receives information system security alerts, advisories, and directives from organization-defined external organizations on an ongoing basis.
SI-5 a
(CCI-002692)
The organization defines the external organizations from which it receives information system security alerts, advisories, and directives.
SI-5b. Generates internal security alerts, advisories, and directives as deemed necessary;
SI-5 b
(CCI-001286)
The organization generates internal security alerts, advisories, and directives as deemed necessary.
SI-5c. Disseminates security alerts, advisories, and directives to: [Selection (one or more): [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined elements within the organization]; [Assignment: organization-defined external organizations]]; and
SI-5 c
(CCI-001287)
The organization disseminates security alerts, advisories, and directives to organization-defined personnel or roles, organization-defined elements within the organization, and/or organization-defined external organizations.
SI-5 c
(CCI-001288)
The organization defines the personnel or roles to whom the organization will disseminate security alerts, advisories, and directives.
SI-5 c
(CCI-002693)
The organization defines the elements within the organization to whom the organization will disseminate security alerts, advisories, and directives.
SI-5 c
(CCI-002694)
The organization defines the external organizations to which the organization will disseminate security alerts, advisories, and directives.
SI-5d. Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
SI-5 d
(CCI-001289)
The organization implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
AUTOMATED ALERTS AND ADVISORIES
SI-5 (1) The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
SI-5 (1)
(CCI-001290)
The organization employs automated mechanisms to make security alert and advisory information available throughout the organization.
SI-6 SYSTEM AND INFORMATION INTEGRITY : SECURITY FUNCTION VERIFICATION
SI-6 The information system:
SI-6a. Verifies the correct operation of [Assignment: organization-defined security functions];
SI-6 a
(CCI-002695)
The organization defines the security functions that require verification of correct operation.
SI-6 a
(CCI-002696)
The information system verifies correct operation of organization-defined security functions.
SI-6b. Performs this verification [Selection (one or more): [Assignment: organization-defined system transitional states]; upon command by user with appropriate privilege; [Assignment: organization-defined frequency]];
SI-6 b
(CCI-002697)
The organization defines the frequency at which it will verify correct operation of organization-defined security functions.
SI-6 b
(CCI-002698)
The organization defines the system transitional states when the information system will verify correct operation of organization-defined security functions.
SI-6 b
(CCI-002699)
The information system performs verification of the correct operation of organization-defined security functions: when the system is in an organization-defined transitional state; upon command by a user with appropriate privileges; and/or on an organization-defined frequency.
SI-6c. Notifies [Assignment: organization-defined personnel or roles] of failed security verification tests; and
SI-6 c
(CCI-001294)
The information system notifies organization-defined personnel or roles of failed security verification tests.
SI-6 c
(CCI-002700)
The organization defines the personnel or roles to be notified when security verification tests fail.
SI-6d. [Selection (one or more): shuts the information system down; restarts the information system; [Assignment: organization-defined alternative action(s)]] when anomalies are discovered.
SI-6 d
(CCI-002701)
The organization defines alternative action(s) to be taken when the information system discovers anomalies in the operation of organization-defined security functions.
SI-6 d
(CCI-002702)
The information system shuts the information system down, restarts the information system, and/or initiates organization-defined alternative action(s) when anomalies in the operation of the organization-defined security functions are discovered.
NOTIFICATION OF FAILED SECURITY TESTS
SI-6 (1) [Withdrawn: Incorporated into SI-6].
AUTOMATION SUPPORT FOR DISTRIBUTED TESTING
SI-6 (2) The information system implements automated mechanisms to support for the management of distributed security testing.
SI-6 (2)
(CCI-001295)
The information system implements automated mechanisms to support the management of distributed security testing.
REPORT VERIFICATION RESULTS
SI-6 (3) The organization reports the results of security function verification to [Assignment: organization-defined personnel or roles].
SI-6 (3)
(CCI-001675)
The organization defines the personnel or roles that are to receive reports on the results of security function verification.
SI-6 (3)
(CCI-001296)
The organization reports the results of security function verification to organization-defined personnel or roles.
SI-7 SYSTEM AND INFORMATION INTEGRITY : SOFTWARE, FIRMWARE, AND INFORMATION INTEGRITY
SI-7 The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].
SI-7
(CCI-002703)
The organization defines the software, firmware, and information which will be subjected to integrity verification tools to detect unauthorized changes.
SI-7
(CCI-002704)
The organization employs integrity verification tools to detect unauthorized changes to organization-defined software, firmware, and information.
INTEGRITY CHECKS
SI-7 (1) The information system performs an integrity check of [Assignment: organization-defined software, firmware, and information] [Selection (one or more): at startup; at [Assignment: organization-defined transitional states or security-relevant events]; [Assignment: organization-defined frequency]].
SI-7 (1)
(CCI-002705)
The organization defines the software on which integrity checks will be performed.
SI-7 (1)
(CCI-002706)
The organization defines the firmware on which integrity checks will be performed.
SI-7 (1)
(CCI-002707)
The organization defines the information on which integrity checks will be performed.
SI-7 (1)
(CCI-002708)
The organization defines the transitional state or security-relevant events when the information system will perform integrity checks on software, firmware, and information.
SI-7 (1)
(CCI-002709)
The organization defines the frequency at which it will perform integrity checks of software, firmware, and information.
SI-7 (1)
(CCI-002710)
The information system performs an integrity check of organization-defined software at startup, at organization-defined transitional states or security-relevant events, or on an organization-defined frequency.
SI-7 (1)
(CCI-002711)
The information system performs an integrity check of organization-defined firmware at startup, at organization-defined transitional states or security-relevant events, or on an organization-defined frequency.
SI-7 (1)
(CCI-002712)
The information system performs an integrity check of organization-defined information at startup, at organization-defined transitional states or security-relevant events, or on an organization-defined frequency.
AUTOMATED NOTIFICATIONS OF INTEGRITY VIOLATIONS
SI-7 (2) The organization employs automated tools that provide notification to [Assignment: organization-defined personnel or roles] upon discovering discrepancies during integrity verification.
SI-7 (2)
(CCI-001300)
The organization employs automated tools that provide notification to organization-defined personnel or roles upon discovering discrepancies during integrity verification.
SI-7 (2)
(CCI-002713)
The organization defines the personnel or roles to be notified when discrepancies are discovered during integrity verification.
CENTRALLY-MANAGED INTEGRITY TOOLS
SI-7 (3) The organization employs centrally managed integrity verification tools.
SI-7 (3)
(CCI-001301)
The organization employs centrally managed integrity verification tools.
TAMPER-EVIDENT PACKAGING
SI-7 (4) [Withdrawn: Incorporated into SA-12].
AUTOMATED RESPONSE TO INTEGRITY VIOLATIONS
SI-7 (5) The information system automatically [Selection (one or more): shuts the information system down; restarts the information system; implements [Assignment: organization-defined security safeguards]] when integrity violations are discovered.
SI-7 (5)
(CCI-002714)
The organization defines the security safeguards that are to be employed when integrity violations are discovered.
SI-7 (5)
(CCI-002715)
The information system automatically shuts the information system down, restarts the information system, and/or implements organization-defined security safeguards when integrity violations are discovered.
CRYPTOGRAPHIC PROTECTION
SI-7 (6) The information system implements cryptographic mechanisms to detect unauthorized changes to software, firmware, and information.
SI-7 (6)
(CCI-002716)
The information system implements cryptographic mechanisms to detect unauthorized changes to software.
SI-7 (6)
(CCI-002717)
The information system implements cryptographic mechanisms to detect unauthorized changes to firmware.
SI-7 (6)
(CCI-002718)
The information system implements cryptographic mechanisms to detect unauthorized changes to information.
INTEGRATION OF DETECTION AND RESPONSE
SI-7 (7) The organization incorporates the detection of unauthorized [Assignment: organization-defined security-relevant changes to the information system] into the organizational incident response capability.
SI-7 (7)
(CCI-002719)
The organization defines the unauthorized security-relevant changes to the information system that are to be incorporated into the organizational incident response capability.
SI-7 (7)
(CCI-002720)
The organization incorporates the detection of unauthorized organization-defined security-relevant changes to the information system into the organizational incident response capability.
AUDITING CAPABILITY FOR SIGNIFICANT EVENTS
SI-7 (8) The information system, upon detection of a potential integrity violation, provides the capability to audit the event and initiates the following actions: [Selection (one or more): generates an audit record; alerts current user; alerts [Assignment: organization-defined personnel or roles]; [Assignment: organization-defined other actions]].
SI-7 (8)
(CCI-002721)
The organization defines the personnel or roles that are to be alerted by the information system when it detects a potential integrity violation.
SI-7 (8)
(CCI-002722)
The organization defines other actions that can be taken when the information system detects a potential integrity violation.
SI-7 (8)
(CCI-002723)
The information system, upon detection of a potential integrity violation, provides the capability to audit the event.
SI-7 (8)
(CCI-002724)
The information system, upon detection of a potential integrity violation, initiates one or more of the following actions: generates an audit record; alerts the current user; alerts organization-defined personnel or roles; and/or organization-defined other actions.
VERIFY BOOT PROCESS
SI-7 (9) The information system verifies the integrity of the boot process of [Assignment: organization-defined devices].
SI-7 (9)
(CCI-002725)
The organization defines the devices which will have the integrity of the boot process verified.
SI-7 (9)
(CCI-002726)
The information system verifies the integrity of the boot process of organization-defined devices.
PROTECTION OF BOOT FIRMWARE
SI-7 (10) The information system implements [Assignment: organization-defined security safeguards] to protect the integrity of boot firmware in [Assignment: organization-defined devices].
SI-7 (10)
(CCI-002727)
The organization defines the security safeguards to be implemented to protect the integrity of the boot firmware in organization-defined devices.
SI-7 (10)
(CCI-002728)
The organization defines the devices on which organization-defined security safeguards will be implemented to protect the integrity of the boot firmware.
SI-7 (10)
(CCI-002729)
The information system implements organization-defined security safeguards to protect the integrity of boot firmware in organization-defined devices.
CONFINED ENVIRONMENTS WITH LIMITED PRIVILEGES
SI-7 (11) The organization requires that [Assignment: organization-defined user-installed software] execute in a confined physical or virtual machine environment with limited privileges.
SI-7 (11)
(CCI-002730)
The organization defines the user-installed software that is to be executed in a confined physical or virtual machine environment with limited privileges.
SI-7 (11)
(CCI-002731)
The organization requires that organization-defined user-installed software execute in a confined physical or virtual machine environment with limited privileges.
INTEGRITY VERIFICATION
SI-7 (12) The organization requires that the integrity of [Assignment: organization-defined user-installed software] be verified prior to execution.
SI-7 (12)
(CCI-002732)
The organization defines the user-installed software that is to have its integrity verified prior to execution.
SI-7 (12)
(CCI-002733)
The organization requires that the integrity of organization-defined user-installed software be verified prior to execution.
CODE EXECUTION IN PROTECTED ENVIRONMENTS
SI-7 (13) The organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only in confined physical or virtual machine environments and with the explicit approval of [Assignment: organization-defined personnel or roles].
SI-7 (13)
(CCI-002734)
The organization defines the personnel or roles which have the authority to explicitly approve binary or machine-executable code.
SI-7 (13)
(CCI-002735)
The organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only in confined physical or virtual machine environments.
SI-7 (13)
(CCI-002736)
The organization allows execution of binary or machine-executable code obtained from sources with limited or no warranty and without the provision of source code only with the explicit approval of organization-defined personnel or roles.
BINARY OR MACHINE EXECUTABLE CODE
SI-7 (14) The organization:
SI-7 (14)(a) Prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code; and
SI-7 (14) (a)
(CCI-002737)
The organization prohibits the use of binary or machine-executable code from sources with limited or no warranty and without the provision of source code.
SI-7 (14)(b) Provides exceptions to the source code requirement only for compelling mission/operational requirements and with the approval of the authorizing official.
SI-7 (14) (b)
(CCI-002738)
The organization provides exceptions to the source code requirement only for compelling mission/operational requirements and with the approval of the authorizing official.
CODE AUTHENTICATION
SI-7 (15) The information system implements cryptographic mechanisms to authenticate [Assignment: organization-defined software or firmware components] prior to installation.
SI-7 (15)
(CCI-002739)
The organization defines the software or firmware components on which cryptographic mechanisms are to be implemented to support authentication prior to installation.
SI-7 (15)
(CCI-002740)
The information system implements cryptographic mechanisms to authenticate organization-defined software or firmware components prior to installation.
TIME LIMIT ON PROCESS EXECUTION W/O SUPERVISION
SI-7 (16) The organization does not allow processes to execute without supervision for more than [Assignment: organization-defined time period].
SI-7 (16)
(CCI-001321)
The organization does not allow a process to execute without supervision for more than an organization-defined time period.
SI-7 (16)
(CCI-001322)
The organization defines a time period that is the longest a process is allowed to execute without supervision.
SI-8 SYSTEM AND INFORMATION INTEGRITY : SPAM PROTECTION
SI-8 The organization:
SI-8a. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
SI-8 a
(CCI-002741)
The organization employs spam protection mechanisms at information system entry points to detect and take action on unsolicited messages.
SI-8 a
(CCI-002742)
The organization employs spam protection mechanisms at information system exit points to detect and take action on unsolicited messages.
SI-8b. Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
SI-8 b
(CCI-001306)
The organization updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policy and procedures.
CENTRAL MANAGEMENT
SI-8 (1) The organization centrally manages spam protection mechanisms.
SI-8 (1)
(CCI-001307)
The organization centrally manages spam protection mechanisms.
AUTOMATIC UPDATES
SI-8 (2) The information system automatically updates spam protection mechanisms.
SI-8 (2)
(CCI-001308)
The information system automatically updates spam protection mechanisms.
CONTINUOUS LEARNING CAPABILITY
SI-8 (3) The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
SI-8 (3)
(CCI-002743)
The information system implements spam protection mechanisms with a learning capability to more effectively identify legitimate communications traffic.
SI-9 SYSTEM AND INFORMATION INTEGRITY : INFORMATION INPUT RESTRICTIONS
SI-9 [Withdrawn: Incorporated into AC-2, AC-3, AC-5, AC-6].
SI-10 SYSTEM AND INFORMATION INTEGRITY : INFORMATION INPUT VALIDATION
SI-10 The information system checks the validity of [Assignment: organization-defined information inputs].
SI-10
(CCI-001310)
The information system checks the validity of organization-defined inputs.
SI-10
(CCI-002744)
The organization defines the inputs on which the information system is to conduct validity checks.
MANUAL OVERRIDE CAPABILITY
SI-10 (1) The information system:
SI-10 (1)(a) Provides a manual override capability for input validation of [Assignment: organization-defined inputs];
SI-10 (1) (a)
(CCI-002745)
The organization defines the inputs for which the information system provides a manual override capability for input validation.
SI-10 (1) (a)
(CCI-002746)
The information system provides a manual override capability for input validation of organization-defined inputs.
SI-10 (1)(b) Restricts the use of the manual override capability to only [Assignment: organization-defined authorized individuals]; and
SI-10 (1) (b)
(CCI-002747)
The organization defines the individuals who have the authorization to use the manual override capability for input validation.
SI-10 (1) (b)
(CCI-002748)
The information system restricts the use of the manual override capability to only organization-defined authorized individuals.
SI-10 (1)(c) Audits the use of the manual override capability.
SI-10 (1) (c)
(CCI-002749)
The information system audits the use of the manual override capability.
REVIEW / RESOLUTION OF ERRORS
SI-10 (2) The organization ensures that input validation errors are reviewed and resolved within [Assignment: organization-defined time period].
SI-10 (2)
(CCI-002750)
The organization defines the time period within which input validation errors are to be reviewed.
SI-10 (2)
(CCI-002751)
The organization defines the time period within which input validation errors are to be resolved.
SI-10 (2)
(CCI-002752)
The organization ensures that input validation errors are reviewed within an organization-defined time period.
SI-10 (2)
(CCI-002753)
The organization ensures that input validation errors are resolved within an organization-defined time period.
PREDICTABLE BEHAVIOR
SI-10 (3) The information system behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
SI-10 (3)
(CCI-002754)
The information system behaves in a predictable and documented manner that reflects organizational and system objectives when invalid inputs are received.
REVIEW / TIMING INTERACTIONS
SI-10 (4) The organization accounts for timing interactions among information system components in determining appropriate responses for invalid inputs.
SI-10 (4)
(CCI-002755)
The organization accounts for timing interactions among information system components in determining appropriate responses for invalid inputs.
RESTRICT INPUTS TO TRUSTED SOURCES AND APPROVED FORMATS
SI-10 (5) The organization restricts the use of information inputs to [Assignment: organization-defined trusted sources] and/or [Assignment: organization-defined formats].
SI-10 (5)
(CCI-002756)
The organization defines the trusted sources to which the usage of information inputs will be restricted (e.g., whitelisting).
SI-10 (5)
(CCI-002757)
The organization defines the acceptable formats to which information inputs are restricted.
SI-10 (5)
(CCI-002758)
The organization restricts the use of information inputs to organization-defined trusted sources and/or organization-defined formats.
SI-11 SYSTEM AND INFORMATION INTEGRITY : ERROR HANDLING
SI-11 The information system:
SI-11a. Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and
SI-11 a
(CCI-001312)
The information system generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries.
SI-11b. Reveals error messages only to [Assignment: organization-defined personnel or roles].
SI-11 b
(CCI-001314)
The information system reveals error messages only to organization-defined personnel or roles.
SI-11 b
(CCI-002759)
The organization defines the personnel or roles to whom error messages are to be revealed.
SI-12 SYSTEM AND INFORMATION INTEGRITY : INFORMATION HANDLING AND RETENTION
SI-12 The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
SI-12
(CCI-001678)
The organization retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
SI-12
(CCI-001315)
The organization handles information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.
SI-13 SYSTEM AND INFORMATION INTEGRITY : PREDICTABLE FAILURE PREVENTION
SI-13 The organization:
SI-13a. Determines mean time to failure (MTTF) for [Assignment: organization-defined information system components] in specific environments of operation; and
SI-13 a
(CCI-002760)
The organization determines mean time to failure (MTTF) for organization-defined information system components in specific environments of operation.
SI-13 a
(CCI-002761)
The organization defines the system components in specific environments of operation for which the mean time to failure (MTTF) is to be determined.
SI-13b. Provides substitute information system components and a means to exchange active and standby components at [Assignment: organization-defined MTTF substitution criteria].
SI-13 b
(CCI-001318)
The organization provides substitute information system components.
SI-13 b
(CCI-002762)
The organization defines the mean time to failure (MTTF) substitution criteria to be employed as a means to determine the need to exchange active and standby components.
SI-13 b
(CCI-002763)
The organization provides a means to exchange active and standby components in accordance with the organization-defined mean time to failure (MTTF) substitution criteria.
TRANSFERRING COMPONENT RESPONSIBILITIES
SI-13 (1) The organization takes information system components out of service by transferring component responsibilities to substitute components no later than [Assignment: organization-defined fraction or percentage] of mean time to failure.
SI-13 (1)
(CCI-001319)
The organization takes information system components out of service by transferring component responsibilities to a substitute component no later than an organization-defined fraction or percentage of mean time to failure (MTTF).
SI-13 (1)
(CCI-001320)
The organization defines the maximum fraction or percentage of mean time to failure (MTTF) used to determine when information system components are taken out of service by transferring component responsibilities to substitute components.
TIME LIMIT ON PROCESS EXECUTION WITHOUT SUPERVISION
SI-13 (2) [Withdrawn: Incorporated into SI-7 (16)].
MANUAL TRANSFER BETWEEN COMPONENTS
SI-13 (3) The organization manually initiates transfers between active and standby information system components [Assignment: organization-defined frequency] if the mean time to failure exceeds [Assignment: organization-defined time period].
SI-13 (3)
(CCI-001323)
The organization manually initiates a transfer between active and standby information system components in accordance with organization-defined frequency if the mean time to failure (MTTF) exceeds an organization-defined time period.
SI-13 (3)
(CCI-001324)
The organization defines the minimum frequency at which the organization manually initiates a transfer between active and standby information system components if the mean time to failure (MTTF) exceeds the organization-defined time period.
SI-13 (3)
(CCI-001325)
The organization defines a time period that the mean time to failure (MTTF) must exceed before the organization manually initiates a transfer between active and standby information system components.
STANDBY COMPONENT INSTALLATION / NOTIFICATION
SI-13 (4) The organization, if information system component failures are detected:
SI-13 (4)(a) Ensures that the standby components are successfully and transparently installed within [Assignment: organization-defined time period]; and
SI-13 (4) (a)
(CCI-001326)
The organization, if information system component failures are detected, ensures standby components are successfully and transparently installed within an organization-defined time period.
SI-13 (4) (a)
(CCI-001327)
The organization defines a time period for a standby information system component to be successfully and transparently installed for the information system component that has failed.
SI-13 (4)(b) [Selection (one or more): activates [Assignment: organization-defined alarm]; automatically shuts down the information system].
SI-13 (4) (b)
(CCI-001328)
The organization, if an information system component failure is detected, activates an organization-defined alarm and/or automatically shuts down the information system.
SI-13 (4) (b)
(CCI-001329)
The organization defines the alarm to be activated when an information system component failure is detected.
FAILOVER CAPABILITY
SI-13 (5) The organization provides [Selection: real-time; near real-time] [Assignment: organization-defined failover capability] for the information system.
SI-13 (5)
(CCI-000558)
The organization defines the real-time or near-real-time failover capability to be provided for the information system.
SI-13 (5)
(CCI-000559)
The organization provides real-time or near-real-time organization-defined failover capability for the information system.
SI-14 SYSTEM AND INFORMATION INTEGRITY : NON-PERSISTENCE
SI-14 The organization implements non-persistent [Assignment: organization-defined information system components and services] that are initiated in a known state and terminated [Selection (one or more): upon end of session of use; periodically at [Assignment: organization-defined frequency]].
SI-14
(CCI-002764)
The organization defines non-persistent information system components and services to be implemented.
SI-14
(CCI-002765)
The organization defines the frequency at which it will terminate organization-defined non-persistent information system components and services.
SI-14
(CCI-002766)
The organization implements organization-defined non-persistence information system components and services that are initiated in a known state.
SI-14
(CCI-002767)
The organization implements organization-defined non-persistence information system components and services that are terminated upon end of session of use and/or periodically at an organization-defined frequency.
REFRESH FROM TRUSTED SOURCES
SI-14 (1) The organization ensures that software and data employed during information system component and service refreshes are obtained from [Assignment: organization-defined trusted sources].
SI-14 (1)
(CCI-002768)
The organization defines the trusted sources from which it obtains software and data employed during the refreshing of non-persistent information system components and services.
SI-14 (1)
(CCI-002769)
The organization ensures that software and data employed during non-persistent information system component and service refreshes are obtained from organization-defined trusted sources.
SI-15 SYSTEM AND INFORMATION INTEGRITY : INFORMATION OUTPUT FILTERING
SI-15 The information system validates information output from [Assignment: organization-defined software programs and/or applications] to ensure that the information is consistent with the expected content.
SI-15
(CCI-002770)
The organization defines the software programs and/or applications from which the information system is to validate the information output to ensure the information is consistent with expected content.
SI-15
(CCI-002771)
The information system validates information output from organization-defined software programs and/or applications to ensure that the information is consistent with the expected content.
SI-15
(CCI-002772)
The organization defines the security safeguards to be implemented to protect the information system's memory from unauthorized code execution.
SI-16 SYSTEM AND INFORMATION INTEGRITY : MEMORY PROTECTION
SI-16 The information system implements [Assignment: organization-defined security safeguards] to protect its memory from unauthorized code execution.
SI-16
(CCI-002823)
The organization defines the security safeguards to be implemented to protect the information system's memory from unauthorized code execution.
SI-16
(CCI-002824)
The information system implements organization-defined security safeguards to protect its memory from unauthorized code execution.
SI-17 SYSTEM AND INFORMATION INTEGRITY : FAIL-SAFE PROCEDURES
SI-17 The information system implements [Assignment: organization-defined fail-safe procedures] when [Assignment: organization-defined failure conditions occur].
SI-17
(CCI-002773)
The organization defines the fail-safe procedures to be implemented by the information system when organization-defined failure conditions occur.
SI-17
(CCI-002774)
The organization defines the failure conditions which, when they occur, will result in the information system implementing organization-defined fail-safe procedures.
SI-17
(CCI-002775)
The information system implements organization-defined fail-safe procedures when organization-defined failure conditions occur.
PM-1 Program Management : INFORMATION SECURITY PROGRAM PLAN
PM-1 The organization:
PM-1a. Develops and disseminates an organization-wide information security program plan that:
PM-1a.1. Provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements;
PM-1 a 1
(CCI-000073)
The organization develops an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
PM-1 a 1
(CCI-002985)
The organization disseminates an organization-wide information security program plan that provides an overview of the requirements for the security program and a description of the security program management controls and common controls in place or planned for meeting those requirements.
PM-1a.2. Includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance;
PM-1 a 2
(CCI-001680)
The organization develops an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
PM-1 a 2
(CCI-002986)
The organization disseminates an organization-wide information security program plan that includes the identification and assignment of roles, responsibilities, management commitment, coordination among organizational entities, and compliance.
PM-1a.3. Reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical); and
PM-1 a 3
(CCI-002984)
The organization develops an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
PM-1 a 3
(CCI-002987)
The organization disseminates an organization-wide information security program plan that reflects coordination among organizational entities responsible for the different aspects of information security (i.e., technical, physical, personnel, cyber-physical).
PM-1a.4. Is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation;
PM-1 a 4
(CCI-000074)
The organization develops an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
PM-1 a 4
(CCI-002988)
The organization disseminates an organization-wide information security program plan that is approved by a senior official with responsibility and accountability for the risk being incurred to organizational operations (including mission, functions, image, and reputation), organizational assets, individuals, other organizations, and the Nation.
PM-1b. Reviews the organization-wide information security program plan [Assignment: organization-defined frequency];
PM-1 b
(CCI-000075)
The organization reviews the organization-wide information security program plan on an organization-defined frequency.
PM-1 b
(CCI-000076)
The organization defines the frequency with which to review the organization-wide information security program plan.
PM-1c. Updates the plan to address organizational changes and problems identified during plan implementation or security control assessments; and
PM-1 c
(CCI-000077)
The organization updates the plan to address organizational changes and problems identified during plan implementation or security control assessments.
PM-1d. Protects the information security program plan from unauthorized disclosure and modification.
PM-1 d
(CCI-002989)
The organization protects the information security program plan from unauthorized disclosure.
PM-1 d
(CCI-002990)
The organization protects the information security program plan from unauthorized modification.
PM-2 Program Management : SENIOR INFORMATION SECURITY OFFICER
PM-2 The organization appoints a senior information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.
PM-2
(CCI-000078)
The organization appoints a senior information security officer with the mission and resources to coordinate, develop, implement, and maintain an organization-wide information security program.
PM-3 Program Management : INFORMATION SECURITY RESOURCES
PM-3 The organization:
PM-3a. Ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement;
PM-3 a
(CCI-000080)
The organization ensures that all capital planning and investment requests include the resources needed to implement the information security program and documents all exceptions to this requirement.
PM-3b. Employs a business case/Exhibit 300/Exhibit 53 to record the resources required; and
PM-3 b
(CCI-000081)
The organization employs a business case/Exhibit 300/Exhibit 53 to record the resources required.
PM-3c. Ensures that information security resources are available for expenditure as planned.
PM-3 c
(CCI-000141)
The organization ensures that information security resources are available for expenditure as planned.
PM-4 Program Management : PLAN OF ACTION AND MILESTONES PROCESS
PM-4 The organization:
PM-4a. Implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems:
PM-4a.1. Are developed and maintained;
PM-4 a 1
(CCI-000142)
The organization implements a process for ensuring that plans of action and milestones for the security program and the associated organizational information systems are maintained.
PM-4 a 1
(CCI-002991)
The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are developed.
PM-4a.2. Document the remedial information security actions to adequately respond to risk to organizational operations and assets, individuals, other organizations, and the Nation; and
PM-4 a 2
(CCI-000170)
The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems document the remedial information security actions to adequately respond to risk to organizational operations and assets, individuals, other organizations, and the Nation.
PM-4a.3. Are reported in accordance with OMB FISMA reporting requirements.
PM-4 a 3
(CCI-002992)
The organization implements a process for ensuring that plans of action and milestones for the security program and associated organizational information systems are reported in accordance with OMB FISMA reporting requirements.
PM-4b. Reviews plans of action and milestones for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-4 b
(CCI-002993)
The organization reviews plans of action and milestones for the security program and associated organization information systems for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-5 Program Management : INFORMATION SYSTEM INVENTORY
PM-5 The organization develops and maintains an inventory of its information systems.
PM-5
(CCI-000207)
The organization develops and maintains an inventory of its information systems.
PM-6 Program Management : INFORMATION SECURITY MEASURES OF PERFORMANCE
PM-6 The organization develops, monitors, and reports on the results of information security measures of performance.
PM-6
(CCI-000209)
The organization develops the results of information security measures of performance.
PM-6
(CCI-000210)
The organization monitors the results of information security measures of performance.
PM-6
(CCI-000211)
The organization reports on the results of information security measures of performance.
PM-7 Program Management : ENTERPRISE ARCHITECTURE
PM-7 The organization develops an enterprise architecture with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
PM-7
(CCI-000212)
The organization develops an enterprise architecture with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
PM-8 Program Management : CRITICAL INFRASTRUCTURE PLAN
PM-8 The organization addresses information security issues in the development, documentation, and updating of a critical infrastructure and key resources protection plan.
PM-8
(CCI-001640)
The organization updates the critical infrastructure and key resources protection plan that addresses information security issues.
PM-8
(CCI-000216)
The organization develops and documents a critical infrastructure and key resource protection plan that addresses information security issues.
PM-9 Program Management : RISK MANAGEMENT STRATEGY
PM-9 The organization:
PM-9a. Develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems;
PM-9 a
(CCI-000227)
The organization develops a comprehensive strategy to manage risk to organizational operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems.
PM-9b. Implements the risk management strategy consistently across the organization; and
PM-9 b
(CCI-000228)
The organization implements a comprehensive strategy to manage risk to organization operations and assets, individuals, other organizations, and the Nation associated with the operation and use of information systems consistently across the organization.
PM-9c. Reviews and updates the risk management strategy [Assignment: organization-defined frequency] or as required, to address organizational changes.
PM-9 c
(CCI-002994)
The organization reviews and updates the risk management strategy in accordance with organization-defined frequency or as required, to address organizational changes.
PM-9 c
(CCI-002995)
The organization defines the frequency with which to review and update the risk management strategy to address organizational changes.
PM-10 Program Management : SECURITY AUTHORIZATION PROCESS
PM-10 The organization:
PM-10a. Manages (i.e., documents, tracks, and reports) the security state of organizational information systems and the environments in which those systems operate through security authorization processes;
PM-10 a
(CCI-000229)
The organization documents the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
PM-10 a
(CCI-000230)
The organization tracks the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
PM-10 a
(CCI-000231)
The organization reports the security state of organizational information systems and the environments in which those systems operate through security authorization processes.
PM-10b. Designates individuals to fulfill specific roles and responsibilities within the organizational risk management process; and
PM-10 b
(CCI-000233)
The organization designates individuals to fulfill specific roles and responsibilities within the organizational risk management process.
PM-10c. Fully integrates the security authorization processes into an organization-wide risk management program.
PM-10 c
(CCI-000234)
The organization fully integrates the security authorization processes into an organization-wide risk management program.
PM-11 Program Management : MISSION/BUSINESS PROCESS DEFINITION
PM-11 The organization:
PM-11a. Defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation; and
PM-11 a
(CCI-000235)
The organization defines mission/business processes with consideration for information security and the resulting risk to organizational operations, organizational assets, individuals, other organizations, and the Nation.
PM-11b. Determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until achievable protection needs are obtained.
PM-11 b
(CCI-000236)
The organization determines information protection needs arising from the defined mission/business processes and revises the processes as necessary, until an achievable set of protection needs are obtained.
PM-12 Program Management : INSIDER THREAT PROGRAM
PM-12 The organization implements an insider threat program that includes a cross-discipline insider threat incident handling team.
PM-12
(CCI-002996)
The organization implements an insider threat program that includes a cross-discipline insider threat incident handling team.
PM-13 Program Management : INFORMATION SECURITY WORKFORCE
PM-13 The organization establishes an information security workforce development and improvement program.
PM-13
(CCI-002997)
The organization establishes an information security workforce development and improvement program.
PM-14 Program Management : TESTING, TRAINING, AND MONITORING
PM-14 The organization:
PM-14a. Implements a process for ensuring that organizational plans for conducting security testing, training, and monitoring activities associated with organizational information systems:
PM-14a.1. Are developed and maintained; and
PM-14 a 1
(CCI-002998)
The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are developed.
PM-14 a 1
(CCI-002999)
The organization implements a process for ensuring that organizational plans for conducting security testing activities associated with organizational information systems are maintained.
PM-14 a 1
(CCI-003000)
The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are developed.
PM-14 a 1
(CCI-003001)
The organization implements a process for ensuring that organizational plans for conducting security training activities associated with organizational information systems are maintained.
PM-14 a 1
(CCI-003002)
The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are developed.
PM-14 a 1
(CCI-003003)
The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems are maintained.
PM-14a.2. Continue to be executed in a timely manner;
PM-14 a 2
(CCI-003004)
The organization implements a process for ensuring that organizational plans for conducting security testing associated with organizational information systems continue to be executed in a timely manner.
PM-14 a 2
(CCI-003005)
The organization implements a process for ensuring that organizational plans for conducting security training associated with organizational information systems continue to be executed in a timely manner.
PM-14 a 2
(CCI-003006)
The organization implements a process for ensuring that organizational plans for conducting security monitoring activities associated with organizational information systems continue to be executed in a timely manner.
PM-14b. Reviews testing, training, and monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-14 b
(CCI-003007)
The organization reviews testing plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-14 b
(CCI-003008)
The organization reviews training plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-14 b
(CCI-003009)
The organization reviews monitoring plans for consistency with the organizational risk management strategy and organization-wide priorities for risk response actions.
PM-15 Program Management : CONTACTS WITH SECURITY GROUPS AND ASSOCIATIONS
PM-15 The organization establishes and institutionalizes contact with selected groups and associations within the security community:
PM-15a. To facilitate ongoing security education and training for organizational personnel;
PM-15 a
(CCI-003010)
The organization establishes and institutionalizes contact with selected groups and associations within the security community to facilitate ongoing security education and training for organizational personnel.
PM-15b. To maintain currency with recommended security practices, techniques, and technologies; and
PM-15 b
(CCI-003011)
The organization establishes and institutionalizes contact with selected groups and associations within the security community to maintain currency with recommended security practices, techniques, and technologies.
PM-15c. To share current security-related information including threats, vulnerabilities, and incidents.
PM-15 c
(CCI-003012)
The organization establishes and institutionalizes contact with selected groups and associations within the security community to share current security-related information including threats, vulnerabilities, and incidents.
PM-16 Program Management : THREAT AWARENESS PROGRAM
PM-16 The organization implements a threat awareness program that includes a cross-organization information-sharing capability.
PM-16
(CCI-003013)
The organization implements a threat awareness program that includes a cross-organization information-sharing capability.