{"question": "Personnel Security (PS)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PS-1 Personnel Security Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Personnel security policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Personnel security procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PS-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-1(a):\n|Parameter PS-1(b)(1):\n|Parameter PS-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PS-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PS-2 Position Categorization (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Assigns a risk designation to all positions;
  2. \n
  3. Establishes screening criteria for individuals filling those positions; and
  4. \n
  5. Reviews and revises position risk designations [FedRAMP Assignment: at least every three (3) years].
  6. \n
\n\n|PS-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-2 What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PS-3 Personnel Screening (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Screens individuals prior to authorizing access to the information system; and
  2. \n
  3. Rescreens individuals according to [FedRAMP Assignment: For national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions].
  4. \n
\n\n|PS-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-3(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PS-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection:\n
    \n
  1. Have valid access authorizations that are demonstrated by assigned official government duties; and
  2. \n
  3. Satisfy [FedRAMP Assignment: personnel screening criteria \u2013 as required by specific information].
  4. \n
\n\n|PS-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-3 (3)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-3 (3) What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n\n#"} {"question": "PS-4 Personnel Termination (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization, upon termination of individual employment:\n
    \n
  1. Disables information system access within [FedRAMP Assignment: same day];
  2. \n
  3. Terminates/revokes any authenticators/credentials associated with the individual;
  4. \n
  5. Conducts exit interviews that include a discussion of [Assignment: organization-defined information security topics];
  6. \n
  7. Retrieves all security-related organizational information system-related property;
  8. \n
  9. Retains access to organizational information and information systems formerly controlled by terminated individual; and
  10. \n
  11. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
  12. \n
\n\n|PS-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-4(a):\n|Parameter PS-4(c):\n|Parameter PS-4(f)-1:\n|Parameter PS-4(f)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "PS-5 Personnel Transfer (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization;
  2. \n
  3. Initiates [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];
  4. \n
  5. Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and
  6. \n
  7. Notifies [Assignment: organization-defined personnel or roles] within [FedRAMP Assignment: within five days of the formal transfer action (DoD 24 hours)].
  8. \n
\n\n|PS-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-5(b)-1:\n|Parameter PS-5(b)-2:\n|Parameter PS-5(d)-1:\n|Parameter PS-5(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PS-6 Access Agreements (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops and documents access agreements for organizational information systems;
  2. \n
  3. Reviews and updates the access agreements [FedRAMP Assignment: at least annually]; and
  4. \n
  5. Ensures that individuals requiring access to organizational information and information systems:
  6. \n
      \n
    1. Sign appropriate access agreements prior to being granted access; and
    2. \n
    3. Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PS-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-6(b):\n|Parameter PS-6(c)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PS-7 Third-Party Personnel Security (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
  2. \n
  3. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
  4. \n
  5. Documents personnel security requirements;
  6. \n
  7. Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [FedRAMP Assignment: same day]; and
  8. \n
  9. Monitors provider compliance.
  10. \n
\n\n|PS-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-7(d)-1:\n|Parameter PS-7(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "PS-8 Personnel Sanctions (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs a formal sanctions process for personnel failing to comply with established information security policies and procedures; and
  2. \n
  3. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
  4. \n
\n\n|PS-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-8(b)-1:\n|Parameter PS-8(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "Media Protection (MP)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "MP-1 Media Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Media protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Media protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|MP-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-1(a):\n|Parameter MP-1(b)(1):\n|Parameter MP-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|MP-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "MP-2 Media Access (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organization-defined personnel or roles].\n\n|MP-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-2-1:\n|Parameter MP-2-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-3 Media Labeling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and
  2. \n
  3. Exempts [FedRAMP Assignment: no removable media types] from marking as long as the media remain within [Assignment: organization-defined controlled areas].
  4. \nMP-3(b) Additional FedRAMP Requirements and Guidance:
    \nGuidance: Second parameter in MP-3(b)-2 is not applicable.\n
\n\n|MP-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-3(b)-1:\n|Parameter MP-3(b)-2:| Not applicable\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-4 Media Storage (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Physically controls and securely stores [FedRAMP Assignment: [all types of digital and non-digital media with sensitive information]] within [FedRAMP Assignment: see additional FedRAMP requirements and guidance]; and
  2. \nMP-4a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines controlled areas within facilities where the information and information system reside.\n
  3. Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
  4. \n
\n\n|MP-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-4(a)-1:\n|Parameter MP-4(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-5 Media Transport (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Protects and controls [FedRAMP Assignment: all media with sensitive information] during transport outside of controlled areas using [FedRAMP Assignment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digital media, secured in locked container];
  2. \nMP-5a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.\n
  3. Maintains accountability for information system media during transport outside of controlled areas;
  4. \n
  5. Documents activities associated with the transport of information system media; and
  6. \n
  7. Restricts the activities associated with transport of information system media to authorized personnel.
  8. \n
\n\n|MP-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-5(a)-1:\n|Parameter MP-5(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "MP-5 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.\n\n|MP-5 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-5 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-6 Media Sanitization and Disposal (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and
  2. \n
  3. Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
  4. \n
\n\n|MP-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-6(a)-1:\n|Parameter MP-6(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-6 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests sanitization equipment and procedures [FedRAMP Assignment: at least annually] to verify that the intended sanitization is being achieved.\nMP-6 (2) Additional FedRAMP Requirements and Guidance:
\nGuidance: Equipment and procedures may be tested or evaluated for effectiveness.\n\n|MP-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-6(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-7 Media Use (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization [Selection: restricts; prohibits] the use of [Assignment: organization-defined types of information system media] on [Assignment: organization-defined information systems or system components] using [Assignment: organization-defined security safeguards].\n\n|MP-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-7-1:\n|Parameter MP-7-2:\n|Parameter MP-7-3:\n|Parameter MP-7-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.\n\n|MP-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-7 (1) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Risk Assessment (RA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "RA-1 Risk Assessment Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Risk assessment policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Risk assessment procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|RA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-1(a):\n|Parameter RA-1(b)(1):\n|Parameter RA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|RA-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "RA-2 Security Categorization (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Categorizes information and the information system in accordance with applicable Federal Laws, Executive Orders, directives, policies, regulations, standards, and guidance;
  2. \n
  3. Documents the security categorization results (including supporting rationale) in the security plan for the information system; and
  4. \n
  5. Ensures the security categorization decision is reviewed and approved by the AO or authorizing official designated representative.
  6. \n
\n\n|RA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "RA-3 Risk Assessment (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;
  2. \n
  3. Documents risk assessment results in [Selection: security plan; risk assessment report; [FedRAMP Assignment: security assessment report]];
  4. \n
  5. Reviews risk assessment results [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs];
  6. \n
  7. Disseminates risk assessment results to [Assignment: organization-defined personnel or roles]; and
  8. \n
  9. Updates the risk assessment [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
  10. \nRA-3 Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F\nRA-3 (d) Requirement: Include all Authorizing Officials; for JAB authorizations to include FedRAMP.\n
\n\n|RA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-3(b):\n|Parameter RA-3(c):\n|Parameter RA-3(d):\n|Parameter RA-3(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "RA-5 Vulnerability Scanning (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Scans for vulnerabilities in the information system and hosted applications [FedRAMP Assignment: monthly operating system/infrastructure; monthly web applications and databases] and when new vulnerabilities potentially affecting the system/applications are identified and reported;
  2. \nRA-5 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.\n
  3. Employs vulnerability scanning tools and techniques that promote interoperability among tools and automate parts of the vulnerability management process by using standards for:
  4. \n
      \n
    1. Enumerating platforms, software flaws, and improper configurations;
    2. \n
    3. Formatting and making transparent, checklists and test procedures; and
    4. \n
    5. Measuring vulnerability impact;
    6. \n
    \n
  5. Analyzes vulnerability scan reports and results from security control assessments
  6. \n
  7. Remediates legitimate vulnerabilities; [FedRAMP Assignment: high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery], in accordance with an organizational assessment of risk; and
  8. \n
  9. Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
  10. \nRA-5 (e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: To include all Authorizing Officials; for JAB authorizations to include FedRAMP.
    \nRA-5 Additional FedRAMP Requirements and Guidance\nGuidance: See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents Vulnerability Scanning Requirements
    \nhttps://www.FedRAMP.gov/documents/\n
\n\n|RA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(a):\n|Parameter RA-5(d):\n|Parameter RA-5(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "RA-5 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs vulnerability scanning tools that include the capability to readily update the list of information system vulnerabilities to be scanned.\n\n|RA-5 (1)|Control Summary Information|\n|---|---|\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization updates the information system vulnerabilities scanned [Selection (one or more): [FedRAMP Assignment: prior to a new scan]].\n\n|RA-5 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs vulnerability scanning procedures that can demonstrate the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).\n\n|RA-5 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes privileged access authorization to [FedRAMP Assignment: operating systems, databases, web applications] for selected [FedRAMP Assignment: all scans].\n\n|RA-5 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(5)-1:\n|Parameter RA-5(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (6) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.\n\n|RA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-6 What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "RA-5 (8) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.\nRA-5 (8) Additional FedRAMP Requirements and Guidance:
\nRequirement: This enhancement is required for all high vulnerability scan findings.\nGuidance: While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.\n\n\n|RA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-8 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "System and Services Acquisition (SA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SA-1 System and Services Acquisition Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and services acquisition policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and services acquisition procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|SA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-1(a):\n|Parameter SA-1(b)(1):\n|Parameter SA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SA-2 Allocation of Resources (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Determines information security requirements for the information system or information system service in mission/business process planning;
  2. \n
  3. Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and
  4. \n
  5. Establishes a discrete line item for information security in organizational programming and budgeting documentation.
  6. \n
\n\n|SA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SA-3 System Development Life Cycle (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations;
  2. \n
  3. Defines and documents information security roles and responsibilities throughout the system development life cycle;
  4. \n
  5. Identifies individuals having information security roles and responsibilities; and
  6. \n
  7. Integrates the organizational information security risk management process into system development life cycle activities.
  8. \n
\n\n|SA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-3(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SA-4 Acquisitions Process (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs:\n
    \n
  1. Security functional requirements;
  2. \n
  3. Security strength requirements;
  4. \n
  5. Security assurance requirements;
  6. \n
  7. Security-related documentation requirements;
  8. \n
  9. Requirements for protecting security-related documentation;
  10. \n
  11. Description of the information system development environment and environment in which the system is intended to operate; and
  12. \n
  13. Acceptance criteria.

  14. \nAdditional FedRAMP Requirements and Guidance:
    \nGuidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. \nSee http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.\n
\n\n|SA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n\n#"} {"question": "SA-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.\n\n|SA-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (2) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: [FedRAMP Selection (one or more): to include security-relevant external system interfaces, and high-level design]; [Assignment: organization-defined design/implementation information] at [Assignment: organization-defined level of detail].\n\n|SA-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-4-1:\n|Parameter SA-4-2:\n|Parameter SA-4-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains [FedRAMP Assignment: at least the minimum requirement as defined in control CA-7].
\nSA-4 (8) Additional FedRAMP Requirements and Guidance:
\nGuidance: CSP must use the same security standards regardless of where the system component or information system service is acquired.\n\n|SA-4 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-4(8):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.\n\n|SA-4 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.\n\n|SA-4 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (10) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-5 Information System Documentation (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Obtains administrator documentation for the information system, system component, or information system service that describes:
  2. \n
      \n
    1. Secure configuration, installation, and operation of the system, component, or service;
    2. \n
    3. Effective use and maintenance of security functions/mechanisms; and
    4. \n
    5. Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;
    6. \n
    \n
  3. Obtains user documentation for the information system, system component, or information system service that describes:
  4. \n
      \n
    1. User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms;
    2. \n
    3. Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and
    4. \n
    5. User responsibilities in maintaining the security of the system, component, or service;
    6. \n
    \n
  5. Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and [Assignment: organization-defined actions] in response;
  6. \n
  7. Protects documentation as required, in accordance with the risk management strategy; and
  8. \n
  9. Distributes documentation to [Assignment: organization-defined personnel or roles)].
  10. \n
\n\n|SA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-5(c):\n|Parameter SA-5(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SA-8 Security Engineering Principles (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.\n\n|SA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-9 External Information System Services (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Requires that providers of external information system services comply with organizational information security requirements and employ [FedRAMP Assignment: FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
  2. \n
  3. Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and
  4. \n
  5. Employs [FedRAMP Assignment: Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored] to monitor security control compliance by external service providers on an ongoing basis.

  6. \nAdditional FedRAMP Requirements and Guidance
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Continuous Monitoring Strategy Guide\nhttps://www.FedRAMP.gov/documents
    \nGuidance:\u00a0Independent Assessors should assess the risk associated with the use of external services.\u00a0See the FedRAMP page under\u00a0Key Cloud Service Provider (CSP) Documents>FedRAMP Authorization Boundary Guidance\n
\n\n|SA-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(a):\n|Parameter SA-9(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SA-9 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services; and
  2. \n
  3. Ensures that the acquisition or outsourcing of dedicated information security services is approved by [Assignment: organization-defined personnel or roles].
  4. \n
\n\n|SA-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SA-9 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires providers of [FedRAMP Assignment: All external systems where Federal information is processed or stored] to identify the functions, ports, protocols, and other services required for the use of such services.\n\n|SA-9 (2) Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Assignment: organization-defined security safeguards] to ensure that the interests of [FedRAMP Assignment: All external systems where Federal information is processed or stored] are consistent with and reflect organizational interests.\n\n|SA-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(4)-1:\n|Parameter SA-9(4)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "SA-9 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts the location of [FedRAMP Selection: information processing, information data, AND information services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].
\nAdditional FedRAMP Requirements and Guidance
\nGuidance: System services refer to FTP, Telnet, and TFTP, etc.\n\n|SA-9 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(5)-1:\n|Parameter SA-9(5)-2:\n|Parameter SA-9(5)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-10 Developer Configuration Management (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to:\n
    \n
  1. Perform configuration management during system, component, or service [FedRAMP Selection: development, implementation, AND operation];
  2. \n
  3. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
  4. \n
  5. Implement only organization-approved changes to the system, component, or service;
  6. \n
  7. Document approved changes to the system, component, or service and the potential security impacts of such changes; and
  8. \n
  9. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
  10. \nSA-10 (e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: For JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.\n
\n\n|SA-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-10(a):\n|Parameter SA-10(b):\n|Parameter SA-10(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-10 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SA-10 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.\n\n|SA-10 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-10 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 Developer Security Testing and Evaluation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to:\n
    \n
  1. Create and implement a security assessment plan;
  2. \n
  3. Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation at [Assignment: organization-defined depth and coverage];
  4. \n
  5. Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation;
  6. \n
  7. Implement a verifiable flaw remediation process; and
  8. \n
  9. Correct flaws identified during security testing/evaluation.
  10. \n
\n\n|SA-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-11(b)-1:\n|Parameter SA-11(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part e|\n|Part d|\n\n#"} {"question": "SA-11 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
\nSA-11 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.\n\n|SA-11 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-11(b)-1:\n|Parameter SA-11(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.\n\n|SA-11 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.\n\n|SA-11 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (8) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Physical and Environmental Protection (PE)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PE-1 Physical and Environmental Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Physical and environmental protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Physical and environmental protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PE-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-1(a):\n|Parameter PE-1(b)(1):\n|Parameter PE-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PE-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "PE-2 Physical Access Authorizations (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
  2. \n
  3. Issues authorization credentials for facility access;
  4. \n
  5. Reviews the access list detailing authorized facility access by individuals [FedRAMP Assignment: at least annually]; and
  6. \n
  7. Removes individuals from the facility access list when access is no longer required.
  8. \n
\n\n|PE-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PE-3 Physical Access Control (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Enforces physical access authorizations at [Assignment: organization-defined entry/exit points to the facility where the information system resides] by:
  2. \n
      \n
    1. Verifying individual access authorizations before granting access to the facility; and
    2. \n
    3. Controlling ingress/egress to the facility using [FedRAMP Assignment: CSP defined physical access control systems/devices AND guards];
    4. \n
    \n
  3. Maintains physical access audit logs for [Assignment: organization-defined entry/exit points];
  4. \n
  5. Provides [Assignment: organization-defined security safeguards] to control access to areas within the facility officially designated as publicly accessible;
  6. \n
  7. Escorts visitors and monitors visitor activity [FedRAMP Assignment: in all circumstances within restricted access area where the information system resides];
  8. \n
  9. Secures keys, combinations, and other physical access devices;
  10. \n
  11. Inventories [Assignment: organization-defined physical access devices] every [FedRAMP Assignment: at least annually]; and
  12. \n
  13. Changes combinations and keys [FedRAMP Assignment: at least annually] and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
  14. \n
\n\n|PE-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-3(a):\n|Parameter PE-3(a)(2):\n|Parameter PE-3(b):\n|Parameter PE-3(c):\n|Parameter PE-3(d):\n|Parameter PE-3(f)-1:\n|Parameter PE-3(f)-2:\n|Parameter PE-3(g):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n\n#"} {"question": "PE-4 Access Control for Transmission Medium (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization controls physical access to [Assignment: organization-defined information system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security safeguards].\n\n|PE-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-4-1:\n|Parameter PE-4-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-5 Access Control for Output Devices (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.\n\n|PE-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-6 Monitoring Physical Access (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;
  2. \n
  3. Reviews physical access logs [FedRAMP Assignment: at least monthly] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and
  4. \n
  5. Coordinates results of reviews and investigations with the organization\u2019s incident response capability.
  6. \n
\n\n|PE-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-6(b)-1:\n|Parameter PE-6(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PE-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization monitors physical intrusion alarms and surveillance equipment.\n\n|PE-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-8 Visitor Access Records (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Maintains visitor access records to the facility where the information system resides for [FedRAMP Assignment: for a minimum of one (1) year]; and
  2. \n
  3. Reviews visitor access records [FedRAMP Assignment: at least monthly]
  4. \n
\n\n|PE-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-8(a):\n|Parameter PE-8(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PE-9 Power Equipment and Cabling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects power equipment and power cabling for the information system from damage and destruction.\n\n|PE-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-9 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-10 Emergency Shutoff (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Provides the capability of shutting off power to the information system or individual system components in emergency situations;
  2. \n
  3. Places emergency shutoff switches or devices in [Assignment: organization-defined location by information system or system component] to facilitate safe and easy access for personnel; and
  4. \n
  5. Protects emergency power shutoff capability from unauthorized activation.
  6. \n
\n\n|PE-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-10(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-10 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PE-11 Emergency Power (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides a short-term uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the information system; transition of the information system to long-term alternate power] in the event of a primary power source loss. \n\n|PE-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-11:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-11 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-12 Emergency Lighting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.\n\n|PE-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 Fire Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.\n\n|PE-13|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].\n\n|PE-13 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-13(2)-1:\n|Parameter PE-13(2)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.\n\n|PE-13 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-14 Temperature and Humidity Controls (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Maintains temperature and humidity levels within the facility where the information system resides at [FedRAMP Assignment: consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled \"Thermal Guidelines for Data Processing Environments]; and
  2. \nPE-14 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider measures temperature at server inlets and humidity levels by dew point.\n
  3. Monitors temperature and humidity levels [FedRAMP Assignment: continuously].
  4. \n
\n\n|PE-14|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-14(a):\n|Parameter PE-14(b):\n|Parameter PE-14(b) Additional:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-14 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PE-14 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.\n\n|PE-14 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-14 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-15 Water Damage Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.\n\n|PE-15|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-15 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-16 Delivery and Removal (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization authorizes, monitors, and controls [FedRAMP Assignment: all information system components] entering and exiting the facility and maintains records of those items.\n\n|PE-16|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-16:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-16 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-17 Alternate Work Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs [Assignment: organization-defined security controls] at alternate work sites;
  2. \n
  3. Assesses as feasible, the effectiveness of security controls at alternate work sites; and
  4. \n
  5. Provides a means for employees to communicate with information security personnel in case of security incidents or problems.
  6. \n
\n\n|PE-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-17(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-17 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c"} {"question": "Security Assessment and Authorization (CA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CA-1 Certification, Authorization, Security Assessment Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security assessment and authorization policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Security assessment and authorization procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-1(a):\n|Parameter CA-1(b)(1):\n|Parameter CA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CA-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CA-2 Security Assessments (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a security assessment plan that describes the scope of the assessment including:
  2. \n
      \n
    1. Security controls and control enhancements under assessment;
    2. \n
    3. Assessment procedures to be used to determine security control effectiveness; and
    4. \n
    5. Assessment environment, assessment team, and assessment roles and responsibilities;
    6. \n
    \n
  3. Assesses the security controls in the information system and its environment of operation [FedRAMP Assignment: at least annually] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;
  4. \n
  5. Produces a security assessment report that documents the results of the assessment; and
  6. \n
  7. Provides the results of the security control assessment to [FedRAMP Assignment: individuals or roles to include the FedRAMP Program Management Office (PMO)].
  8. \nCA-2 Additional FedRAMP Requirements and Guidance
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Annual Assessment Guidance https://www.fedramp.gov/documents/\n
\n\n|CA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(b):\n|Parameter CA-2(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CA-2 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.
\nCA-2 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).\n\n|CA-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes as part of security control assessments, [FedRAMP Assignment: at least annually], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].
\nCA-2 (2) Additional FedRAMP Requirements and Guidance:
\nRequirement: To include 'announced', 'vulnerability scanning\u2019 to occur at least annually.\n\n|CA-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(2)-1:\n|Parameter CA-2(2)-2:\n|Parameter CA-2(2)-3:\n|Parameter CA-2(2)-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization accepts the results of an assessment of [FedRAMP Assignment: organization-defined information system] performed by [FedRAMP Assignment: any FedRAMP Accredited 3PAO] when the assessment meets [FedRAMP Assignment: the conditions of the JAB/AO in the FedRAMP Repository].\n\n|CA-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(3)-1:\n|Parameter CA-2(3)-2:\n|Parameter CA-2(3)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-3 System Interconnections (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
  2. \n
  3. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
  4. \n
  5. Reviews and updates Interconnection Security Agreements [FedRAMP Assignment: at least annually and on input from FedRAMP].
  6. \n
\n\n|Authorized Connections Information System Name|Name of Organization CSP Name System Connects To|Role and Name of Person Who Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|---|---|---|---|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n\n|CA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 What is the solution and how is it implemented?|\n|---|\n|Part a: See System Interconnections for information about implementation.|\n|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|\n|Part c|\n\n#"} {"question": "CA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].
\nCA-3 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: Refer to Appendix H \u2013 Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22\n\n|CA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 What is the solution and how is it implemented?|\n|---|\n|Part a: See System Interconnections for information about implementation.|\n|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|\n|Part c|\n\n#"} {"question": "CA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].
\nCA-3 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: Refer to Appendix H \u2013 Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22\n\n|CA-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(3)-1:\n|Parameter CA-3(3)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-3 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Selection: allow-all, deny-by-exception, deny-all, permit by exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.
\nCA-3 (5) Additional FedRAMP Requirements and Guidance:
\nGuidance: For JAB Authorization, CSPs shall include details of this control in their architecture briefing.\n\n|CA-3 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(5)-1:\n|Parameter CA-3(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-5 Plan of Action and Milestones (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a plan of action and milestones for the information system to document the organization\u2019s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and
  2. \n
  3. Updates existing plan of action and milestones [FedRAMP Assignment: at least monthly] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
  4. \nCA-5 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Plan of Action & Milestones (POA&M) must be provided at least monthly.\nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Plan of Action and Milestones (POA&M) Template Completion Guide\nhttps://www.FedRAMP.gov/documents/\n
\n\n|CA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-5(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-5 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CA-6 Security Authorization (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Assigns a senior-level executive or manager as the authorizing official for the information system;
  2. \n
  3. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
  4. \n
  5. Updates the security authorization [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs].
  6. \nCA-6c Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.\n
\n\n|CA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-6(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CA-7 Continuous Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:\n
    \n
  1. Establishment of [Assignment: organization-defined metrics] to be monitored;
  2. \n
  3. Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;
  4. \n
  5. Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;
  6. \n
  7. Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;
  8. \n
  9. Correlation and analysis of security-related information generated by assessments and monitoring;
  10. \n
  11. Response actions to address results of the analysis of security-related information; and
  12. \n
  13. Reporting the security status of organization and the information system to [FedRAMP Assignment: to meet Federal and FedRAMP requirements] [Assignment: organization-defined frequency].
  14. \nCA-7 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
    \nGuidance: CSPs must provide evidence of closure and remediation of a high vulnerability within the timeframe for standard POA&M updates.
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Continuous Monitoring Strategy Guide\nhttps://www.fedramp.gov/documents/\n
\n\n|CA-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-7(a):\n|Parameter CA-7(b)-1:\n|Parameter CA-7(b)-2:\n|Parameter CA-7(g)-1:\n|Parameter CA-7(g)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\nCA-7 Additional FedRAMP Requirements and Guidance:
\nRequirement 1: Operating System Scans: at least monthly
\nRequirement 2: Database and Web Application Scans: at least monthly
\nRequirement 3: All scans performed by Independent Assessor: at least annually
\n\n|CA-7 Req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 What is the solution and how is it implemented?|\n|---|\n|Req. 1|\n|Req. 2|\n|Req. 3|\n\n#"} {"question": "CA-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.\n\n|CA-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-7(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-8 Penetration Testing (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization conducts penetration testing [FedRAMP Assignment: at least annually] on [Assignment: organization-defined information systems or system components].\n\nCA-8 Additional FedRAMP Requirements and Guidance
\nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Penetration Test Guidance\nhttps://www.fedramp.gov/documents/\n\n|CA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-8-1:\n|Parameter CA-8-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.\n\n|CA-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-9 Internal System Connections (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and
  2. \n
  3. Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.
  4. \n
\n\n|CA-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-9(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|"} {"question": "System and Communications Protection (SC)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SC-1 System and Communications Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and communications protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and communications protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|SC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-1(a):\n|Parameter SC-1(b)(1):\n|Parameter SC-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|SC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SC-2 Application Partitioning (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system separates user functionality (including user interface services) from information system management functionality.\n\n|SC-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-4 Information in Shared Resources (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents unauthorized and unintended information transfer via shared system resources.\n\n|SC-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-5 Denial of Service Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or reference to source for such information] by employing [Assignment: organization-defined security safeguards].\n\n|SC-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-5-1:\n|Parameter SC-5-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-6 Resource Availability (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].\n\n|SC-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-6-1:\n|Parameter SC-6-2:\n|Parameter SC-6-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 Boundary Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; and
  2. \n
  3. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and
  4. \n
  5. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with organizational security architecture.
  6. \n
\n\n|SC-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SC-7 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization limits the number external network connections to the information system.\n\n|SC-7 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n\n#"} {"question": "SC-7 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements a managed interface for each external telecommunication service;
  2. \n
  3. Establishes a traffic flow policy for each managed interface;
  4. \n
  5. Protects the confidentiality and integrity of the information being transmitted across each interface;
  6. \n
  7. Documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and
  8. \n
  9. Reviews exceptions to the traffic flow policy [FedRAMP Assignment: at least at least annually] and removes exceptions that are no longer supported by an explicit mission/business need.
  10. \n
\n\n|SC-7 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(4)(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (4) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SC-7 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system at managed interfaces denies network traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).\n\n|SC-7 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (5) What is the solution and how is it implemented?|\n|---|\n|Part a\n\n#"} {"question": "SC-7 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks.\n\n|SC-7 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system routes [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.\n\n|SC-7 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(8)-1:\n|Parameter SC-7(8)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (12) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].\n\n|SC-7 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(12)-1:\n|Parameter SC-7(12)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (12) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (13) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization isolates [FedRAMP Assignment: See SC-7 (13) additional FedRAMP Requirements and Guidance] from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
\nSC-7 (13) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets. \n\n|SC-7 (13)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(13):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (13) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (18) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system fails securely in the event of an operational failure of a boundary protection device.\n\n|SC-7 (18)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (18) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-8 Transmission confidentiality and Integrity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the [FedRAMP Assignment: confidentiality AND integrity] of transmitted information.\n\n|SC-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to [FedRAMP Assignment: prevent unauthorized disclosure of information AND detect changes to information] during transmission unless otherwise protected by [FedRAMP Assignment: a hardened or alarmed carrier Protective Distribution System (PDS)].\n\n|SC-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-8 (1)-1:\n|Parameter SC-8 (1)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-10 Network Disconnect (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system terminates the network connection associated with a communications session at the end of the session or after [FedRAMP Assignment: no longer than thirty (30) minutes for RAS-based sessions and no longer than sixty (60) minutes for non-interactive user sessions] of inactivity.\n\n|SC-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 Cryptographic Key Establishment & Management (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
\nSC-12 Additional FedRAMP Requirements and Guidance:
\nGuidance: Federally approved and validated cryptography.\n\n|SC-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization produces, controls, and distributes symmetric cryptographic keys using [FedRAMP Selection: NIST FIPS-compliant] key management technology and processes.\n\n|SC-12 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization produces, controls, and distributes asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user\u2019s private key].\n\n|SC-12 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12 (3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-13 Use of Cryptography (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements [FedRAMP Assignment: FIPS-validated or NSA-approved cryptography] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.\n\n|SC-13|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-13:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-13 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-15 Collaborative Computing Devices (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Prohibits remote activation of collaborative computing devices with the following exceptions:[FedRAMP Assignment: no exceptions]; and
  2. \n
  3. Provides an explicit indication of use to users physically present at the devices.
  4. \nSC-15 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.\n
\n\n|SC-15|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-15(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-15 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\nSC-15 Additional FedRAMP Requirements and Guidance:
\nRequirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.\n\n|SC-15 req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-15(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-15 What is the solution and how is it implemented?|\n|---|\n|Req. 1|\n\n#"} {"question": "SC-17 Public Key Infrastructure Certificates (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization issues public key certificates under an [Assignment: organization-defined certificate policy] or obtains public key certificates from an approved service provider.\n\n|SC-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-17:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-17 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-18 Mobile Code (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Defines acceptable and unacceptable mobile code and mobile code technologies;
  2. \n
  3. Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and
  4. \n
  5. Authorizes, monitors, and controls the use of mobile code within the information system.
  6. \n
\n\n|SC-18|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-18 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n##"} {"question": "SC-19 Voice Over Internet Protocol (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
  2. \n
  3. Authorizes, monitors, and controls the use of VoIP within the information system.
  4. \n
\n\n|SC-19|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-19 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SC-20 Secure Name / Address Resolution Service (Authoritative Source) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and
  2. \n
  3. Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
  4. \n
\n\n|SC-20|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-20 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SC-21 Secure Name / Address Resolution Service (Recursive or Caching Resolver) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.\n\n|SC-21|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-21|Control Summary Information|\n|---|---|\n|//date|\n\n|SC-21 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-22 Architecture and Provisioning for Name / Address Resolution Service (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.\n\n|SC-22|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\nSC-22 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-23 Session Authenticity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the authenticity of communications sessions.\n\n|SC-23|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-23 What is the solution and how is it implemented|\n|---|\n||\n\n#"} {"question": "SC-28 Protection of Information at Rest (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the [FedRAMP Selection: confidentiality AND integrity]] of [Assignment: organization-defined information at rest].\nSC-28 Additional FedRAMP Requirements and Guidance:
\nGuidance: The organization supports the capability to use cryptographic mechanisms to protect information at rest.\n\n|SC-28|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-28-1:\n|Parameter SC-28-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-28 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-28 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components]\n\n|SC-28 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-28(1)-1:\n|Parameter SC-28(1)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-28 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-39 Process Isolation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system maintains a separate execution domain for each executing process.\n\n|SC-39|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-39 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Maintenance (MA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "MA-1 System Maintenance Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System maintenance policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System maintenance procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|MA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-1(a):\n|Parameter MA-1(b)(1):\n|Parameter MA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|MA-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MA-2 Controlled Maintenance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
  2. \n
  3. Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;
  4. \n
  5. Requires that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
  6. \n
  7. Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
  8. \n
  9. Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and
  10. \n
  11. Includes [Assignment: organization-defined maintenance-related information] in organizational maintenance records.
  12. \n
\n\n|MA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-2(c):\n|Parameter MA-2(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "MA-3 Maintenance Tools (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization approves, controls, and monitors information system maintenance tools.\n\n|MA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.\n\n|MA-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.\n\n|MA-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:\n
    \n
  1. Verifying that there is no organizational information contained on the equipment;
  2. \n
  3. Sanitizing or destroying the equipment;
  4. \n
  5. Retaining the equipment within the facility; or
  6. \n
  7. Obtaining an exemption from [FedRAMP Assignment: the information owner explicitly authorizes removal of the equipment from the facility].
  8. \n
\n\n|MA-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-3(3)(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "MA-4 Remote Maintenance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Approves and monitors nonlocal maintenance and diagnostic activities;
  2. \n
  3. Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;
  4. \n
  5. Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;
  6. \n
  7. Maintains records for nonlocal maintenance and diagnostic activities; and
  8. \n
  9. Terminates session and network connections when nonlocal maintenance is completed.
  10. \n
\n\n|MA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "MA-4 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.\n\n|MA-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-5 Maintenance Personnel (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
  2. \n
  3. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
  4. \n
  5. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
  6. \n
\n\n|MA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "MA-5 (1) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
  2. \n
      \n
    1. Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;
    2. \n
    3. Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and
    4. \n
    \n
  3. Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.
  4. \nMA-5 (1) Additional FedRAMP Requirements and Guidance:
    \nRequirement: Only MA-5 (1) (a) (1) is required by FedRAMP\n
\n\n|MA-5 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-5 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MA-6 Timely Maintenance (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization obtains maintenance support and/or spare parts for [Assignment: organization-defined information system components] within [Assignment: organization-defined time period] of failure.\n\n|MA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-6(1):\n|Parameter MA-6(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "Identification and Authentication (IA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "IA-1 Identification and Authentication Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Identification and authentication policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Identification and authentication procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|IA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-1(a):\n|Parameter IA-1(a):\n|Parameter IA-1(b)(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|IA-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "IA-2 User Identification and Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).\n\n|IA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for network access to privileged accounts.\n\n|IA-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (1) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for network access to non-privileged accounts.\n\n|IA-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (2) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for local access to privileged accounts.\n\n|IA-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (3) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.\n\n|IA-2 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (5) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.\n\n#"} {"question": "IA-2 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.\n\n|IA-2 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (8) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (11) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [FedRAMP Assignment: FIPS 140-2, NIAP* Certification, or NSA approval].\n*National Information Assurance Partnership (NIAP)
\nAdditional FedRAMP Requirements and Guidance:
\nGuidance: PIV = separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials. FIPS 140-2 means validated by the Cryptographic Module Validation Program (CMVP).\n\n|IA-2 (11)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-2(11):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (11) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (12) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials.\nIA-2 (12) Additional FedRAMP Requirements and Guidance:
\nGuidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.\n\n|IA-2 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (12) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-3 Device Identification and Authentication (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates [Assignment: organization-defined specific and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.\n\n|IA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-3-1:\n|Parameter IA-3-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-3 What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-4 Identifier Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages information system identifiers for users and devices by:\n
    \n
  1. Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, or device identifier;
  2. \n
  3. Selecting an identifier that identifies an individual, group, role, or device;
  4. \n
  5. Assigning the identifier to the intended individual, group, role, or device;
  6. \n
  7. Preventing reuse of identifiers for [FedRAMP Assignment: at least two (2) years]; and
  8. \n
  9. Disabling the identifier after [FedRAMP Assignment: ninety days for user identifiers (see additional requirements and guidance)]
  10. \nIA-4e Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines the time period of inactivity for device identifiers.\nGuidance: For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.\n
\n\n|IA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-4(a):\n|Parameter IA-4(d):\n|Parameter IA-4(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-4 What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "IA-4 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages individual identifiers by uniquely identifying each individual as [FedRAMP Assignment: contractors; foreign nationals].\n\n|IA-4 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-4 (4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-4 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 Authenticator Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages information system authenticators by:\n
    \n
  1. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;
  2. \n
  3. Establishing initial authenticator content for authenticators defined by the organization;
  4. \n
  5. Ensuring that authenticators have sufficient strength of mechanism for their intended use;
  6. \n
  7. Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;
  8. \n
  9. Changing default content of authenticators prior to information system installation;
  10. \n
  11. Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;
  12. \n
  13. Changing/refreshing authenticators [Assignment: organization-defined time period by authenticator type].
  14. \n
  15. Protecting authenticator content from unauthorized disclosure and modification;
  16. \n
  17. Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and
  18. \n
  19. Changing authenticators for group/role accounts when membership to those accounts changes.
  20. \nIA-5 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3.\n
\n\n|IA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(g):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n|Part h|\n|Part i|\n|Part j|\n\n#"} {"question": "IA-5 (1) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for password-based authentication:\n
    \n
  1. Enforces minimum password complexity of [Assignment: organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type];
  2. \n
  3. Enforces at least the following number of changed characters when new passwords are created: [FedRAMP Assignment: at least one (1)];
  4. \n
  5. Stores and transmits only cryptographically-protected passwords;
  6. \n
  7. Enforces password minimum and maximum lifetime restrictions of [Assignment: organization- defined numbers for lifetime minimum, lifetime maximum];
  8. \n
  9. Prohibits password reuse for [FedRAMP Assignment: twenty-four (24)] generations; and
  10. \n
  11. Allows the use of a temporary password for system logons with an immediate change to a permanent password.
  12. \nIA-5 (1) a and d Additional FedRAMP Requirements and Guidance:
    \nGuidance: If password policies are compliant with NIST SP 800-63B Memorized Secret (Section 5.1.1) Guidance, the control may be considered compliant.\n
\n\n|IA-5 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(1)(a):\n|Parameter IA-5(1)(b):\n|Parameter IA-5(1)(d):\n|Parameter IA-5(1)(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n\n#"} {"question": "IA-5 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for PKI-based authentication:\n
    \n
  1. Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;
  2. \n
  3. Enforces authorized access to the corresponding private key;
  4. \n
  5. Maps the authenticated identity to the account of the individual or group; and
  6. \n
  7. Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
  8. \n
\n\n|IA-5 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (2) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "IA-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that the registration process to receive [FedRAMP Assignment: All hardware/biometric (multifactor authenticators] be conducted [FedRAMP Selection: in person] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].\n\n|IA-5 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(3)-1:\n|Parameter IA-5(3)-2:\n|Parameter IA-5(3)-3:\n|Parameter IA-5(3)-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy [Assignment: organization-defined requirements].\nIA-5 (4) Additional FedRAMP Requirements and Guidance:
\nGuidance: If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.\n\n|IA-5 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (6) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.\n\n|IA-5 (6)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (6) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.\n\n|IA-5 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (11) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].\n\n|IA-5 (11)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(11):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (11) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-6 Authenticator Feedback (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.\n\n|IA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-7 Cryptographic Module Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.\n\n|IA-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 Identification and Authentication (Non-Organizational Users) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).\n\n|IA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies.\n\n|IA-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (2) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts only FICAM-approved third-party credentials.\n\n|IA-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (3) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs only FICAM-approved information system components in [Assignment: organization-defined information systems] to accept third-party credentials.\n\n|IA-8 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-8(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (4) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system conforms to FICAM-issued profiles.\n\n|IA-8 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (4) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Access Control (AC)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AC-1 Access Control Policy and Procedures Requirements (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the access control policy and associated access controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Access control policy [FedRAMP Assignment: at least every 3 years]; and
    2. \n
    3. Access control procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|AC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-1(a):\n|Parameter AC-1(b)(1):\n|Parameter AC-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b1|\n|Part b2|\n\n#"} {"question": "AC-2 Account Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
  2. \n
  3. Assigns account managers for information system accounts;
  4. \n
  5. Establishes conditions for group and role membership;
  6. \n
  7. Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;
  8. \n
  9. Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;
  10. \n
  11. Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions];
  12. \n
  13. Monitors the use of information system accounts;
  14. \n
  15. Notifies account managers:
  16. \n
      \n
    1. When accounts are no longer required;
    2. \n
    3. When users are terminated or transferred; and
    4. \n
    5. When individual information system usage or need-to-know changes;
    6. \n
    \n
  17. Authorizes access to the information system based on:
  18. \n
      \n
    1. A valid access authorization;
    2. \n
    3. Intended system usage; and
    4. \n
    5. Other attributes as required by the organization or associated missions/business functions;
    6. \n
    \n
  19. Reviews accounts for compliance with account management requirements [FedRAMP Assignment: at least annually]; and
  20. \n
  21. Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
  22. \n
\n\n|AC-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(a):\n|Parameter AC-2(e):\n|Parameter AC-2(f):\n|Parameter AC-2(j):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n|Part h\n|Part i\n|Part j\n|Part k\n\n#"} {"question": "AC-2 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the management of information system accounts.\n\n|AC-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically [Selection: removes; disables] temporary and emergency accounts after [FedRAMP Assignment: no more than 30 days for temporary and emergency account types].\n\n|AC-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(2)1:\n|Parameter AC-2(2)2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (3) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically disables inactive accounts after [FedRAMP Assignment: ninety (90) days for user accounts].
\nAC-2 (3) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the Joint Authorization Board (JAB)/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.\n\n|AC-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies [Assignment: organization-defined personnel or roles].\n\n|AC-2 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].
\nAC-2 (5) Additional FedRAMP Requirements and Guidance:
\nGuidance: Should use a shorter timeframe than AC-12\n\n|AC-2 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(5):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (7) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles;
  2. \n
  3. Monitors privileged role assignments; and
  4. \n
  5. Takes [Assignment: organization-defined actions] when privileged role assignments are no longer appropriate.
  6. \n
\n\n|AC-2 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(7):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (7) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "AC-2 (9) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization only permits the use of shared/group accounts that meet [Assignment: organization-defined conditions for establishing shared/group accounts].
\nAC-2 (9) Additional FedRAMP Requirements and Guidance: Required if shared/group accounts are deployed.\n\n|AC-2 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(9):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system terminates shared/group account credentials when members leave the group.
\nAC-2 (10) Additional FedRAMP Requirements and Guidance:
\nRequired if shared/group accounts are deployed.\n\n|AC-2 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(10):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (10) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (12) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors information system accounts for [Assignment: organization-defined atypical use]; and
  2. \n
  3. Reports atypical usage of information system accounts to [Assignment: organization-defined personnel or roles].
  4. \nAC-2 (12) (a) and AC-2 (12) (b) Additional FedRAMP Requirements and Guidance: Required for privileged accounts.\n
\n\n|AC-2 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(12)(a):\n|Parameter AC-2(12)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (12) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-3 Access Enforcement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.\n\n|AC-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-3 What is the solution and how is it implemented?|\n|---|\n|Part a"} {"question": "AC-4 Information Flow Enforcement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on [Assignment: organization-defined information flow control policies].\n\n|AC-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-4\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-4 (21) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system separates information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].\n\n|AC-4 (21)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-4(21)-1\n|Parameter AC-4(21)-2\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-4 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-5 Separation of Duties (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Separates [Assignment: organization-defined duties of individuals];
  2. \n
  3. Documents separation of duties of individuals; and
  4. \n
  5. Defines information system access authorizations to support separation of duties.
  6. \nAC-5 Additional FedRAMP Requirements and Guidance:
    \nGuidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP. Directions for attaching the Separation of Duties Matrix document may be found in Section Error: Reference source not found Error: Reference source not found.\n
\n\n|AC-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-5(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c"} {"question": "AC-6 Least Privilege (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.\n\n|AC-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].\n\n|AC-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(1)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that users of information system accounts, or roles, with access to [FedRAMP Assignment: all security functions], use non-privileged accounts or roles, when accessing non-security functions.
\nAC-6 (2) Additional FedRAMP Requirements and Guidance:
\nExamples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.\n\n|AC-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(2)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC 6 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts privileged accounts on the information system to [Assignment: organization-defined personnel or roles].\n\n|AC-6 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(5)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system audits the execution of privileged functions.\n\n|AC-6 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.\n\n|AC-6 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (10) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-7 Unsuccessful Login Attempts (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Enforces a limit of [FedRAMP Assignment: not more than three (3)] consecutive invalid logon attempts by a user during a [FedRAMP Assignment: fifteen (15) minutes]; and
  2. \n
  3. Automatically [Selection: locks the account/node for a [FedRAMP Assignment: thirty (30) minutes]; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
  4. \n
\n\n|AC-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-7(a)-1:\n|Parameter AC-7(a)-2:\n|Parameter AC-7(b)-1:\n|Parameter AC-7(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-8 System Use Notification (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Displays to users [Assignment: organization-defined system use notification message or banner (FedRAMP Assignment: see additional Requirements and Guidance)] before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:
  2. \n
      \n
    1. Users are accessing a U.S. Government information system;
    2. \n
    3. Information system usage may be monitored, recorded, and subject to audit;
    4. \n
    5. Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and
    6. \n
    7. Use of the information system indicates consent to monitoring and recording;
    8. \n
    \n
  3. Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and
  4. \n\n
  5. For publicly accessible systems:
  6. \n
      \n
    1. Displays system use information [Assignment: organization-defined conditions (FedRAMP Assignment: see additional Requirements and Guidance)], before granting further access;
    2. \n
    3. Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and
    4. \n
    5. Includes a description of the authorized uses of the system.
    6. \n
    \n
\nAC-8 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
\nRequirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.
\nGuidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
\nRequirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.\n\n|AC-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-8(a)-1:\n|Parameter AC-8(c)-1:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\nAdditional FedRAMP Requirements and Guidance
\nRequirement 1: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
\nRequirement 2: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
\nRequirement 3: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.\n\n|AC-8 Req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-8 What is the solution and how is it implemented?|\n|---|\n|Req 1\n|Req 2\n|Req 3"} {"question": "AC-10 Concurrent Session Control (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system limits the number of concurrent sessions for each [Assignment: organization-defined account and/or account type] to [FedRAMP Assignment: three (3) sessions for privileged access and two (2) sessions for non-privileged access].\n\n|AC-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-10-1:\n|Parameter AC-10-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-10 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-11 Session Lock (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Prevents further access to the system by initiating a session lock after [FedRAMP Assignment: fifteen (15) minutes] of inactivity or upon receiving a request from a user; and
  2. \n
  3. Retains the session lock until the user reestablishes access using established identification and authentication procedures.
  4. \n
\n\n|AC-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-11(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-11 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-11 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image.\n\n|AC-11 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-11(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-11 (1) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-12 Session Termination (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically terminates a user session after [Assignment: organization-defined conditions or trigger events requiring session disconnect].\n\n|AC-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-12 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-14 Permitted Actions without Identification or Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and
  2. \n
  3. Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
  4. \n
\n\n|AC-14|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-14 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-17 Remote Access (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
  2. \n
  3. Authorizes remote access to the information system prior to allowing such connections.
  4. \n
\n\n|AC-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-17 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system monitors and controls remote access methods.\n\n|AC-17 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.\n\n|AC-17 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system routes all remote accesses through [Assignment: organization-defined number] managed network access control points.\n\n|AC-17 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes the execution of privileged commands and access to security-relevant information via remote access only for [Assignment: organization-defined needs]; and
  2. \n
  3. Documents the rationale for such access in the security plan for the information system.
  4. \n
\n\n|AC-17 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(4)(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (4) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-17 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides the capability to expeditiously disconnect or disable remote access to the information system within [FedRAMP Assignment: fifteen (15) minutes].\n\n|AC-17 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(9):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (9) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-18 Wireless Access Restrictions (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
  2. \n
  3. Authorizes wireless access to the information system prior to allowing such connections.
  4. \n
\n\n|AC-18|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-18:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-18 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-18 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.\n\n|AC-18 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-18 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-18 (1) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-19 Access Control for Portable and Mobile Systems (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and
  2. \n
  3. Authorizes the connection of mobile devices to organizational information systems.
  4. \n
\n\n|AC-19|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-19 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-19 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].\n\n|AC-19 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-19(5)-1:\n|Parameter AC-19(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-19 (5) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-20 Use of External Information Systems (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:\n
    \n
  1. Access the information system from external information systems; and
  2. \n
  3. Process, store, or transmit organization-controlled information using external information systems.
  4. \n
\n\n|AC-20|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-20 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:\n
    \n
  1. Verifies the implementation of required security controls on the external system as specified in the organization\u2019s information security policy and security plan; or
  2. \n
  3. Retains approved information system connection or processing agreements with the organizational entity hosting the external information system.
  4. \n
\n\n|AC-20 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-20 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.\n\n|AC-20 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-20(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 (2) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-21 Information Sharing (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and
  2. \n
  3. Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.
  4. \n
\n\n|AC-21|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-21(a):\n|Parameter AC-21(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-21 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-22 Publicly Accessible Content (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Designates individuals authorized to post information onto a publicly accessible information system;
  2. \n
  3. Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
  4. \n
  5. Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and
  6. \n
  7. Reviews the content on the publicly accessible information system for nonpublic information [FedRAMP Assignment: at least quarterly] and removes such information, if discovered.
  8. \n
\n\n|AC-22|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-22\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-22 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n---\ntitle: Awareness and Training (AT)\n---"} {"question": "Awareness and Training (AT)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AT-1 Security Awareness and Training Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security awareness and training policy [FedRAMP Assignment: at least every 3 years]; and
    2. \n
    3. Security awareness and training procedures [FedRAMP Assignment: at least annually].\n
    4. \n
    \n
\n\n|AC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-1(a):\n|Parameter AT-1(b)(1):\n|Parameter AT-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AT-1 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b1:\n|Part b2:\n\n#"} {"question": "AT-2 Security Awareness (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):\n
    \n
  1. As part of initial training for new users;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|AT-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-2 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b1:\n|Part b2:\n\n#"} {"question": "AT-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.\n\n|AT-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-2 (2) What is the solution and how is it implemented?|\n|---\n|Part a:\n\n#"} {"question": "AT-3 Role-Based Security Training (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides role-based security training to personnel with assigned security roles and responsibilities:\n
    \n
  1. Before authorizing access to the information system or performing assigned duties;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|AT-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-3 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b:\n|Part c:\n\n#"} {"question": "AT-4 Security Training Records (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and
  2. \n
  3. Retains individual training records for [FedRAMP Assignment: at least one year].
  4. \n
\n\n|AT-4(b)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-4(b)(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-4 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b:\n---\ntitle: Audit and Accountability (AU)\n---"} {"question": "Audit and Accountability (AU)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AU-1 Audit and Accountability Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Audit and accountability policy [FedRAMP Assignment: at every 3 years]; and
    2. \n
    3. Audit and accountability procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|AU-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-1(a):\n|Parameter AU-1(b)(1):\n|Parameter AU-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AU-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AU-2 Audit Events (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Determines that the information system is capable of auditing the following events: [FedRAMP Assignment: [Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes];
  2. \n
  3. Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events
  4. \n
  5. Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and
  6. \n
  7. Determines that the following events are to be audited within the information system: [FedRAMP Assignment: organization-defined subset of the auditable events defined in AU-2 a. to be audited continually for each identified event].
  8. \nAU-2 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.\n
\n\n|AU-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-1(a):\n|Parameter AU-1(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "AU-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews and updates the audited events [FedRAMP Assignment: annually or whenever there is a change in the threat environment].
\nAU-2 (3) Additional FedRAMP Requirements and Guidance:\nGuidance: Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.\n\n|AU-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-3 Content of Audit Records (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event.\n\n|AU-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-3 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information].
\nAU-3 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines audit record types [FedRAMP Assignment: session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon]. The audit record types are approved and accepted by the JAB.
\nGuidance: For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.\n\n|AU-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-3(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-4 Audit Storage Capacity (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization allocates audit record storage capacity in accordance with [Assignment: organization-defined audit record storage requirements].\n\n|AU-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-5 Response to Audit Processing Failures (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Alerts [Assignment: organization-defined personnel or roles] in the event of an audit processing failure; and
  2. \n
  3. Takes the following additional actions: [FedRAMP Assignment: organization-defined actions to be taken; (overwrite oldest record)].
  4. \n
\n\n|AU-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-5(a):\n|Parameter AU-5(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-5 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-6 Audit Review, Analysis, and Reporting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews and analyzes information system audit records [FedRAMP Assignment: at least weekly] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and
  2. \n
  3. Reports findings to [Assignment: organization-defined personnel or roles].
  4. \nAU-6 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Coordination between service provider and consumer shall be documented and accepted by the Authorizing Official. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.\n
\n\n|AU-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-6(a)-1:\n|Parameter AU-6(a)-2:\n|Parameter AU-6(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.\n\n|AU-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-6 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.\n\n|AU-6 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-7 Audit Reduction and Report Generation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system provides an audit reduction and report generation capability that:\n
    \n
  1. Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and
  2. \n
  3. Does not alter the original content or time ordering of audit records.
  4. \n
\n\n|AU-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system provides the capability to process audit records for events of interest based on [Assignment: organization-defined audit fields within audit records].\n\n|AU-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-7(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-7 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-8 Time Stamps (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Uses internal system clocks to generate time stamps for audit records; and
  2. \n
  3. Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: one second granularity of time measurement].
  4. \n
\n\n|AU-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-8(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-8 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Compares the internal information system clocks with [FedRAMP Assignment: authoritative time source: [http://tf.nist.gov/tf-cgi/servers.cgi] [at least hourly]]; and
  2. \n
  3. Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period].
  4. \nAU-8 (1) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.
    \nRequirement:< The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.
    \nGuidance: The service provider selects primary and secondary time servers used by the NIST Internet time service, or by a Stratum-1 time server. The secondary server is selected from a different geographic region than the primary server.
    \nIf using Windows Active Directory, all servers should synchronize time with the time source for the Windows Domain Controller. If using some other directory services (e.g., LDAP), all servers should synchronize time with the time source for the directory server. Synchronization of system clocks improves the accuracy of log analysis.\n
\n\n|AU-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-8(1)(a)-1:\n|Parameter AU-8(1)(a)-2:\n|Parameter AU-8(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-8 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-9 Protection of Audit Information (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects audit information and audit tools from unauthorized access, modification, and deletion.\n\n|AU-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-9 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system backs up audit records [FedRAMP Assignment: at least weekly] onto a physically different system or system component than the system or component being audited.\n\n|AU-9 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization authorizes access to management of audit functionality to only [Assignment: organization-defined subset of privileged users].\n\n|AU-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-9(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-11 Audit Record Retention (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization retains audit records for [FedRAMP Assignment: at least ninety (90) days] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
\nAU-11 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements\n\n|AU-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-11:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-11 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-12 Audit Generation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Provides audit record generation capability for the auditable events defined in AU-2 a. at [FedRAMP Assignment: all information system components where audit capability is deployed/available];
  2. \n
  3. Allows [Assignment: organization-defined personnel or roles] to select which auditable events are to be audited by specific components of the information system; and
  4. \n
  5. Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.
  6. \n
\n\n|AU-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-12(a):\n|Parameter AU-12(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-12 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n---\ntitle: Security Assessment and Authorization (CA)\n---"} {"question": "Security Assessment and Authorization (CA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CA-1 Certification, Authorization, Security Assessment Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security assessment and authorization policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Security assessment and authorization procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-1(a):\n|Parameter CA-1(b)(1):\n|Parameter CA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CA-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CA-2 Security Assessments (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a security assessment plan that describes the scope of the assessment including:
  2. \n
      \n
    1. Security controls and control enhancements under assessment;
    2. \n
    3. Assessment procedures to be used to determine security control effectiveness; and
    4. \n
    5. Assessment environment, assessment team, and assessment roles and responsibilities;
    6. \n
    \n
  3. Assesses the security controls in the information system and its environment of operation [FedRAMP Assignment: at least annually] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;
  4. \n
  5. Produces a security assessment report that documents the results of the assessment; and
  6. \n
  7. Provides the results of the security control assessment to [FedRAMP Assignment: individuals or roles to include the FedRAMP Program Management Office (PMO)].
  8. \nCA-2 Additional FedRAMP Requirements and Guidance
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Annual Assessment Guidance https://www.fedramp.gov/documents/\n
\n\n|CA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(b):\n|Parameter CA-2(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CA-2 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.
\nCA-2 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).\n\n|CA-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes as part of security control assessments, [FedRAMP Assignment: at least annually], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].
\nCA-2 (2) Additional FedRAMP Requirements and Guidance:
\nRequirement: To include 'announced', 'vulnerability scanning\u2019 to occur at least annually.\n\n|CA-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(2)-1:\n|Parameter CA-2(2)-2:\n|Parameter CA-2(2)-3:\n|Parameter CA-2(2)-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization accepts the results of an assessment of [FedRAMP Assignment: organization-defined information system] performed by [FedRAMP Assignment: any FedRAMP Accredited 3PAO] when the assessment meets [FedRAMP Assignment: the conditions of the JAB/AO in the FedRAMP Repository].\n\n|CA-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-2(3)-1:\n|Parameter CA-2(3)-2:\n|Parameter CA-2(3)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-3 System Interconnections (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;
  2. \n
  3. Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and
  4. \n
  5. Reviews and updates Interconnection Security Agreements [FedRAMP Assignment: at least annually and on input from FedRAMP].
  6. \n
\n\n|Authorized Connections Information System Name|Name of Organization CSP Name System Connects To|Role and Name of Person Who Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|---|---|---|---|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|\n\n|CA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 What is the solution and how is it implemented?|\n|---|\n|Part a: See System Interconnections for information about implementation.|\n|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|\n|Part c|\n\n#"} {"question": "CA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].
\nCA-3 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: Refer to Appendix H \u2013 Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22\n\n|CA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 What is the solution and how is it implemented?|\n|---|\n|Part a: See System Interconnections for information about implementation.|\n|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|\n|Part c|\n\n#"} {"question": "CA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].
\nCA-3 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: Refer to Appendix H \u2013 Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22\n\n|CA-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(3)-1:\n|Parameter CA-3(3)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-3 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Selection: allow-all, deny-by-exception, deny-all, permit by exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.
\nCA-3 (5) Additional FedRAMP Requirements and Guidance:
\nGuidance: For JAB Authorization, CSPs shall include details of this control in their architecture briefing.\n\n|CA-3 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-3(5)-1:\n|Parameter CA-3(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-3 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-5 Plan of Action and Milestones (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a plan of action and milestones for the information system to document the organization\u2019s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and
  2. \n
  3. Updates existing plan of action and milestones [FedRAMP Assignment: at least monthly] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.
  4. \nCA-5 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Plan of Action & Milestones (POA&M) must be provided at least monthly.\nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Plan of Action and Milestones (POA&M) Template Completion Guide\nhttps://www.FedRAMP.gov/documents/\n
\n\n|CA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-5(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-5 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CA-6 Security Authorization (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Assigns a senior-level executive or manager as the authorizing official for the information system;
  2. \n
  3. Ensures that the authorizing official authorizes the information system for processing before commencing operations; and
  4. \n
  5. Updates the security authorization [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs].
  6. \nCA-6c Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.\n
\n\n|CA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-6(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CA-7 Continuous Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:\n
    \n
  1. Establishment of [Assignment: organization-defined metrics] to be monitored;
  2. \n
  3. Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;
  4. \n
  5. Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;
  6. \n
  7. Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;
  8. \n
  9. Correlation and analysis of security-related information generated by assessments and monitoring;
  10. \n
  11. Response actions to address results of the analysis of security-related information; and
  12. \n
  13. Reporting the security status of organization and the information system to [FedRAMP Assignment: to meet Federal and FedRAMP requirements] [Assignment: organization-defined frequency].
  14. \nCA-7 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.
    \nGuidance: CSPs must provide evidence of closure and remediation of a high vulnerability within the timeframe for standard POA&M updates.
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Continuous Monitoring Strategy Guide\nhttps://www.fedramp.gov/documents/\n
\n\n|CA-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-7(a):\n|Parameter CA-7(b)-1:\n|Parameter CA-7(b)-2:\n|Parameter CA-7(g)-1:\n|Parameter CA-7(g)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\nCA-7 Additional FedRAMP Requirements and Guidance:
\nRequirement 1: Operating System Scans: at least monthly
\nRequirement 2: Database and Web Application Scans: at least monthly
\nRequirement 3: All scans performed by Independent Assessor: at least annually
\n\n|CA-7 Req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 What is the solution and how is it implemented?|\n|---|\n|Req. 1|\n|Req. 2|\n|Req. 3|\n\n#"} {"question": "CA-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.\n\n|CA-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-7(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-8 Penetration Testing (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization conducts penetration testing [FedRAMP Assignment: at least annually] on [Assignment: organization-defined information systems or system components].\n\nCA-8 Additional FedRAMP Requirements and Guidance
\nGuidance: See the FedRAMP Documents page under Key Cloud Service\nProvider (CSP) Documents> Penetration Test Guidance\nhttps://www.fedramp.gov/documents/\n\n|CA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-8-1:\n|Parameter CA-8-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.\n\n|CA-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CA-9 Internal System Connections (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and
  2. \n
  3. Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.
  4. \n
\n\n|CA-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CA-9(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CA-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n---\ntitle: Configuration Management (CM)\n---"} {"question": "Configuration Management (CM)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CM-1 Configuration Management Policies and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Configuration management policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Configuration management procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CM-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CM-1(a):\n|Parameter CM-1(b)(1):\n|Parameter CM-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CM-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-2 Baseline Configuration (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system.\n\n|CM-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n\n#"} {"question": "CM-2 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews and updates the baseline configuration of the information system:\n
    \n
  1. [FedRAMP Assignment: at least annually];
  2. \n
  3. When required due to [FedRAMP Assignment: to include when directed by the JAB]; and
  4. \n
  5. As an integral part of information system component installations and upgrades.
  6. \n
\n\n|CM-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CM-2(1)(a):\n|Parameter CM-2(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system.\n\n|CM-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-2 (3) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback.\n\n|CM-2 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-2 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Issues [Assignment: organization-defined information systems, system components, or devices] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk; and
  2. \n
  3. Applies [Assignment: organization-defined security safeguards] to the devices when the individuals return.
  4. \n
\n\n|CM-2 (7)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-2(7)(a)-1:\n|Parameter CM-2(7)(a)-2:\n|Parameter CM-2(7)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (7) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-3 Configuration Change Control (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. (a) Determines the types of changes to the information system that are configuration-controlled;
  2. \n
  3. Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;
  4. \n
  5. Documents configuration change decisions associated with the information system;
  6. \n
  7. Implements approved configuration-controlled changes to the information system;
  8. \n
  9. Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period];
  10. \nCM-3 (e) Additional FedRAMP Requirements and Guidance:
    \nGuidance: In accordance with record retention policies and procedures.\n
  11. Audits and reviews activities associated with configuration-controlled changes to the information system; and
  12. \n
  13. Coordinates and provides oversight for configuration change control activities through [FedRAMP Assignment: see additional FedRAMP requirements and guidance] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]].
  14. \nCM-3 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.\n
\n\n|CM-3|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-3(e):\n|Parameter CM-3(g)-1:\n|Parameter CM-3(g)-2:\n|Parameter CM-3(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-3 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "CM-4 Security Impact Analysis (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.\n\n|CM-4|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 Access Restrictions for Change (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system.\n\n|CM-5|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces access restrictions and supports auditing of the enforcement actions.\n\n|CM-5 (1)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
\nCM-5 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be used.\n\n|CM-5 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-5(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Limits privileges to change information system components and system-related information within a production or operational environment; and
  2. \n
  3. Reviews and reevaluates privileges [FedRAMP Assignment: at least quarterly].
  4. \n
\n\n|CM-5 (5)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-5(5):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (5) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-6 Configuration Settings (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and documents configuration settings for information technology products employed within the information system using [FedRAMP Assignment: see CM-6(a) Additional FedRAMP Requirements and Guidance] that reflect the most restrictive mode consistent with operational requirements;
  2. \nCM-6(a) Additional FedRAMP Requirements and Guidance:
    \nRequirement 1: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.
    \nRequirement 2: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).
    \nGuidance: Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.\n
\n\n
    \n
  1. Implements the configuration settings;
  2. \n
  3. Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment: organization-defined operational requirements]; and
  4. \n
  5. Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.
  6. \n
\n\n|CM-6|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-6(a)-1:\n|Parameter CM-6(a)-2:\n|Parameter CM-6(c)-1:\n|Parameter CM-6(c)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CM-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for [Assignment: organization-defined information system components].\n\n|CM-6|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-6(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n\n#"} {"question": "CM-7 Least Functionality (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Configures the information system to provide only essential capabilities; and
  2. \n
  3. Prohibits or restricts the use of the following functions, ports, protocols, and/or services [FedRAMP Assignment: United States Government Configuration Baseline (USGCB)]
  4. \nCM-7 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.
    \nGuidance: Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline\nPartially derived from AC-17 (8).\n
\n\n|CM-7|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews the information system [FedRAMP Assignment: at least Monthly] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and
  2. \n
  3. Disables [Assignment: organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure].
  4. \n
\n\n|CM-7 (1) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(1)(a):\n|Parameter CM-7(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
\nCM-7 (2) Additional FedRAMP Requirements and Guidance:
\nGuidance: This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e., white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.\n\n|CM-7 (2) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-7 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies [Assignment: organization-defined software programs authorized to execute on the information system];
  2. \n
  3. Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and
  4. \n
  5. Reviews and updates the list of authorized software programs [FedRAMP Assignment: at least annually or when there is a change].
  6. \n
\n\n|CM-7 (5) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(5)(a):\n|Parameter CM-7(5)(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (5) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-8 Information System Component Inventory (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops and documents an inventory of information system components that:
  2. \n
      \n
    1. Accurately reflects the current information system;
    2. \n
    3. Includes all components within the authorization boundary of the information system;
    4. \n
    5. Is at the level of granularity deemed necessary for tracking and reporting; and
    6. \n
    \n
  3. Includes [Assignment: organization-defined information deemed necessary to achieve effective information system component accountability]; and
  4. \n
  5. Reviews and updates the information system component inventory [FedRAMP Assignment: at least monthly].
  6. \nCM-8 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Must be provided at least monthly or when there is a change.\n
\n\n|CM-8 |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-8(a)(4):\n|Parameter CM-8(b): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.\n\nInstruction: A description of the inventory information is documented in Section 10. It is not necessary to re-document it here.
\nDelete this and all other instructions from your final version of this document.\n\n|CM-8 (1)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-8 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs automated mechanisms [FedRAMP Assignment: Continuously, using automated mechanisms with a maximum five-minute delay in detection] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and
  2. \n
  3. Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]].
  4. \n
\n\n|CM-8 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (3) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-8 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories.\n\n|CM-8 (5)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-9 Configuration Management Plan (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops, documents, and implements a configuration management plan for the information system that:\n
    \n
  1. Addresses roles, responsibilities, and configuration management processes and procedures;
  2. \n
  3. Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;
  4. \n
  5. Defines the configuration items for the information system and places the configuration items under configuration management; and
  6. \n
  7. Protects the configuration management plan for unauthorized disclosure and modification.
  8. \n
\n\n|CM-9|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CM-10 Software Usage Restrictions (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Uses software and associated documentation in accordance with contract agreements and copyright laws;
  2. \n
  3. Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and
  4. \n
  5. Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
  6. \n
\n\n|CM-10|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-10 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-10 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].\n\nCM-10|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-10(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-11 User-Installed Software (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes [Assignment: organization-defined policies] governing the installation of software by users;
  2. \n
  3. Enforces software installation policies through [Assignment: organization-defined methods]; and
  4. \n
  5. Monitors policy compliance [FedRAMP Assignment: Continuously (via CM-7 (5))].
  6. \n
\n\nCM-11|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-11(a):\n|Parameter CM-11(b):\n|Parameter CM-11(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n---\ntitle: Contingency Planning (CP)\n---"} {"question": "Contingency Planning (CP)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CP-1 Contingency Planning Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Contingency planning policy [FedRAMP Assignment: at least every three (3) years].; and
    2. \n
    3. Contingency planning procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CP-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-1(a):\n|Parameter CP-1(b)(1):\n|Parameter CP-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CP-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-2 Contingency Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a contingency plan for the information system that:
  2. \n
      \n
    1. Identifies essential missions and business functions and associated contingency requirements;
    2. \n
    3. Provides recovery objectives, restoration priorities, and metrics;
    4. \n
    5. Addresses contingency roles, responsibilities, assigned individuals with contact information;
    6. \n
    7. Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;
    8. \n
    9. Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and
    10. \n
    11. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
    12. \n
    \n
  3. Distributes copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
  4. \n
  5. Coordinates contingency planning activities with incident handling activities;
  6. \n
  7. Reviews the contingency plan for the information system [FedRAMP Assignment: at least annually];
  8. \n
  9. Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
  10. \n
  11. Communicates contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements]; and
  12. \n
  13. Protects the contingency plan from unauthorized disclosure and modification.
  14. \nCP-2 Additional FedRAMP Requirements and Guidance:
    \nRequirement: For JAB authorizations the contingency lists include designated FedRAMP personnel.\n
\n\n|CP-2|Control Summary Information|\n|---|---|\n|Responsible Role\n|Parameter CP-2(a)(6):\n|Parameter CP-2(b):\n|Parameter CP-2(d):\n|Parameter CP-2(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "CP-2 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates contingency plan development with organizational elements responsible for related plans.\n\n|CP-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.\n\n|CP-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization plans for the resumption of essential missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.\n\n|CP-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies critical information system assets supporting essential missions and business functions.\n\n|CP-2 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-2 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-3 Contingency Training (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides contingency training to information system users consistent with assigned roles and responsibilities:\n
    \n
  1. Within [FedRAMP Assignment: ten (10) days] of assuming a contingency role or responsibility;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|CP-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-3(a):\n|Parameter CP-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-4 Contingency Plan Testing (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Tests the contingency plan for the information system [FedRAMP Assignment: at least annually] using [FedRAMP Assignment: functional exercises] to determine the effectiveness of the plan and the organizational readiness to execute the plan;
  2. \nCP-4(a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended) and provides plans to FedRAMP prior to initiating testing. Test plans are approved and accepted by the JAB/AO prior to initiating testing.\n
  3. Reviews the contingency plan test results; and
  4. \n
  5. Initiates corrective actions, if needed.
  6. \n
\n\n|CP-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-4 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CP-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates contingency plan testing and/or exercises with organizational elements responsible for related plans.\n\n|CP-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-6 Alternate Storage Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and
  2. \n
  3. Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
  4. \n
\n\n|CP-6 |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.\n\n|CP-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-6 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.\n\nCP-6 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 Alternate Processing Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined information system operations] for essential missions/business functions within [FedRAMP Assignment: see additional FedRAMP requirements and guidance] when the primary processing capabilities are unavailable;
  2. \nCP-7a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis. \n
  3. Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption; and
  4. \n
  5. Ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
  6. \n
\n\nCP-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-7(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CP-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
\nCP-7 (1) Additional FedRAMP Requirements and Guidance
\nGuidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber-attack), the degree of separation between sites will be less relevant.\n\nCP-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.\n\nCP-7 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).\n\nCP-7 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-8 Telecommunications Services (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of [Assignment: organization-defined information system operations] for essential missions and business functions within [FedRAMP Assignment: See CP-8 additional FedRAMP requirements and guidance] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
\nCP-8 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.\n\nCP-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-8-1:\n|Parameter CP-8-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 What is the solution and how is it implemented?|\n|---|\n||\n\n1. CP-8 (1) Control Enhancement (M) (H)\nThe organization:\n
    \n
  1. Develops primary and alternate telecommunications service agreements that contain priority- of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and
  2. \n
  3. Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and/or alternate telecommunications services are provided by a common carrier.
  4. \n
\n\nCP-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-8 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.\n\nCP-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-9 Information System Backup (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \nCP-9 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.\n
  1. Conducts backups of user-level information contained in the information system [FedRAMP Assignment: daily incremental; weekly full]
  2. \nCP-9 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of user-level information (at least one of which is available online).\n
  3. Conducts backups of system-level information contained in the information system [FedRAMP Assignment: daily incremental; weekly full];
  4. \nCP-9 (b) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online).\n
  5. Conducts backups of information system documentation including security-related documentation [FedRAMP Assignment: daily incremental; weekly full ]; and
  6. \nCP-9 (c) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online).\n
  7. Protects the confidentiality, integrity, and availability of backup information at storage locations.
  8. \n
\n\nCP-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9(a):\n|Parameter CP-9(b):\n|Parameter CP-9(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CP-9 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests backup information [FedRAMP Assignment: at least annually] to verify media reliability and information integrity.\n\nCP-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-9 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization stores backup copies of [Assignment: organization-defined critical information system software and other security-related information] in a separate facility or in a fire-rated container that is not collocated with the operational system.\n\nCP-9 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-10 Information System Recovery and Reconstitution (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.\n\nCP-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-10 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements transaction recovery for systems that are transaction-based.\n\nCP-10 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-10 (2) What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: Identification and Authentication (IA)\n---"} {"question": "Identification and Authentication (IA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "IA-1 Identification and Authentication Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An identification and authentication policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the identification and authentication policy and associated identification and authentication controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Identification and authentication policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Identification and authentication procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|IA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-1(a):\n|Parameter IA-1(a):\n|Parameter IA-1(b)(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|IA-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "IA-2 User Identification and Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates organizational users (or processes acting on behalf of organizational users).\n\n|IA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for network access to privileged accounts.\n\n|IA-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (1) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for network access to non-privileged accounts.\n\n|IA-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (2) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for local access to privileged accounts.\n\n|IA-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (3) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.\n\n|IA-2 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (5) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements replay-resistant authentication mechanisms for network access to privileged accounts.\n\n#"} {"question": "IA-2 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires individuals to be authenticated with an individual authenticator when a group authenticator is employed.\n\n|IA-2 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (8) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (11) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements multifactor authentication for remote access to privileged and non-privileged accounts such that one of the factors is provided by a device separate from the system gaining access and the device meets [FedRAMP Assignment: FIPS 140-2, NIAP* Certification, or NSA approval].\n*National Information Assurance Partnership (NIAP)
\nAdditional FedRAMP Requirements and Guidance:
\nGuidance: PIV = separate device. Please refer to NIST SP 800-157 Guidelines for Derived Personal Identity Verification (PIV) Credentials. FIPS 140-2 means validated by the Cryptographic Module Validation Program (CMVP).\n\n|IA-2 (11)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-2(11):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (11) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-2 (12) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials.\nIA-2 (12) Additional FedRAMP Requirements and Guidance:
\nGuidance: Include Common Access Card (CAC), i.e., the DoD technical implementation of PIV/FIPS 201/HSPD-12.\n\n|IA-2 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-2 (12) What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-3 Device Identification and Authentication (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates [Assignment: organization-defined specific and/or types of devices] before establishing a [Selection (one or more): local; remote; network] connection.\n\n|IA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-3-1:\n|Parameter IA-3-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-3 What is the solution and how is it implemented?|\n|---\n||\n\n#"} {"question": "IA-4 Identifier Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages information system identifiers for users and devices by:\n
    \n
  1. Receiving authorization from [Assignment: organization-defined personnel or roles] to assign an individual, group, role, or device identifier;
  2. \n
  3. Selecting an identifier that identifies an individual, group, role, or device;
  4. \n
  5. Assigning the identifier to the intended individual, group, role, or device;
  6. \n
  7. Preventing reuse of identifiers for [FedRAMP Assignment: at least two (2) years]; and
  8. \n
  9. Disabling the identifier after [FedRAMP Assignment: ninety days for user identifiers (see additional requirements and guidance)]
  10. \nIA-4e Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines the time period of inactivity for device identifiers.\nGuidance: For DoD clouds, see DoD cloud website for specific DoD requirements that go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.\n
\n\n|IA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-4(a):\n|Parameter IA-4(d):\n|Parameter IA-4(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-4 What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "IA-4 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages individual identifiers by uniquely identifying each individual as [FedRAMP Assignment: contractors; foreign nationals].\n\n|IA-4 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-4 (4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-4 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 Authenticator Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization manages information system authenticators by:\n
    \n
  1. Verifying, as part of the initial authenticator distribution, the identity of the individual, group, role, or device receiving the authenticator;
  2. \n
  3. Establishing initial authenticator content for authenticators defined by the organization;
  4. \n
  5. Ensuring that authenticators have sufficient strength of mechanism for their intended use;
  6. \n
  7. Establishing and implementing administrative procedures for initial authenticator distribution, for lost/compromised or damaged authenticators, and for revoking authenticators;
  8. \n
  9. Changing default content of authenticators prior to information system installation;
  10. \n
  11. Establishing minimum and maximum lifetime restrictions and reuse conditions for authenticators;
  12. \n
  13. Changing/refreshing authenticators [Assignment: organization-defined time period by authenticator type].
  14. \n
  15. Protecting authenticator content from unauthorized disclosure and modification;
  16. \n
  17. Requiring individuals to take, and having devices implement, specific security safeguards to protect authenticators; and
  18. \n
  19. Changing authenticators for group/role accounts when membership to those accounts changes.
  20. \nIA-5 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Authenticators must be compliant with NIST SP 800-63-3 Digital Identity Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3.\n
\n\n|IA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(g):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n|Part h|\n|Part i|\n|Part j|\n\n#"} {"question": "IA-5 (1) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for password-based authentication:\n
    \n
  1. Enforces minimum password complexity of [Assignment: organization-defined requirements for case sensitivity, number of characters, mix of upper-case letters, lower-case letters, numbers, and special characters, including minimum requirements for each type];
  2. \n
  3. Enforces at least the following number of changed characters when new passwords are created: [FedRAMP Assignment: at least one (1)];
  4. \n
  5. Stores and transmits only cryptographically-protected passwords;
  6. \n
  7. Enforces password minimum and maximum lifetime restrictions of [Assignment: organization- defined numbers for lifetime minimum, lifetime maximum];
  8. \n
  9. Prohibits password reuse for [FedRAMP Assignment: twenty-four (24)] generations; and
  10. \n
  11. Allows the use of a temporary password for system logons with an immediate change to a permanent password.
  12. \nIA-5 (1) a and d Additional FedRAMP Requirements and Guidance:
    \nGuidance: If password policies are compliant with NIST SP 800-63B Memorized Secret (Section 5.1.1) Guidance, the control may be considered compliant.\n
\n\n|IA-5 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(1)(a):\n|Parameter IA-5(1)(b):\n|Parameter IA-5(1)(d):\n|Parameter IA-5(1)(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n\n#"} {"question": "IA-5 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for PKI-based authentication:\n
    \n
  1. Validates certifications by constructing and verifying a certification path to an accepted trust anchor including checking certificate status information;
  2. \n
  3. Enforces authorized access to the corresponding private key;
  4. \n
  5. Maps the authenticated identity to the account of the individual or group; and
  6. \n
  7. Implements a local cache of revocation data to support path discovery and validation in case of inability to access revocation information via the network.
  8. \n
\n\n|IA-5 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (2) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "IA-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that the registration process to receive [FedRAMP Assignment: All hardware/biometric (multifactor authenticators] be conducted [FedRAMP Selection: in person] before [Assignment: organization-defined registration authority] with authorization by [Assignment: organization-defined personnel or roles].\n\n|IA-5 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(3)-1:\n|Parameter IA-5(3)-2:\n|Parameter IA-5(3)-3:\n|Parameter IA-5(3)-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated tools to determine if password authenticators are sufficiently strong to satisfy [Assignment: organization-defined requirements].\nIA-5 (4) Additional FedRAMP Requirements and Guidance:
\nGuidance: If automated mechanisms which enforce password authenticator strength at creation are not used, automated mechanisms must be used to audit strength of created password authenticators.\n\n|IA-5 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (6) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects authenticators commensurate with the security category of the information to which use of the authenticator permits access.\n\n|IA-5 (6)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (6) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization ensures that unencrypted static authenticators are not embedded in applications or access scripts or stored on function keys.\n\n|IA-5 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-5 (11) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, for hardware token-based authentication, employs mechanisms that satisfy [Assignment: organization-defined token quality requirements].\n\n|IA-5 (11)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-5(11):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-5 (11) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-6 Authenticator Feedback (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.\n\n|IA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-7 Cryptographic Module Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements mechanisms for authentication to a cryptographic module that meet the requirements of applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance for such authentication.\n\n|IA-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 Identification and Authentication (Non-Organizational Users) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system uniquely identifies and authenticates non-organizational users (or processes acting on behalf of non-organizational users).\n\n|IA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (1) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts and electronically verifies Personal Identity Verification (PIV) credentials from other federal agencies.\n\n|IA-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (2) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system accepts only FICAM-approved third-party credentials.\n\n|IA-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (3) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs only FICAM-approved information system components in [Assignment: organization-defined information systems] to accept third-party credentials.\n\n|IA-8 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IA-8(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IA-8 (4) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system conforms to FICAM-issued profiles.\n\n|IA-8 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IA-8 (4) What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: Incident Response (IR)\n---"} {"question": "Incident Response (IR)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "IR-1 Incident Response Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Incident response policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Incident response procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|IR-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-1(a):\n|Parameter IR-1(b)(1):\n|Parameter IR-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|IR-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "IR-2 Incident Response Training (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides incident response training to information system users consistent with assigned roles and responsibilities in accordance with NIST SP 800-53 Rev 4:\n
    \n
  1. Within [Assignment: organization-defined time period] of assuming an incident response role or responsibility;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|IR-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-2(a):\n|Parameter IR-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "IR-3 Incident Response Testing (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests the incident response capability for the information system [FedRAMP Assignment: at least annually] using [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance] to determine the incident response effectiveness and documents the results.
\nIR-3 Additional FedRAMP Requirements and Guidance:
\nRequirements: The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). For JAB authorization, the service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to the test commencing.\n\n|IR-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-3-1:\n|Parameter IR-3-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates incident response testing with organizational elements responsible for related plans.\n\n|IR-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-4 Incident Handling (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;
  2. \n
  3. Coordinates incident handling activities with contingency planning activities; and
  4. \n
  5. Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises, and implements the resulting changes accordingly.
  6. \nIR-4 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.\n
\n\n|IR-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "IR-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the incident handling process. \n\n|IR-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-5 Incident Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tracks and documents information system security incidents.\n\n#"} {"question": "IR-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the incident handling process. \n\n|IR-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-6 Incident Reporting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Requires personnel to report suspected security incidents to the organizational incident response capability within [FedRAMP Assignment: US-CERT incident reporting timelines as specified in NIST SP800-61 (as amended)]; and
  2. \n
  3. Reports security incident information to [Assignment: organization-defined authorities].
  4. \nIR-6 Additional FedRAMP Requirements and Guidance
    \nRequirement: Report security incident information according to FedRAMP Incident Communications Procedure.\n
\n\n|IR-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-6(a):\n|Parameter IR-6(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "IR-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to assist in the reporting of security incidents.\n\n|IR-6 (1) |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 Incident Response Assistance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents.\n\n|IR-7 |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to increase the availability of incident response related information and support.\n\n|IR-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
  2. \n
  3. Identifies organizational incident response team members to the external providers.
  4. \n
\n\n|IR-7 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 (2) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "IR-8 Incident Response Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops an incident response plan that:
  2. \n
      \n
    1. Provides the organization with a roadmap for implementing its incident response capability;
    2. \n
    3. Describes the structure and organization of the incident response capability;
    4. \n
    5. Provides a high-level approach for how the incident response capability fits into the overall organization;
    6. \n
    7. Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;
    8. \n
    9. Defines reportable incidents;
    10. \n
    11. Provides metrics for measuring the incident response capability within the organization;
    12. \n
    13. Defines the resources and management support needed to effectively maintain and mature an incident response capability; and
    14. \n
    15. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
    16. \n
    \n
  3. Distributes copies of the incident response plan to [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance].
  4. \nIR-8(b) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.\n
  5. Reviews the incident response plan [FedRAMP Assignment: at least annually];
  6. \n
  7. Updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing;
  8. \n
  9. Communicates incident response plan changes to [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance]; and
  10. \nIR-8(e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.\n
  11. Protects the incident response plan from unauthorized disclosure and modification.
  12. \n
\n\n|IR-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-8(a)(8):\n|Parameter IR-8(b):\n|Parameter IR-8(c):\n|Parameter IR-8(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "IR-9 Information Spillage Response (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization responds to information spills by:\n
    \n
  1. Identifying the specific information involved in the information system contamination;
  2. \n
  3. Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill;
  4. \n
  5. Isolating the contaminated information system or system component;
  6. \n
  7. Eradicating the information from the contaminated information system or component;
  8. \n
  9. Identifying other information systems or system components that may have been subsequently contaminated; and
  10. \n
  11. Performing other [Assignment: organization-defined actions].
  12. \n
\n\n\n|IR-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(b):\n|Parameter IR-9(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "IR-9 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization assigns [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills.\n\n|IR-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides information spillage response training [Assignment: organization- defined frequency].\n\n|IR-9 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined procedures] to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.\n\n|IR-9 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Assignment: organization-defined security safeguards] for personnel exposed to information not within assigned access authorizations.\n\n|IR-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (4) What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: Maintenance (MA)\n---"} {"question": "Maintenance (MA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "MA-1 System Maintenance Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system maintenance policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system maintenance policy and associated system maintenance controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System maintenance policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System maintenance procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|MA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-1(a):\n|Parameter MA-1(b)(1):\n|Parameter MA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|MA-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MA-2 Controlled Maintenance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Schedules, performs, documents, and reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications and/or organizational requirements;
  2. \n
  3. Approves and monitors all maintenance activities, whether performed on site or remotely and whether the equipment is serviced on site or removed to another location;
  4. \n
  5. Requires that [Assignment: organization-defined personnel or roles] explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
  6. \n
  7. Sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
  8. \n
  9. Checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions; and
  10. \n
  11. Includes [Assignment: organization-defined maintenance-related information] in organizational maintenance records.
  12. \n
\n\n|MA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-2(c):\n|Parameter MA-2(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "MA-3 Maintenance Tools (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization approves, controls, and monitors information system maintenance tools.\n\n|MA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization inspects the maintenance tools carried into a facility by maintenance personnel for improper or unauthorized modifications.\n\n|MA-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization checks media containing diagnostic and test programs for malicious code before the media are used in the information system.\n\n|MA-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prevents the unauthorized removal of maintenance equipment containing organizational information by:\n
    \n
  1. Verifying that there is no organizational information contained on the equipment;
  2. \n
  3. Sanitizing or destroying the equipment;
  4. \n
  5. Retaining the equipment within the facility; or
  6. \n
  7. Obtaining an exemption from [FedRAMP Assignment: the information owner explicitly authorizes removal of the equipment from the facility].
  8. \n
\n\n|MA-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-3(3)(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-3 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "MA-4 Remote Maintenance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Approves and monitors nonlocal maintenance and diagnostic activities;
  2. \n
  3. Allows the use of nonlocal maintenance and diagnostic tools only as consistent with organizational policy and documented in the security plan for the information system;
  4. \n
  5. Employs strong authenticators in the establishment of nonlocal maintenance and diagnostic sessions;
  6. \n
  7. Maintains records for nonlocal maintenance and diagnostic activities; and
  8. \n
  9. Terminates session and network connections when nonlocal maintenance is completed.
  10. \n
\n\n|MA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "MA-4 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization documents in the security plan for the information system, the policies and procedures for the establishment and use of nonlocal maintenance and diagnostic connections.\n\n|MA-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MA-5 Maintenance Personnel (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes a process for maintenance personnel authorization and maintains a list of authorized maintenance organizations or personnel;
  2. \n
  3. Ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
  4. \n
  5. Designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
  6. \n
\n\n|MA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "MA-5 (1) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements procedures for the use of maintenance personnel that lack appropriate security clearances or are not U.S. citizens, that include the following requirements:
  2. \n
      \n
    1. Maintenance personnel who do not have needed access authorizations, clearances, or formal access approvals are escorted and supervised during the performance of maintenance and diagnostic activities on the information system by approved organizational personnel who are fully cleared, have appropriate access authorizations, and are technically qualified;
    2. \n
    3. Prior to initiating maintenance or diagnostic activities by personnel who do not have needed access authorizations, clearances or formal access approvals, all volatile information storage components within the information system are sanitized and all nonvolatile storage media are removed or physically disconnected from the system and secured; and
    4. \n
    \n
  3. Develops and implements alternate security safeguards in the event an information system component cannot be sanitized, removed, or disconnected from the system.
  4. \nMA-5 (1) Additional FedRAMP Requirements and Guidance:
    \nRequirement: Only MA-5 (1) (a) (1) is required by FedRAMP\n
\n\n|MA-5 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-5 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MA-6 Timely Maintenance (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization obtains maintenance support and/or spare parts for [Assignment: organization-defined information system components] within [Assignment: organization-defined time period] of failure.\n\n|MA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MA-6(1):\n|Parameter MA-6(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MA-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n---\ntitle: Media Protection (MP)\n---"} {"question": "Media Protection (MP)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "MP-1 Media Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Media protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Media protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|MP-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-1(a):\n|Parameter MP-1(b)(1):\n|Parameter MP-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|MP-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "MP-2 Media Access (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organization-defined personnel or roles].\n\n|MP-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-2-1:\n|Parameter MP-2-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-3 Media Labeling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and
  2. \n
  3. Exempts [FedRAMP Assignment: no removable media types] from marking as long as the media remain within [Assignment: organization-defined controlled areas].
  4. \nMP-3(b) Additional FedRAMP Requirements and Guidance:
    \nGuidance: Second parameter in MP-3(b)-2 is not applicable.\n
\n\n|MP-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-3(b)-1:\n|Parameter MP-3(b)-2:| Not applicable\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-4 Media Storage (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Physically controls and securely stores [FedRAMP Assignment: [all types of digital and non-digital media with sensitive information]] within [FedRAMP Assignment: see additional FedRAMP requirements and guidance]; and
  2. \nMP-4a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines controlled areas within facilities where the information and information system reside.\n
  3. Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.
  4. \n
\n\n|MP-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-4(a)-1:\n|Parameter MP-4(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-5 Media Transport (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Protects and controls [FedRAMP Assignment: all media with sensitive information] during transport outside of controlled areas using [FedRAMP Assignment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digital media, secured in locked container];
  2. \nMP-5a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.\n
  3. Maintains accountability for information system media during transport outside of controlled areas;
  4. \n
  5. Documents activities associated with the transport of information system media; and
  6. \n
  7. Restricts the activities associated with transport of information system media to authorized personnel.
  8. \n
\n\n|MP-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-5(a)-1:\n|Parameter MP-5(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "MP-5 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.\n\n|MP-5 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-5 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-6 Media Sanitization and Disposal (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and
  2. \n
  3. Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.
  4. \n
\n\n|MP-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-6(a)-1:\n|Parameter MP-6(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "MP-6 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests sanitization equipment and procedures [FedRAMP Assignment: at least annually] to verify that the intended sanitization is being achieved.\nMP-6 (2) Additional FedRAMP Requirements and Guidance:
\nGuidance: Equipment and procedures may be tested or evaluated for effectiveness.\n\n|MP-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-6(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-7 Media Use (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization [Selection: restricts; prohibits] the use of [Assignment: organization-defined types of information system media] on [Assignment: organization-defined information systems or system components] using [Assignment: organization-defined security safeguards].\n\n|MP-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter MP-7-1:\n|Parameter MP-7-2:\n|Parameter MP-7-3:\n|Parameter MP-7-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "MP-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.\n\n|MP-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|MP-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: Physical and Environmental Protection (PE)\n---"} {"question": "Physical and Environmental Protection (PE)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PE-1 Physical and Environmental Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Physical and environmental protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Physical and environmental protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PE-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-1(a):\n|Parameter PE-1(b)(1):\n|Parameter PE-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PE-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "PE-2 Physical Access Authorizations (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;
  2. \n
  3. Issues authorization credentials for facility access;
  4. \n
  5. Reviews the access list detailing authorized facility access by individuals [FedRAMP Assignment: at least annually]; and
  6. \n
  7. Removes individuals from the facility access list when access is no longer required.
  8. \n
\n\n|PE-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PE-3 Physical Access Control (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Enforces physical access authorizations at [Assignment: organization-defined entry/exit points to the facility where the information system resides] by:
  2. \n
      \n
    1. Verifying individual access authorizations before granting access to the facility; and
    2. \n
    3. Controlling ingress/egress to the facility using [FedRAMP Assignment: CSP defined physical access control systems/devices AND guards];
    4. \n
    \n
  3. Maintains physical access audit logs for [Assignment: organization-defined entry/exit points];
  4. \n
  5. Provides [Assignment: organization-defined security safeguards] to control access to areas within the facility officially designated as publicly accessible;
  6. \n
  7. Escorts visitors and monitors visitor activity [FedRAMP Assignment: in all circumstances within restricted access area where the information system resides];
  8. \n
  9. Secures keys, combinations, and other physical access devices;
  10. \n
  11. Inventories [Assignment: organization-defined physical access devices] every [FedRAMP Assignment: at least annually]; and
  12. \n
  13. Changes combinations and keys [FedRAMP Assignment: at least annually] and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.
  14. \n
\n\n|PE-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-3(a):\n|Parameter PE-3(a)(2):\n|Parameter PE-3(b):\n|Parameter PE-3(c):\n|Parameter PE-3(d):\n|Parameter PE-3(f)-1:\n|Parameter PE-3(f)-2:\n|Parameter PE-3(g):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n\n#"} {"question": "PE-4 Access Control for Transmission Medium (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization controls physical access to [Assignment: organization-defined information system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security safeguards].\n\n|PE-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-4-1:\n|Parameter PE-4-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-5 Access Control for Output Devices (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.\n\n|PE-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-6 Monitoring Physical Access (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;
  2. \n
  3. Reviews physical access logs [FedRAMP Assignment: at least monthly] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and
  4. \n
  5. Coordinates results of reviews and investigations with the organization\u2019s incident response capability.
  6. \n
\n\n|PE-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-6(b)-1:\n|Parameter PE-6(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PE-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization monitors physical intrusion alarms and surveillance equipment.\n\n|PE-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-8 Visitor Access Records (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Maintains visitor access records to the facility where the information system resides for [FedRAMP Assignment: for a minimum of one (1) year]; and
  2. \n
  3. Reviews visitor access records [FedRAMP Assignment: at least monthly]
  4. \n
\n\n|PE-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-8(a):\n|Parameter PE-8(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PE-9 Power Equipment and Cabling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects power equipment and power cabling for the information system from damage and destruction.\n\n|PE-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-9 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-10 Emergency Shutoff (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Provides the capability of shutting off power to the information system or individual system components in emergency situations;
  2. \n
  3. Places emergency shutoff switches or devices in [Assignment: organization-defined location by information system or system component] to facilitate safe and easy access for personnel; and
  4. \n
  5. Protects emergency power shutoff capability from unauthorized activation.
  6. \n
\n\n|PE-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-10(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-10 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PE-11 Emergency Power (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides a short-term uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the information system; transition of the information system to long-term alternate power] in the event of a primary power source loss. \n\n|PE-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-11:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-11 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-12 Emergency Lighting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.\n\n|PE-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 Fire Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.\n\n|PE-13|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].\n\n|PE-13 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-13(2)-1:\n|Parameter PE-13(2)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-13 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.\n\n|PE-13 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-13 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-14 Temperature and Humidity Controls (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Maintains temperature and humidity levels within the facility where the information system resides at [FedRAMP Assignment: consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled \"Thermal Guidelines for Data Processing Environments]; and
  2. \nPE-14 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider measures temperature at server inlets and humidity levels by dew point.\n
  3. Monitors temperature and humidity levels [FedRAMP Assignment: continuously].
  4. \n
\n\n|PE-14|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-14(a):\n|Parameter PE-14(b):\n|Parameter PE-14(b) Additional:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-14 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PE-14 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.\n\n|PE-14 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-14 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-15 Water Damage Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.\n\n|PE-15|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-15 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-16 Delivery and Removal (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization authorizes, monitors, and controls [FedRAMP Assignment: all information system components] entering and exiting the facility and maintains records of those items.\n\n|PE-16|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-16:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-16 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PE-17 Alternate Work Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs [Assignment: organization-defined security controls] at alternate work sites;
  2. \n
  3. Assesses as feasible, the effectiveness of security controls at alternate work sites; and
  4. \n
  5. Provides a means for employees to communicate with information security personnel in case of security incidents or problems.
  6. \n
\n\n|PE-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PE-17(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PE-17 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n---\ntitle: Planning (PL)\n---"} {"question": "Planning (PL)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PL-1 Security Planning Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security planning policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Security planning procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PL-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-1(a):\n|Parameter PL-1(b)(1):\n|Parameter PL-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PL-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "PL-2 System Security Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a security plan for the information system that:
  2. \n
      \n
    1. Is consistent with the organization\u2019s enterprise architecture;
    2. \n
    3. Explicitly defines the authorization boundary for the system;
    4. \n
    5. Describes the operational context of the information system in terms of missions and business processes;
    6. \n
    7. Provides the security categorization of the information system including supporting rationale;
    8. \n
    9. Describes the operational environment for the information system and relationships with or connections to other information;
    10. \n
    11. Provides an overview of the security requirements for the system;
    12. \n
    13. Identifies any relevant overlays, if applicable;
    14. \n
    15. Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and
    16. \n
    17. Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;
    18. \n
    \n
  3. Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles];
  4. \n
  5. Reviews the security plan for the information system [FedRAMP Assignment: at least annually];
  6. \n
  7. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and
  8. \n
  9. Protects the security plan from unauthorized disclosure and modification.
  10. \n
\n\n\n|PL-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-2(b):\n|Parameter PL-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n\n#"} {"question": "PL-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization plans and coordinates security-related activities affecting the information system with [Assignment: organization-defined individuals or groups] before conducting such activities in order to reduce the impact on other organizational entities.\n\n|PL-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PL-4 Rules of Behavior (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;
  2. \n
  3. Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;
  4. \n
  5. Reviews and updates the rules of behavior [FedRAMP Assignment: at least every three (3) years]; and
  6. \n
  7. Requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
  8. \n
\n\n|PL-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-4(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PL-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites.\n\n|PL-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PL-8 Information Security Architecture (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops an information security architecture for the information system that:
  2. \n
      \n
    1. Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;
    2. \n
    3. Describes how the information security architecture is integrated into and supports the enterprise architecture; and
    4. \n
    5. Describes any information security assumptions about, and dependencies on, external services;
    6. \n
    \n
  3. Reviews and updates the information security architecture [FedRAMP Assignment: at least annually or when a significant change occurs] to reflect updates in the enterprise architecture; and
  4. \nPL-8 (b) Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, on Page F-8.\n
  5. Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements/acquisitions.
  6. \n
\n\n|PL-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n---\ntitle: POAM Template\n---\n\n# Plan of Action and Milestones\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n|CSP|System Name|Impact Level|POAM Date|\n|--|--|--|--|\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n|Text|Text|Low/Moderate/High|Date|\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\n\n|POAM ID|Controls|Weakness Name|Weakness Descriptio|Weakness Detector Source|Weakness Source Identifier|Asset Identifier|Point of Contac|Resources Required|Overall Remediation Plan|Original Detection Date|Scheduled Completion Date|Planned Milestones|Milestone Changes|Status Date|Vendor Dependence|Last Vendor Check-in Date|Vendor Dependent Product Name|Original Risk Rating|Adjusted Risk Rating|Risk Adjustment|False Positive|Operational Requirement|Deviation Rationale|Supporting Documents|Comments|Auto-Approve|\n|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|\nV-1Example|AC-1|Open port on Example Firewall|Unprovisioned port left open on example firewall|Nessus|\t12345|172.246.15.3 (80/TCP) http://vuln.gov/queries 172.246.16.17 (80/tcp)|John Doe - Example CSP||\tImplement a technical solution to the problem.|5/5/2014|8/3/2014|(1) 2014/05/23: Milestone Description
(2) 2014-06-12: Milestone Description|(2) Update 2014-06-18 : That milestone was delayed due to a Vendor Dependency
(3) New 2014-06-13 : This is the details of this new milestone|8/5/2014|\tYes|8/5/2014|Example Firewall|High|Moderate|Yes|No|Pending|Risk Adjustment: The example firewall scanned is just preliminary
Operational Requirement: The port is needed for service example.|Remediation Evidence : filename.doc
Deviation Request : DR-123-Example-1.doc|none|no|\n---\ntitle: Personnel Security (PS)\n---"} {"question": "Personnel Security (PS)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PS-1 Personnel Security Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Personnel security policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Personnel security procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PS-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-1(a):\n|Parameter PS-1(b)(1):\n|Parameter PS-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PS-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PS-2 Position Categorization (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Assigns a risk designation to all positions;
  2. \n
  3. Establishes screening criteria for individuals filling those positions; and
  4. \n
  5. Reviews and revises position risk designations [FedRAMP Assignment: at least every three (3) years].
  6. \n
\n\n|PS-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-2 What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PS-3 Personnel Screening (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Screens individuals prior to authorizing access to the information system; and
  2. \n
  3. Rescreens individuals according to [FedRAMP Assignment: For national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions].
  4. \n
\n\n|PS-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-3(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "PS-3 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection:\n
    \n
  1. Have valid access authorizations that are demonstrated by assigned official government duties; and
  2. \n
  3. Satisfy [FedRAMP Assignment: personnel screening criteria \u2013 as required by specific information].
  4. \n
\n\n|PS-3 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-3 (3)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-3 (3) What is the solution and how is it implemented?|\n|---\n|Part a\n|Part b\n\n#"} {"question": "PS-4 Personnel Termination (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization, upon termination of individual employment:\n
    \n
  1. Disables information system access within [FedRAMP Assignment: same day];
  2. \n
  3. Terminates/revokes any authenticators/credentials associated with the individual;
  4. \n
  5. Conducts exit interviews that include a discussion of [Assignment: organization-defined information security topics];
  6. \n
  7. Retrieves all security-related organizational information system-related property;
  8. \n
  9. Retains access to organizational information and information systems formerly controlled by terminated individual; and
  10. \n
  11. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].
  12. \n
\n\n|PS-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-4(a):\n|Parameter PS-4(c):\n|Parameter PS-4(f)-1:\n|Parameter PS-4(f)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "PS-5 Personnel Transfer (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization;
  2. \n
  3. Initiates [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];
  4. \n
  5. Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and
  6. \n
  7. Notifies [Assignment: organization-defined personnel or roles] within [FedRAMP Assignment: within five days of the formal transfer action (DoD 24 hours)].
  8. \n
\n\n|PS-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-5(b)-1:\n|Parameter PS-5(b)-2:\n|Parameter PS-5(d)-1:\n|Parameter PS-5(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PS-6 Access Agreements (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops and documents access agreements for organizational information systems;
  2. \n
  3. Reviews and updates the access agreements [FedRAMP Assignment: at least annually]; and
  4. \n
  5. Ensures that individuals requiring access to organizational information and information systems:
  6. \n
      \n
    1. Sign appropriate access agreements prior to being granted access; and
    2. \n
    3. Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PS-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-6(b):\n|Parameter PS-6(c)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "PS-7 Third-Party Personnel Security (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes personnel security requirements including security roles and responsibilities for third-party providers;
  2. \n
  3. Requires third-party providers to comply with personnel security policies and procedures established by the organization;
  4. \n
  5. Documents personnel security requirements;
  6. \n
  7. Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [FedRAMP Assignment: same day]; and
  8. \n
  9. Monitors provider compliance.
  10. \n
\n\n|PS-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-7(d)-1:\n|Parameter PS-7(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "PS-8 Personnel Sanctions (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs a formal sanctions process for personnel failing to comply with established information security policies and procedures; and
  2. \n
  3. Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.
  4. \n
\n\n|PS-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PS-8(b)-1:\n|Parameter PS-8(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PS-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n---\ntitle: Risk Assessment (RA)\n---"} {"question": "Risk Assessment (RA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "RA-1 Risk Assessment Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Risk assessment policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Risk assessment procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|RA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-1(a):\n|Parameter RA-1(b)(1):\n|Parameter RA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|RA-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "RA-2 Security Categorization (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Categorizes information and the information system in accordance with applicable Federal Laws, Executive Orders, directives, policies, regulations, standards, and guidance;
  2. \n
  3. Documents the security categorization results (including supporting rationale) in the security plan for the information system; and
  4. \n
  5. Ensures the security categorization decision is reviewed and approved by the AO or authorizing official designated representative.
  6. \n
\n\n|RA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "RA-3 Risk Assessment (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;
  2. \n
  3. Documents risk assessment results in [Selection: security plan; risk assessment report; [FedRAMP Assignment: security assessment report]];
  4. \n
  5. Reviews risk assessment results [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs];
  6. \n
  7. Disseminates risk assessment results to [Assignment: organization-defined personnel or roles]; and
  8. \n
  9. Updates the risk assessment [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.
  10. \nRA-3 Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F\nRA-3 (d) Requirement: Include all Authorizing Officials; for JAB authorizations to include FedRAMP.\n
\n\n|RA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-3(b):\n|Parameter RA-3(c):\n|Parameter RA-3(d):\n|Parameter RA-3(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "RA-5 Vulnerability Scanning (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Scans for vulnerabilities in the information system and hosted applications [FedRAMP Assignment: monthly operating system/infrastructure; monthly web applications and databases] and when new vulnerabilities potentially affecting the system/applications are identified and reported;
  2. \nRA-5 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.\n
  3. Employs vulnerability scanning tools and techniques that promote interoperability among tools and automate parts of the vulnerability management process by using standards for:
  4. \n
      \n
    1. Enumerating platforms, software flaws, and improper configurations;
    2. \n
    3. Formatting and making transparent, checklists and test procedures; and
    4. \n
    5. Measuring vulnerability impact;
    6. \n
    \n
  5. Analyzes vulnerability scan reports and results from security control assessments
  6. \n
  7. Remediates legitimate vulnerabilities; [FedRAMP Assignment: high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery], in accordance with an organizational assessment of risk; and
  8. \n
  9. Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
  10. \nRA-5 (e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: To include all Authorizing Officials; for JAB authorizations to include FedRAMP.
    \nRA-5 Additional FedRAMP Requirements and Guidance\nGuidance: See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents Vulnerability Scanning Requirements
    \nhttps://www.FedRAMP.gov/documents/\n
\n\n|RA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(a):\n|Parameter RA-5(d):\n|Parameter RA-5(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "RA-5 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs vulnerability scanning tools that include the capability to readily update the list of information system vulnerabilities to be scanned.\n\n|RA-5 (1)|Control Summary Information|\n|---|---|\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization updates the information system vulnerabilities scanned [Selection (one or more): [FedRAMP Assignment: prior to a new scan]].\n\n|RA-5 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs vulnerability scanning procedures that can demonstrate the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).\n\n|RA-5 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes privileged access authorization to [FedRAMP Assignment: operating systems, databases, web applications] for selected [FedRAMP Assignment: all scans].\n\n|RA-5 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter RA-5(5)-1:\n|Parameter RA-5(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-5 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "RA-5 (6) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.\n\n|RA-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-6 What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "RA-5 (8) Control Enhancement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.\nRA-5 (8) Additional FedRAMP Requirements and Guidance:
\nRequirement: This enhancement is required for all high vulnerability scan findings.\nGuidance: While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.\n\n\n|RA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|RA-8 What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: System and Services Acquisition (SA)\n---"} {"question": "System and Services Acquisition (SA)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SA-1 System and Services Acquisition Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and services acquisition policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and services acquisition procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|SA-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-1(a):\n|Parameter SA-1(b)(1):\n|Parameter SA-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SA-2 Allocation of Resources (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Determines information security requirements for the information system or information system service in mission/business process planning;
  2. \n
  3. Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and
  4. \n
  5. Establishes a discrete line item for information security in organizational programming and budgeting documentation.
  6. \n
\n\n|SA-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SA-3 System Development Life Cycle (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations;
  2. \n
  3. Defines and documents information security roles and responsibilities throughout the system development life cycle;
  4. \n
  5. Identifies individuals having information security roles and responsibilities; and
  6. \n
  7. Integrates the organizational information security risk management process into system development life cycle activities.
  8. \n
\n\n|SA-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-3(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-3 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SA-4 Acquisitions Process (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs:\n
    \n
  1. Security functional requirements;
  2. \n
  3. Security strength requirements;
  4. \n
  5. Security assurance requirements;
  6. \n
  7. Security-related documentation requirements;
  8. \n
  9. Requirements for protecting security-related documentation;
  10. \n
  11. Description of the information system development environment and environment in which the system is intended to operate; and
  12. \n
  13. Acceptance criteria.

  14. \nAdditional FedRAMP Requirements and Guidance:
    \nGuidance: The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred. \nSee http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.\n
\n\n|SA-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n\n#"} {"question": "SA-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.\n\n|SA-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (2) Control Enhancement (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: [FedRAMP Selection (one or more): to include security-relevant external system interfaces, and high-level design]; [Assignment: organization-defined design/implementation information] at [Assignment: organization-defined level of detail].\n\n|SA-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-4-1:\n|Parameter SA-4-2:\n|Parameter SA-4-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains [FedRAMP Assignment: at least the minimum requirement as defined in control CA-7].
\nSA-4 (8) Additional FedRAMP Requirements and Guidance:
\nGuidance: CSP must use the same security standards regardless of where the system component or information system service is acquired.\n\n|SA-4 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-4(8):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.\n\n|SA-4 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-4 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.\n\n|SA-4 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-4 (10) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-5 Information System Documentation (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Obtains administrator documentation for the information system, system component, or information system service that describes:
  2. \n
      \n
    1. Secure configuration, installation, and operation of the system, component, or service;
    2. \n
    3. Effective use and maintenance of security functions/mechanisms; and
    4. \n
    5. Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;
    6. \n
    \n
  3. Obtains user documentation for the information system, system component, or information system service that describes:
  4. \n
      \n
    1. User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms;
    2. \n
    3. Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and
    4. \n
    5. User responsibilities in maintaining the security of the system, component, or service;
    6. \n
    \n
  5. Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and [Assignment: organization-defined actions] in response;
  6. \n
  7. Protects documentation as required, in accordance with the risk management strategy; and
  8. \n
  9. Distributes documentation to [Assignment: organization-defined personnel or roles)].
  10. \n
\n\n|SA-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-5(c):\n|Parameter SA-5(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SA-8 Security Engineering Principles (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.\n\n|SA-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-9 External Information System Services (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Requires that providers of external information system services comply with organizational information security requirements and employ [FedRAMP Assignment: FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;
  2. \n
  3. Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and
  4. \n
  5. Employs [FedRAMP Assignment: Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored] to monitor security control compliance by external service providers on an ongoing basis.

  6. \nAdditional FedRAMP Requirements and Guidance
    \nGuidance: See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Continuous Monitoring Strategy Guide\nhttps://www.FedRAMP.gov/documents
    \nGuidance:\u00a0Independent Assessors should assess the risk associated with the use of external services.\u00a0See the FedRAMP page under\u00a0Key Cloud Service Provider (CSP) Documents>FedRAMP Authorization Boundary Guidance\n
\n\n|SA-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(a):\n|Parameter SA-9(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SA-9 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services; and
  2. \n
  3. Ensures that the acquisition or outsourcing of dedicated information security services is approved by [Assignment: organization-defined personnel or roles].
  4. \n
\n\n|SA-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SA-9 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires providers of [FedRAMP Assignment: All external systems where Federal information is processed or stored] to identify the functions, ports, protocols, and other services required for the use of such services.\n\n|SA-9 (2) Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Assignment: organization-defined security safeguards] to ensure that the interests of [FedRAMP Assignment: All external systems where Federal information is processed or stored] are consistent with and reflect organizational interests.\n\n|SA-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(4)-1:\n|Parameter SA-9(4)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "SA-9 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts the location of [FedRAMP Selection: information processing, information data, AND information services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].
\nAdditional FedRAMP Requirements and Guidance
\nGuidance: System services refer to FTP, Telnet, and TFTP, etc.\n\n|SA-9 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-9(5)-1:\n|Parameter SA-9(5)-2:\n|Parameter SA-9(5)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-9 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-10 Developer Configuration Management (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to:\n
    \n
  1. Perform configuration management during system, component, or service [FedRAMP Selection: development, implementation, AND operation];
  2. \n
  3. Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];
  4. \n
  5. Implement only organization-approved changes to the system, component, or service;
  6. \n
  7. Document approved changes to the system, component, or service and the potential security impacts of such changes; and
  8. \n
  9. Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].
  10. \nSA-10 (e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: For JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.\n
\n\n|SA-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-10(a):\n|Parameter SA-10(b):\n|Parameter SA-10(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-10 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SA-10 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.\n\n|SA-10 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-10 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 Developer Security Testing and Evaluation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to:\n
    \n
  1. Create and implement a security assessment plan;
  2. \n
  3. Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation at [Assignment: organization-defined depth and coverage];
  4. \n
  5. Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation;
  6. \n
  7. Implement a verifiable flaw remediation process; and
  8. \n
  9. Correct flaws identified during security testing/evaluation.
  10. \n
\n\n|SA-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-11(b)-1:\n|Parameter SA-11(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part e|\n|Part d|\n\n#"} {"question": "SA-11 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws and document the results of the analysis.
\nSA-11 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.\n\n|SA-11 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SA-11(b)-1:\n|Parameter SA-11(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.\n\n|SA-11 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SA-11 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.\n\n|SA-11 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SA-11 (8) What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: System and Communications Protection (SC)\n---"} {"question": "System and Communications Protection (SC)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SC-1 System and Communications Protection Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and communications protection policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and communications protection procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|SC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-1(a):\n|Parameter SC-1(b)(1):\n|Parameter SC-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|SC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SC-2 Application Partitioning (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system separates user functionality (including user interface services) from information system management functionality.\n\n|SC-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-4 Information in Shared Resources (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents unauthorized and unintended information transfer via shared system resources.\n\n|SC-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-5 Denial of Service Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or reference to source for such information] by employing [Assignment: organization-defined security safeguards].\n\n|SC-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-5-1:\n|Parameter SC-5-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-6 Resource Availability (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].\n\n|SC-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-6-1:\n|Parameter SC-6-2:\n|Parameter SC-6-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 Boundary Protection (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; and
  2. \n
  3. Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and
  4. \n
  5. Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with organizational security architecture.
  6. \n
\n\n|SC-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "SC-7 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization limits the number external network connections to the information system.\n\n|SC-7 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n\n#"} {"question": "SC-7 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements a managed interface for each external telecommunication service;
  2. \n
  3. Establishes a traffic flow policy for each managed interface;
  4. \n
  5. Protects the confidentiality and integrity of the information being transmitted across each interface;
  6. \n
  7. Documents each exception to the traffic flow policy with a supporting mission/business need and duration of that need; and
  8. \n
  9. Reviews exceptions to the traffic flow policy [FedRAMP Assignment: at least at least annually] and removes exceptions that are no longer supported by an explicit mission/business need.
  10. \n
\n\n|SC-7 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(4)(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (4) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n\n#"} {"question": "SC-7 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system at managed interfaces denies network traffic by default and allows network communications traffic by exception (i.e., deny all, permit by exception).\n\n|SC-7 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (5) What is the solution and how is it implemented?|\n|---|\n|Part a\n\n#"} {"question": "SC-7 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system, in conjunction with a remote device, prevents the device from simultaneously establishing non-remote connections with the system and communicating via some other connection to resources in external networks.\n\n|SC-7 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system routes [Assignment: organization-defined internal communications traffic] to [Assignment: organization-defined external networks] through authenticated proxy servers at managed interfaces.\n\n|SC-7 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(8)-1:\n|Parameter SC-7(8)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (12) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined host-based boundary protection mechanisms] at [Assignment: organization-defined information system components].\n\n|SC-7 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(12)-1:\n|Parameter SC-7(12)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (12) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (13) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization isolates [FedRAMP Assignment: See SC-7 (13) additional FedRAMP Requirements and Guidance] from other internal information system components by implementing physically separate subnetworks with managed interfaces to other components of the system.
\nSC-7 (13) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines key information security tools, mechanisms, and support components associated with system and security administration and isolates those tools, mechanisms, and support components from other internal information system components via physically or logically separate subnets. \n\n|SC-7 (13)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-7(13):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (13) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-7 (18) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system fails securely in the event of an operational failure of a boundary protection device.\n\n|SC-7 (18)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-7 (18) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-8 Transmission confidentiality and Integrity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the [FedRAMP Assignment: confidentiality AND integrity] of transmitted information.\n\n|SC-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-8 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to [FedRAMP Assignment: prevent unauthorized disclosure of information AND detect changes to information] during transmission unless otherwise protected by [FedRAMP Assignment: a hardened or alarmed carrier Protective Distribution System (PDS)].\n\n|SC-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-8 (1)-1:\n|Parameter SC-8 (1)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-10 Network Disconnect (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system terminates the network connection associated with a communications session at the end of the session or after [FedRAMP Assignment: no longer than thirty (30) minutes for RAS-based sessions and no longer than sixty (60) minutes for non-interactive user sessions] of inactivity.\n\n|SC-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 Cryptographic Key Establishment & Management (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with [Assignment: organization-defined requirements for key generation, distribution, storage, access, and destruction].
\nSC-12 Additional FedRAMP Requirements and Guidance:
\nGuidance: Federally approved and validated cryptography.\n\n|SC-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization produces, controls, and distributes symmetric cryptographic keys using [FedRAMP Selection: NIST FIPS-compliant] key management technology and processes.\n\n|SC-12 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-12 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization produces, controls, and distributes asymmetric cryptographic keys using [Selection: NSA-approved key management technology and processes; approved PKI Class 3 certificates or prepositioned keying material; approved PKI Class 3 or Class 4 certificates and hardware security tokens that protect the user\u2019s private key].\n\n|SC-12 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-12 (3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-12 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-13 Use of Cryptography (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements [FedRAMP Assignment: FIPS-validated or NSA-approved cryptography] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.\n\n|SC-13|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-13:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-13 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-15 Collaborative Computing Devices (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Prohibits remote activation of collaborative computing devices with the following exceptions:[FedRAMP Assignment: no exceptions]; and
  2. \n
  3. Provides an explicit indication of use to users physically present at the devices.
  4. \nSC-15 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.\n
\n\n|SC-15|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-15(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-15 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\nSC-15 Additional FedRAMP Requirements and Guidance:
\nRequirement: The information system provides disablement (instead of physical disconnect) of collaborative computing devices in a manner that supports ease of use.\n\n|SC-15 req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-15(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-15 What is the solution and how is it implemented?|\n|---|\n|Req. 1|\n\n#"} {"question": "SC-17 Public Key Infrastructure Certificates (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization issues public key certificates under an [Assignment: organization-defined certificate policy] or obtains public key certificates from an approved service provider.\n\n|SC-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-17:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-17 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-18 Mobile Code (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Defines acceptable and unacceptable mobile code and mobile code technologies;
  2. \n
  3. Establishes usage restrictions and implementation guidance for acceptable mobile code and mobile code technologies; and
  4. \n
  5. Authorizes, monitors, and controls the use of mobile code within the information system.
  6. \n
\n\n|SC-18|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-18 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n##"} {"question": "SC-19 Voice Over Internet Protocol (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions and implementation guidance for Voice over Internet Protocol (VoIP) technologies based on the potential to cause damage to the information system if used maliciously; and
  2. \n
  3. Authorizes, monitors, and controls the use of VoIP within the information system.
  4. \n
\n\n|SC-19|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-19 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SC-20 Secure Name / Address Resolution Service (Authoritative Source) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Provides additional data origin authentication and integrity verification artifacts along with the authoritative name resolution data the system returns in response to external name/address resolution queries; and
  2. \n
  3. Provides the means to indicate the security status of child zones and (if the child supports secure resolution services) to enable verification of a chain of trust among parent and child domains, when operating as part of a distributed, hierarchical namespace.
  4. \n
\n\n|SC-20|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-20 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SC-21 Secure Name / Address Resolution Service (Recursive or Caching Resolver) (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system requests and performs data origin authentication and data integrity verification on the name/address resolution responses the system receives from authoritative sources.\n\n|SC-21|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-21|Control Summary Information|\n|---|---|\n|//date|\n\n|SC-21 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-22 Architecture and Provisioning for Name / Address Resolution Service (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information systems that collectively provide name/address resolution service for an organization are fault-tolerant and implement internal/external role separation.\n\n|SC-22|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\nSC-22 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-23 Session Authenticity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the authenticity of communications sessions.\n\n|SC-23|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-23 What is the solution and how is it implemented|\n|---|\n||\n\n#"} {"question": "SC-28 Protection of Information at Rest (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects the [FedRAMP Selection: confidentiality AND integrity]] of [Assignment: organization-defined information at rest].\nSC-28 Additional FedRAMP Requirements and Guidance:
\nGuidance: The organization supports the capability to use cryptographic mechanisms to protect information at rest.\n\n|SC-28|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-28-1:\n|Parameter SC-28-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-28 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-28 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to prevent unauthorized disclosure and modification of [Assignment: organization-defined information] on [Assignment: organization-defined information system components]\n\n|SC-28 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SC-28(1)-1:\n|Parameter SC-28(1)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-28 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SC-39 Process Isolation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system maintains a separate execution domain for each executing process.\n\n|SC-39|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SC-39 What is the solution and how is it implemented?|\n|---|\n||\n---\ntitle: System and Information Integrity (SI)\n---"} {"question": "System and Information Integrity (SI)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SI-1 System and Information Integrity Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and information integrity policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and information integrity procedures [FedRAMP Assignment: at least at least annually].
    4. \n
    \n
\n\n|SI-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-1(a):\n|Parameter SI-1(b)(1):\n|Parameter SI-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|SI-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-2 Flaw Remediation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies, reports, and corrects information system flaws;
  2. \n
  3. Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;
  4. \n
  5. Installs security-relevant software and firmware updates within [FedRAMP Assignment: thirty 30 days of release of updates] of the release of the updates; and
  6. \n
  7. Incorporates flaw remediation into the organizational configuration management process.
  8. \n
\n\n|SI-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms [FedRAMP Assignment: at least monthly] to determine the state of information system components with regard to flaw remediation.\n\n|SI-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Measures the time between flaw identification and flaw remediation; and
  2. \n
  3. Establishes [Assignment: organization-defined benchmarks] for taking corrective actions.
  4. \n
\n\n|SI-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2(3)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 (3) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-3 Malicious Code Protection (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;
  2. \n
  3. Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;
  4. \n
  5. Configures malicious code protection mechanisms to:
  6. \n
      \n
    1. Perform periodic scans of the information system [FedRAMP Assignment: at least weekly] and real-time scans of files from external sources at [FedRAMP Assignment: to include endpoints] as the files are downloaded, opened, or executed in accordance with organizational security policy; and
    2. \n
    3. [FedRAMP Assignment: to include alerting administrator or defined security personnel] in response to malicious code detection; and
    4. \n
    \n
  7. Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
  8. \n
\n\n|SI-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-3(c)(1)-1:\n|Parameter SI-3(c)(1)-2:\n|Parameter SI-3(c)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "1. SI-3 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization centrally manages malicious code protection mechanisms.\n\n|SI-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "SI-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically updates malicious code protection mechanisms.\n\n|SI-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-3 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements nonsignature-based malicious code detection mechanisms.\n\n|SI-3 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 Information System Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors the information system to detect:
  2. \n
      \n
    1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and
    2. \n
    3. Unauthorized local, network, and remote connections;
    4. \n
    \n
  3. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods];
  4. \n
  5. Deploys monitoring devices (i) strategically within the information system to collect organization-determined essential information; and (ii) at ad hoc locations within the system to track specific types of transactions of interest to the organization;
  6. \n
  7. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;
  8. \n
  9. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;
  10. \n
  11. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and
  12. \n
  13. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].
  14. \nSI-4 Additional FedRAMP Requirements and Guidance:\nGuidance: See US-CERT Incident Response Reporting Guidelines.\n
\n\n|SI-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(a)(1):\n|Parameter SI-4(b):\n|Parameter SI-4(g)-1:\n|Parameter SI-4(g)-2:\n|Parameter SI-4(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "SI-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.\n\n|SI-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(a)(1):\n|Parameter SI-4(b):\n|Parameter SI-4(g)-1:\n|Parameter SI-4(g)-2:\n|Parameter SI-4(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "1. SI-4 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated tools to support near real-time analysis of events.\n\n|SI-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system monitors inbound and outbound communications traffic [FedRAMP Assignment: continuously] for unusual or unauthorized activities or conditions.\n\n|SI-4 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "1. SI-4 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system alerts [Assignment: organization-defined personnel or roles] when the following indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
\nSI-4(5) Additional FedRAMP Requirements and Guidance:
\nGuidance: In accordance with the incident response plan.\n\n|SI-4 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(5)-1:\n|Parameter SI-4(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (14) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.\n\n|SI-4 (14)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (14) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (16) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization correlates information from monitoring tools employed throughout the information system.\n\n|SI-4 (16)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (16) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (23) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined host-based monitoring mechanisms] at [Assignment: organization-defined information system components].\n\n|SI-4 (23)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(23)-1:\n|Parameter SI-4(23)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (23) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-5 Security Alerts & Advisories (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Receives information system security alerts, advisories, and directives from [FedRAMP Assignment: to include US-CERT] on an ongoing basis;
  2. \n
  3. Generates internal security alerts, advisories, and directives as deemed necessary;
  4. \n
  5. Disseminates security alerts, advisories, and directives to [FedRAMP Assignment: to include system security personnel and administrators with configuration/patch-management responsibilities]; and
  6. \n
  7. Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
  8. \n
\n\n|SI-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-5(a):\n|Parameter SI-5(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-6 Security Functionality Verification (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Verifies the correct operation of [Assignment: organization-defined security functions];
  2. \n
  3. Performs this verification [FedRAMP Assignment: to include upon system startup and/or restart at least monthly];
  4. \n
  5. Notifies [FedRAMP Assignment: to include system administrators and security personnel] of failed security verification tests; and
  6. \n
  7. [Selection (one or more): shuts the information system down; restarts the information system; [FedRAMP Assignment: to include notification of system administrators and security personnel] when anomalies are discovered.
  8. \n
\n\n|SI-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-6(a):\n|Parameter SI-6(b):\n|Parameter SI-6(c):\n|Parameter SI-6(d)-1:\n|Parameter SI-6(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-7 Software & Information Integrity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].\n\n|SI-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system performs an integrity check of [Assignment: organization-defined software, firmware, and information] [FedRAMP Selection (one or more): at startup; at [FedRAMP Assignment: to include security-relevant events]; [FedRAMP Assignment: at least monthly]].\n\n|SI-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7(1)-1:\n|Parameter SI-7(1)-2:\n|Parameter SI-7(1)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-7 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization incorporates the detection of unauthorized [Assignment: organization-defined security-relevant changes to the information system] into the organizational incident response capability.\n\n|SI-7 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7 (7): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-8 Spam Protection (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
  2. \n
  3. Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policies and procedures.
  4. \n
\n\n|SI-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-8: \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SI-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization centrally manages spam protection mechanisms.\n\n|SI-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-8 (1): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-8 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization automatically updates spam protection mechanisms.\n\n|SI-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-10 Information Input Validation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system checks the validity of [Assignment: organization-defined information inputs].\n\n|SI-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-11 Error Handling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and
  2. \n
  3. Reveals error messages only to [Assignment: organization-defined personnel or roles].
  4. \n
\n\n|SI-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-11(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-12 Information Output Handling and Retention (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.\n\n|SI-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-16 Memory Protection (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements [Assignment: organization-defined fail-safe procedures] to protect its memory from unauthorized code execution.\n\n|SI-16|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-16-1:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-16 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Access Control (AC)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AC-1 Access Control Policy and Procedures Requirements (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An access control policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the access control policy and associated access controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Access control policy [FedRAMP Assignment: at least every 3 years]; and
    2. \n
    3. Access control procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|AC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-1(a):\n|Parameter AC-1(b)(1):\n|Parameter AC-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AC-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b1|\n|Part b2|\n\n#"} {"question": "AC-2 Account Management (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies and selects the following types of information system accounts to support organizational missions/business functions: [Assignment: organization-defined information system account types];
  2. \n
  3. Assigns account managers for information system accounts;
  4. \n
  5. Establishes conditions for group and role membership;
  6. \n
  7. Specifies authorized users of the information system, group and role membership, and access authorizations (i.e., privileges) and other attributes (as required) for each account;
  8. \n
  9. Requires approvals by [Assignment: organization-defined personnel or roles] for requests to create information system accounts;
  10. \n
  11. Creates, enables, modifies, disables, and removes information system accounts in accordance with [Assignment: organization-defined procedures or conditions];
  12. \n
  13. Monitors the use of information system accounts;
  14. \n
  15. Notifies account managers:
  16. \n
      \n
    1. When accounts are no longer required;
    2. \n
    3. When users are terminated or transferred; and
    4. \n
    5. When individual information system usage or need-to-know changes;
    6. \n
    \n
  17. Authorizes access to the information system based on:
  18. \n
      \n
    1. A valid access authorization;
    2. \n
    3. Intended system usage; and
    4. \n
    5. Other attributes as required by the organization or associated missions/business functions;
    6. \n
    \n
  19. Reviews accounts for compliance with account management requirements [FedRAMP Assignment: at least annually]; and
  20. \n
  21. Establishes a process for reissuing shared/group account credentials (if deployed) when individuals are removed from the group.
  22. \n
\n\n|AC-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(a):\n|Parameter AC-2(e):\n|Parameter AC-2(f):\n|Parameter AC-2(j):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n|Part g\n|Part h\n|Part i\n|Part j\n|Part k\n\n#"} {"question": "AC-2 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the management of information system accounts.\n\n|AC-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically [Selection: removes; disables] temporary and emergency accounts after [FedRAMP Assignment: no more than 30 days for temporary and emergency account types].\n\n|AC-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(2)1:\n|Parameter AC-2(2)2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (3) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically disables inactive accounts after [FedRAMP Assignment: ninety (90) days for user accounts].
\nAC-2 (3) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines the time period for non-user accounts (e.g., accounts associated with devices). The time periods are approved and accepted by the Joint Authorization Board (JAB)/AO. Where user management is a function of the service, reports of activity of consumer users shall be made available.\n\n|AC-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (4) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically audits account creation, modification, enabling, disabling, and removal actions, and notifies [Assignment: organization-defined personnel or roles].\n\n|AC-2 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that users log out when [Assignment: organization-defined time-period of expected inactivity or description of when to log out].
\nAC-2 (5) Additional FedRAMP Requirements and Guidance:
\nGuidance: Should use a shorter timeframe than AC-12\n\n|AC-2 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(5):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (7) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and administers privileged user accounts in accordance with a role-based access scheme that organizes allowed information system access and privileges into roles;
  2. \n
  3. Monitors privileged role assignments; and
  4. \n
  5. Takes [Assignment: organization-defined actions] when privileged role assignments are no longer appropriate.
  6. \n
\n\n|AC-2 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(7):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (7) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "AC-2 (9) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization only permits the use of shared/group accounts that meet [Assignment: organization-defined conditions for establishing shared/group accounts].
\nAC-2 (9) Additional FedRAMP Requirements and Guidance: Required if shared/group accounts are deployed.\n\n|AC-2 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(9):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system terminates shared/group account credentials when members leave the group.
\nAC-2 (10) Additional FedRAMP Requirements and Guidance:
\nRequired if shared/group accounts are deployed.\n\n|AC-2 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(10):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (10) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-2 (12) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors information system accounts for [Assignment: organization-defined atypical use]; and
  2. \n
  3. Reports atypical usage of information system accounts to [Assignment: organization-defined personnel or roles].
  4. \nAC-2 (12) (a) and AC-2 (12) (b) Additional FedRAMP Requirements and Guidance: Required for privileged accounts.\n
\n\n|AC-2 (12)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-2(12)(a):\n|Parameter AC-2(12)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-2 (12) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-3 Access Enforcement (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.\n\n|AC-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-3 What is the solution and how is it implemented?|\n|---|\n|Part a"} {"question": "AC-4 Information Flow Enforcement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces approved authorizations for controlling the flow of information within the system and between interconnected systems based on [Assignment: organization-defined information flow control policies].\n\n|AC-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-4\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-4 (21) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system separates information flows logically or physically using [Assignment: organization-defined mechanisms and/or techniques] to accomplish [Assignment: organization-defined required separations by types of information].\n\n|AC-4 (21)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-4(21)-1\n|Parameter AC-4(21)-2\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-4 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-5 Separation of Duties (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Separates [Assignment: organization-defined duties of individuals];
  2. \n
  3. Documents separation of duties of individuals; and
  4. \n
  5. Defines information system access authorizations to support separation of duties.
  6. \nAC-5 Additional FedRAMP Requirements and Guidance:
    \nGuidance: CSPs have the option to provide a separation of duties matrix as an attachment to the SSP. Directions for attaching the Separation of Duties Matrix document may be found in Section Error: Reference source not found Error: Reference source not found.\n
\n\n|AC-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-5(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c"} {"question": "AC-6 Least Privilege (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs the principle of least privilege, allowing only authorized accesses for users (or processes acting on behalf of users) which are necessary to accomplish assigned tasks in accordance with organizational missions and business functions.\n\n|AC-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization explicitly authorizes access to [Assignment: organization-defined security functions (deployed in hardware, software, and firmware) and security-relevant information].\n\n|AC-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(1)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization requires that users of information system accounts, or roles, with access to [FedRAMP Assignment: all security functions], use non-privileged accounts or roles, when accessing non-security functions.
\nAC-6 (2) Additional FedRAMP Requirements and Guidance:
\nExamples of security functions include but are not limited to: establishing system accounts, configuring access authorizations (i.e., permissions, privileges), setting events to be audited, and setting intrusion detection parameters, system programming, system and security administration, other privileged functions.\n\n|AC-6 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(2)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC 6 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization restricts privileged accounts on the information system to [Assignment: organization-defined personnel or roles].\n\n|AC-6 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-6(5)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system audits the execution of privileged functions.\n\n|AC-6 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (9) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-6 (10) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents non-privileged users from executing privileged functions to include disabling, circumventing, or altering implemented security safeguards/countermeasures.\n\n|AC-6 (10)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-6 (10) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-7 Unsuccessful Login Attempts (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Enforces a limit of [FedRAMP Assignment: not more than three (3)] consecutive invalid logon attempts by a user during a [FedRAMP Assignment: fifteen (15) minutes]; and
  2. \n
  3. Automatically [Selection: locks the account/node for a [FedRAMP Assignment: thirty (30) minutes]; delays next logon prompt according to [Assignment: organization-defined delay algorithm]] when the maximum number of unsuccessful attempts is exceeded.
  4. \n
\n\n|AC-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-7(a)-1:\n|Parameter AC-7(a)-2:\n|Parameter AC-7(b)-1:\n|Parameter AC-7(b)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-7 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-8 System Use Notification (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Displays to users [Assignment: organization-defined system use notification message or banner (FedRAMP Assignment: see additional Requirements and Guidance)] before granting access to the system that provides privacy and security notices consistent with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance and states that:
  2. \n
      \n
    1. Users are accessing a U.S. Government information system;
    2. \n
    3. Information system usage may be monitored, recorded, and subject to audit;
    4. \n
    5. Unauthorized use of the information system is prohibited and subject to criminal and civil penalties; and
    6. \n
    7. Use of the information system indicates consent to monitoring and recording;
    8. \n
    \n
  3. Retains the notification message or banner on the screen until users acknowledge the usage conditions and take explicit actions to log on to or further access the information system; and
  4. \n\n
  5. For publicly accessible systems:
  6. \n
      \n
    1. Displays system use information [Assignment: organization-defined conditions (FedRAMP Assignment: see additional Requirements and Guidance)], before granting further access;
    2. \n
    3. Displays references, if any, to monitoring, recording, or auditing that are consistent with privacy accommodations for such systems that generally prohibit those activities; and
    4. \n
    5. Includes a description of the authorized uses of the system.
    6. \n
    \n
\nAC-8 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
\nRequirement: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO.
\nGuidance: If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
\nRequirement: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.\n\n|AC-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-8(a)-1:\n|Parameter AC-8(c)-1:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\nAdditional FedRAMP Requirements and Guidance
\nRequirement 1: The service provider shall determine elements of the cloud environment that require the System Use Notification control. The elements of the cloud environment that require System Use Notification are approved and accepted by the JAB/AO.
\nRequirement 2: The service provider shall determine how System Use Notification is going to be verified and provide appropriate periodicity of the check. The System Use Notification verification and periodicity are approved and accepted by the JAB/AO. If performed as part of a Configuration Baseline check, then the % of items requiring setting that are checked and that pass (or fail) check can be provided.
\nRequirement 3: If not performed as part of a Configuration Baseline check, then there must be documented agreement on how to provide results of verification and the necessary periodicity of the verification by the service provider. The documented agreement on how to provide verification of the results are approved and accepted by the JAB/AO.\n\n|AC-8 Req.|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-8 What is the solution and how is it implemented?|\n|---|\n|Req 1\n|Req 2\n|Req 3"} {"question": "AC-10 Concurrent Session Control (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system limits the number of concurrent sessions for each [Assignment: organization-defined account and/or account type] to [FedRAMP Assignment: three (3) sessions for privileged access and two (2) sessions for non-privileged access].\n\n|AC-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-10-1:\n|Parameter AC-10-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-10 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-11 Session Lock (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Prevents further access to the system by initiating a session lock after [FedRAMP Assignment: fifteen (15) minutes] of inactivity or upon receiving a request from a user; and
  2. \n
  3. Retains the session lock until the user reestablishes access using established identification and authentication procedures.
  4. \n
\n\n|AC-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-11(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-11 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-11 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system conceals, via the session lock, information previously visible on the display with a publicly viewable image.\n\n|AC-11 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-11(a)\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-11 (1) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-12 Session Termination (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically terminates a user session after [Assignment: organization-defined conditions or trigger events requiring session disconnect].\n\n|AC-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-12 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-14 Permitted Actions without Identification or Authentication (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies [Assignment: organization-defined user actions] that can be performed on the information system without identification or authentication consistent with organizational missions/business functions; and
  2. \n
  3. Documents and provides supporting rationale in the security plan for the information system, user actions not requiring identification or authentication.
  4. \n
\n\n|AC-14|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-12:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-14 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-17 Remote Access (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and documents usage restrictions, configuration/connection requirements, and implementation guidance for each type of remote access allowed; and
  2. \n
  3. Authorizes remote access to the information system prior to allowing such connections.
  4. \n
\n\n|AC-17|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-17 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system monitors and controls remote access methods.\n\n|AC-17 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements cryptographic mechanisms to protect the confidentiality and integrity of remote access sessions.\n\n|AC-17 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system routes all remote accesses through [Assignment: organization-defined number] managed network access control points.\n\n|AC-17 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AC-17 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Authorizes the execution of privileged commands and access to security-relevant information via remote access only for [Assignment: organization-defined needs]; and
  2. \n
  3. Documents the rationale for such access in the security plan for the information system.
  4. \n
\n\n|AC-17 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(4)(a):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (4) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-17 (9) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides the capability to expeditiously disconnect or disable remote access to the information system within [FedRAMP Assignment: fifteen (15) minutes].\n\n|AC-17 (9)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-17(9):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-17 (9) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-18 Wireless Access Restrictions (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions, configuration/connection requirements, and implementation guidance for wireless access; and
  2. \n
  3. Authorizes wireless access to the information system prior to allowing such connections.
  4. \n
\n\n|AC-18|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-18:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-18 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-18 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects wireless access to the system using authentication of [Selection (one or more): users; devices] and encryption.\n\n|AC-18 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-18 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-18 (1) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-19 Access Control for Portable and Mobile Systems (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes usage restrictions, configuration requirements, connection requirements, and implementation guidance for organization-controlled mobile devices; and
  2. \n
  3. Authorizes the connection of mobile devices to organizational information systems.
  4. \n
\n\n|AC-19|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-19 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-19 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Selection: full-device encryption; container encryption] to protect the confidentiality and integrity of information on [Assignment: organization-defined mobile devices].\n\n|AC-19 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-19(5)-1:\n|Parameter AC-19(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-19 (5) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-20 Use of External Information Systems (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes terms and conditions, consistent with any trust relationships established with other organizations owning, operating, and/or maintaining external information systems, allowing authorized individuals to:\n
    \n
  1. Access the information system from external information systems; and
  2. \n
  3. Process, store, or transmit organization-controlled information using external information systems.
  4. \n
\n\n|AC-20|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-20 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization permits authorized individuals to use an external information system to access the information system or to process, store, or transmit organization-controlled information only when the organization:\n
    \n
  1. Verifies the implementation of required security controls on the external system as specified in the organization\u2019s information security policy and security plan; or
  2. \n
  3. Retains approved information system connection or processing agreements with the organizational entity hosting the external information system.
  4. \n
\n\n|AC-20 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 (1) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AC-20 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization [Selection: restricts; prohibits] the use of organization-controlled portable storage devices by authorized individuals on external information systems.\n\n|AC-20 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-20(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-20 (2) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "AC-21 Information Sharing (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Facilitates information sharing by enabling authorized users to determine whether access authorizations assigned to the sharing partner match the access restrictions on the information for [Assignment: organization-defined information sharing circumstances where user discretion is required]; and
  2. \n
  3. Employs [Assignment: organization-defined automated mechanisms or manual processes] to assist users in making information sharing/collaboration decisions.
  4. \n
\n\n|AC-21|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-21(a):\n|Parameter AC-21(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-21 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b"} {"question": "AC-22 Publicly Accessible Content (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Designates individuals authorized to post information onto a publicly accessible information system;
  2. \n
  3. Trains authorized individuals to ensure that publicly accessible information does not contain nonpublic information;
  4. \n
  5. Reviews the proposed content of information prior to posting onto the publicly accessible information system to ensure that nonpublic information is not included; and
  6. \n
  7. Reviews the content on the publicly accessible information system for nonpublic information [FedRAMP Assignment: at least quarterly] and removes such information, if discovered.
  8. \n
\n\n|AC-22|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AC-22\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AC-22 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d"} {"question": "System and Information Integrity (SI)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "SI-1 System and Information Integrity Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A system and information integrity policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the system and information integrity policy and associated system and information integrity controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. System and information integrity policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. System and information integrity procedures [FedRAMP Assignment: at least at least annually].
    4. \n
    \n
\n\n|SI-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-1(a):\n|Parameter SI-1(b)(1):\n|Parameter SI-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|SI-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-2 Flaw Remediation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies, reports, and corrects information system flaws;
  2. \n
  3. Tests software and firmware updates related to flaw remediation for effectiveness and potential side effects before installation;
  4. \n
  5. Installs security-relevant software and firmware updates within [FedRAMP Assignment: thirty 30 days of release of updates] of the release of the updates; and
  6. \n
  7. Incorporates flaw remediation into the organizational configuration management process.
  8. \n
\n\n|SI-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms [FedRAMP Assignment: at least monthly] to determine the state of information system components with regard to flaw remediation.\n\n|SI-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2 (2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Measures the time between flaw identification and flaw remediation; and
  2. \n
  3. Establishes [Assignment: organization-defined benchmarks] for taking corrective actions.
  4. \n
\n\n|SI-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-2(3)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 (3) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-3 Malicious Code Protection (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs malicious code protection mechanisms at information system entry and exit points to detect and eradicate malicious code;
  2. \n
  3. Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures;
  4. \n
  5. Configures malicious code protection mechanisms to:
  6. \n
      \n
    1. Perform periodic scans of the information system [FedRAMP Assignment: at least weekly] and real-time scans of files from external sources at [FedRAMP Assignment: to include endpoints] as the files are downloaded, opened, or executed in accordance with organizational security policy; and
    2. \n
    3. [FedRAMP Assignment: to include alerting administrator or defined security personnel] in response to malicious code detection; and
    4. \n
    \n
  7. Addresses the receipt of false positives during malicious code detection and eradication and the resulting potential impact on the availability of the information system.
  8. \n
\n\n|SI-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-3(c)(1)-1:\n|Parameter SI-3(c)(1)-2:\n|Parameter SI-3(c)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-2 (3) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "1. SI-3 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization centrally manages malicious code protection mechanisms.\n\n|SI-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n\n#"} {"question": "SI-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system automatically updates malicious code protection mechanisms.\n\n|SI-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-3 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements nonsignature-based malicious code detection mechanisms.\n\n|SI-3 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-3 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 Information System Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Monitors the information system to detect:
  2. \n
      \n
    1. Attacks and indicators of potential attacks in accordance with [Assignment: organization-defined monitoring objectives]; and
    2. \n
    3. Unauthorized local, network, and remote connections;
    4. \n
    \n
  3. Identifies unauthorized use of the information system through [Assignment: organization-defined techniques and methods];
  4. \n
  5. Deploys monitoring devices (i) strategically within the information system to collect organization-determined essential information; and (ii) at ad hoc locations within the system to track specific types of transactions of interest to the organization;
  6. \n
  7. Protects information obtained from intrusion-monitoring tools from unauthorized access, modification, and deletion;
  8. \n
  9. Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information;
  10. \n
  11. Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations; and
  12. \n
  13. Provides [Assignment: organization-defined information system monitoring information] to [Assignment: organization-defined personnel or roles] [Selection (one or more): as needed; [Assignment: organization-defined frequency]].
  14. \nSI-4 Additional FedRAMP Requirements and Guidance:\nGuidance: See US-CERT Incident Response Reporting Guidelines.\n
\n\n|SI-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(a)(1):\n|Parameter SI-4(b):\n|Parameter SI-4(g)-1:\n|Parameter SI-4(g)-2:\n|Parameter SI-4(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "SI-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization connects and configures individual intrusion detection tools into an information system-wide intrusion detection system.\n\n|SI-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(a)(1):\n|Parameter SI-4(b):\n|Parameter SI-4(g)-1:\n|Parameter SI-4(g)-2:\n|Parameter SI-4(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "1. SI-4 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated tools to support near real-time analysis of events.\n\n|SI-4 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system monitors inbound and outbound communications traffic [FedRAMP Assignment: continuously] for unusual or unauthorized activities or conditions.\n\n|SI-4 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "1. SI-4 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system alerts [Assignment: organization-defined personnel or roles] when the following indications of compromise or potential compromise occur: [Assignment: organization-defined compromise indicators].
\nSI-4(5) Additional FedRAMP Requirements and Guidance:
\nGuidance: In accordance with the incident response plan.\n\n|SI-4 (5)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(5)-1:\n|Parameter SI-4(5)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (14) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs a wireless intrusion detection system to identify rogue wireless devices and to detect attack attempts and potential compromises/breaches to the information system.\n\n|SI-4 (14)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (14) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (16) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization correlates information from monitoring tools employed throughout the information system.\n\n|SI-4 (16)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (16) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-4 (23) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined host-based monitoring mechanisms] at [Assignment: organization-defined information system components].\n\n|SI-4 (23)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-4(23)-1:\n|Parameter SI-4(23)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-4 (23) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-5 Security Alerts & Advisories (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Receives information system security alerts, advisories, and directives from [FedRAMP Assignment: to include US-CERT] on an ongoing basis;
  2. \n
  3. Generates internal security alerts, advisories, and directives as deemed necessary;
  4. \n
  5. Disseminates security alerts, advisories, and directives to [FedRAMP Assignment: to include system security personnel and administrators with configuration/patch-management responsibilities]; and
  6. \n
  7. Implements security directives in accordance with established time frames, or notifies the issuing organization of the degree of noncompliance.
  8. \n
\n\n|SI-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-5(a):\n|Parameter SI-5(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-5 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-6 Security Functionality Verification (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Verifies the correct operation of [Assignment: organization-defined security functions];
  2. \n
  3. Performs this verification [FedRAMP Assignment: to include upon system startup and/or restart at least monthly];
  4. \n
  5. Notifies [FedRAMP Assignment: to include system administrators and security personnel] of failed security verification tests; and
  6. \n
  7. [Selection (one or more): shuts the information system down; restarts the information system; [FedRAMP Assignment: to include notification of system administrators and security personnel] when anomalies are discovered.
  8. \n
\n\n|SI-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-6(a):\n|Parameter SI-6(b):\n|Parameter SI-6(c):\n|Parameter SI-6(d)-1:\n|Parameter SI-6(d)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "SI-7 Software & Information Integrity (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs integrity verification tools to detect unauthorized changes to [Assignment: organization-defined software, firmware, and information].\n\n|SI-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system performs an integrity check of [Assignment: organization-defined software, firmware, and information] [FedRAMP Selection (one or more): at startup; at [FedRAMP Assignment: to include security-relevant events]; [FedRAMP Assignment: at least monthly]].\n\n|SI-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7(1)-1:\n|Parameter SI-7(1)-2:\n|Parameter SI-7(1)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-7 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization incorporates the detection of unauthorized [Assignment: organization-defined security-relevant changes to the information system] into the organizational incident response capability.\n\n|SI-7 (7)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-7 (7): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-7 (7) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-8 Spam Protection (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs spam protection mechanisms at information system entry and exit points to detect and take action on unsolicited messages; and
  2. \n
  3. Updates spam protection mechanisms when new releases are available in accordance with organizational configuration management policies and procedures.
  4. \n
\n\n|SI-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-8: \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "SI-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization centrally manages spam protection mechanisms.\n\n|SI-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-8 (1): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-8 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization automatically updates spam protection mechanisms.\n\n|SI-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-10 Information Input Validation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system checks the validity of [Assignment: organization-defined information inputs].\n\n|SI-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-11 Error Handling (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Generates error messages that provide information necessary for corrective actions without revealing information that could be exploited by adversaries; and
  2. \n
  3. Reveals error messages only to [Assignment: organization-defined personnel or roles].
  4. \n
\n\n|SI-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-11(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "SI-12 Information Output Handling and Retention (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization handles and retains information within the information system and information output from the system in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and operational requirements.\n\n|SI-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-12 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "SI-16 Memory Protection (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements [Assignment: organization-defined fail-safe procedures] to protect its memory from unauthorized code execution.\n\n|SI-16|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter SI-16-1:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|SI-16 What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Awareness and Training (AT)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AT-1 Security Awareness and Training Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security awareness and training policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security awareness and training policy and associated security awareness and training controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security awareness and training policy [FedRAMP Assignment: at least every 3 years]; and
    2. \n
    3. Security awareness and training procedures [FedRAMP Assignment: at least annually].\n
    4. \n
    \n
\n\n|AC-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-1(a):\n|Parameter AT-1(b)(1):\n|Parameter AT-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AT-1 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b1:\n|Part b2:\n\n#"} {"question": "AT-2 Security Awareness (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides basic security awareness training to information system users (including managers, senior executives, and contractors):\n
    \n
  1. As part of initial training for new users;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|AT-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-2 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b1:\n|Part b2:\n\n#"} {"question": "AT-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes security awareness training on recognizing and reporting potential indicators of insider threat.\n\n|AT-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-2 (2) What is the solution and how is it implemented?|\n|---\n|Part a:\n\n#"} {"question": "AT-3 Role-Based Security Training (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides role-based security training to personnel with assigned security roles and responsibilities:\n
    \n
  1. Before authorizing access to the information system or performing assigned duties;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|AT-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-3 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b:\n|Part c:\n\n#"} {"question": "AT-4 Security Training Records (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Documents and monitors individual information system security training activities including basic security awareness training and specific information system security training; and
  2. \n
  3. Retains individual training records for [FedRAMP Assignment: at least one year].
  4. \n
\n\n|AT-4(b)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AT-4(b)(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AT-4 What is the solution and how is it implemented?|\n|---\n|Part a:\n|Part b:"} {"question": "Incident Response (IR)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "IR-1 Incident Response Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An incident response policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the incident response policy and associated incident response controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Incident response policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Incident response procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|IR-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-1(a):\n|Parameter IR-1(b)(1):\n|Parameter IR-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|IR-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "IR-2 Incident Response Training (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides incident response training to information system users consistent with assigned roles and responsibilities in accordance with NIST SP 800-53 Rev 4:\n
    \n
  1. Within [Assignment: organization-defined time period] of assuming an incident response role or responsibility;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|IR-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-2(a):\n|Parameter IR-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "IR-3 Incident Response Testing (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests the incident response capability for the information system [FedRAMP Assignment: at least annually] using [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance] to determine the incident response effectiveness and documents the results.
\nIR-3 Additional FedRAMP Requirements and Guidance:
\nRequirements: The service provider defines tests and/or exercises in accordance with NIST Special Publication 800-61 (as amended). For JAB authorization, the service provider provides test plans to the JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to the test commencing.\n\n|IR-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-3-1:\n|Parameter IR-3-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-3 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates incident response testing with organizational elements responsible for related plans.\n\n|IR-3 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-3 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-4 Incident Handling (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Implements an incident handling capability for security incidents that includes preparation, detection and analysis, containment, eradication, and recovery;
  2. \n
  3. Coordinates incident handling activities with contingency planning activities; and
  4. \n
  5. Incorporates lessons learned from ongoing incident handling activities into incident response procedures, training, and testing/exercises, and implements the resulting changes accordingly.
  6. \nIR-4 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider ensures that individuals conducting incident handling meet personnel security requirements commensurate with the criticality/sensitivity of the information being processed, stored, and transmitted by the information system.\n
\n\n|IR-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n\n#"} {"question": "IR-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the incident handling process. \n\n|IR-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-5 Incident Monitoring (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tracks and documents information system security incidents.\n\n#"} {"question": "IR-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to support the incident handling process. \n\n|IR-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-6 Incident Reporting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Requires personnel to report suspected security incidents to the organizational incident response capability within [FedRAMP Assignment: US-CERT incident reporting timelines as specified in NIST SP800-61 (as amended)]; and
  2. \n
  3. Reports security incident information to [Assignment: organization-defined authorities].
  4. \nIR-6 Additional FedRAMP Requirements and Guidance
    \nRequirement: Report security incident information according to FedRAMP Incident Communications Procedure.\n
\n\n|IR-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-6(a):\n|Parameter IR-6(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-6 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "IR-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to assist in the reporting of security incidents.\n\n|IR-6 (1) |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 Incident Response Assistance (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides an incident response support resource, integral to the organizational incident response capability that offers advice and assistance to users of the information system for the handling and reporting of security incidents.\n\n|IR-7 |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to increase the availability of incident response related information and support.\n\n|IR-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes a direct, cooperative relationship between its incident response capability and external providers of information system protection capability; and
  2. \n
  3. Identifies organizational incident response team members to the external providers.
  4. \n
\n\n|IR-7 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-7 (2) What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "IR-8 Incident Response Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops an incident response plan that:
  2. \n
      \n
    1. Provides the organization with a roadmap for implementing its incident response capability;
    2. \n
    3. Describes the structure and organization of the incident response capability;
    4. \n
    5. Provides a high-level approach for how the incident response capability fits into the overall organization;
    6. \n
    7. Meets the unique requirements of the organization, which relate to mission, size, structure, and functions;
    8. \n
    9. Defines reportable incidents;
    10. \n
    11. Provides metrics for measuring the incident response capability within the organization;
    12. \n
    13. Defines the resources and management support needed to effectively maintain and mature an incident response capability; and
    14. \n
    15. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
    16. \n
    \n
  3. Distributes copies of the incident response plan to [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance].
  4. \nIR-8(b) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.\n
  5. Reviews the incident response plan [FedRAMP Assignment: at least annually];
  6. \n
  7. Updates the incident response plan to address system/organizational changes or problems encountered during plan implementation, execution, or testing;
  8. \n
  9. Communicates incident response plan changes to [FedRAMP Assignment: see additional FedRAMP Requirements and Guidance]; and
  10. \nIR-8(e) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a list of incident response personnel (identified by name and/or by role) and organizational elements. The incident response list includes designated FedRAMP personnel.\n
  11. Protects the incident response plan from unauthorized disclosure and modification.
  12. \n
\n\n|IR-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-8(a)(8):\n|Parameter IR-8(b):\n|Parameter IR-8(c):\n|Parameter IR-8(e):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "IR-9 Information Spillage Response (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization responds to information spills by:\n
    \n
  1. Identifying the specific information involved in the information system contamination;
  2. \n
  3. Alerting [Assignment: organization-defined personnel or roles] of the information spill using a method of communication not associated with the spill;
  4. \n
  5. Isolating the contaminated information system or system component;
  6. \n
  7. Eradicating the information from the contaminated information system or component;
  8. \n
  9. Identifying other information systems or system components that may have been subsequently contaminated; and
  10. \n
  11. Performing other [Assignment: organization-defined actions].
  12. \n
\n\n\n|IR-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(b):\n|Parameter IR-9(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n|Part e\n|Part f\n\n#"} {"question": "IR-9 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization assigns [Assignment: organization-defined personnel or roles] with responsibility for responding to information spills.\n\n|IR-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (2) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides information spillage response training [Assignment: organization- defined frequency].\n\n|IR-9 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization implements [Assignment: organization-defined procedures] to ensure that organizational personnel impacted by information spills can continue to carry out assigned tasks while contaminated systems are undergoing corrective actions.\n\n|IR-9 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "IR-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs [Assignment: organization-defined security safeguards] for personnel exposed to information not within assigned access authorizations.\n\n|IR-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter IR-9(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|IR-9 (4) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Contingency Planning (CP)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CP-1 Contingency Planning Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A contingency planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the contingency planning policy and associated contingency planning controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Contingency planning policy [FedRAMP Assignment: at least every three (3) years].; and
    2. \n
    3. Contingency planning procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CP-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-1(a):\n|Parameter CP-1(b)(1):\n|Parameter CP-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CP-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-2 Contingency Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a contingency plan for the information system that:
  2. \n
      \n
    1. Identifies essential missions and business functions and associated contingency requirements;
    2. \n
    3. Provides recovery objectives, restoration priorities, and metrics;
    4. \n
    5. Addresses contingency roles, responsibilities, assigned individuals with contact information;
    6. \n
    7. Addresses maintaining essential missions and business functions despite an information system disruption, compromise, or failure;
    8. \n
    9. Addresses eventual, full information system restoration without deterioration of the security safeguards originally planned and implemented; and
    10. \n
    11. Is reviewed and approved by [Assignment: organization-defined personnel or roles];
    12. \n
    \n
  3. Distributes copies of the contingency plan to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements];
  4. \n
  5. Coordinates contingency planning activities with incident handling activities;
  6. \n
  7. Reviews the contingency plan for the information system [FedRAMP Assignment: at least annually];
  8. \n
  9. Updates the contingency plan to address changes to the organization, information system, or environment of operation and problems encountered during contingency plan implementation, execution, or testing;
  10. \n
  11. Communicates contingency plan changes to [Assignment: organization-defined key contingency personnel (identified by name and/or by role) and organizational elements]; and
  12. \n
  13. Protects the contingency plan from unauthorized disclosure and modification.
  14. \nCP-2 Additional FedRAMP Requirements and Guidance:
    \nRequirement: For JAB authorizations the contingency lists include designated FedRAMP personnel.\n
\n\n|CP-2|Control Summary Information|\n|---|---|\n|Responsible Role\n|Parameter CP-2(a)(6):\n|Parameter CP-2(b):\n|Parameter CP-2(d):\n|Parameter CP-2(f):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "CP-2 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates contingency plan development with organizational elements responsible for related plans.\n\n|CP-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization conducts capacity planning so that necessary capacity for information processing, telecommunications, and environmental support exists during contingency operations.\n\n|CP-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization plans for the resumption of essential missions and business functions within [Assignment: organization-defined time period] of contingency plan activation.\n\n|CP-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n#"} {"question": "CP-2 (8) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies critical information system assets supporting essential missions and business functions.\n\n|CP-2 (8)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-2 (8) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-3 Contingency Training (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides contingency training to information system users consistent with assigned roles and responsibilities:\n
    \n
  1. Within [FedRAMP Assignment: ten (10) days] of assuming a contingency role or responsibility;
  2. \n
  3. When required by information system changes; and
  4. \n
  5. [FedRAMP Assignment: at least annually] thereafter.
  6. \n
\n\n|CP-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-3(a):\n|Parameter CP-3(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-4 Contingency Plan Testing (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Tests the contingency plan for the information system [FedRAMP Assignment: at least annually] using [FedRAMP Assignment: functional exercises] to determine the effectiveness of the plan and the organizational readiness to execute the plan;
  2. \nCP-4(a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider develops test plans in accordance with NIST Special Publication 800-34 (as amended) and provides plans to FedRAMP prior to initiating testing. Test plans are approved and accepted by the JAB/AO prior to initiating testing.\n
  3. Reviews the contingency plan test results; and
  4. \n
  5. Initiates corrective actions, if needed.
  6. \n
\n\n|CP-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-4 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CP-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization coordinates contingency plan testing and/or exercises with organizational elements responsible for related plans.\n\n|CP-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-6 Alternate Storage Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes an alternate storage site including necessary agreements to permit the storage and retrieval of information system backup information; and
  2. \n
  3. Ensures that the alternate storage site provides information security safeguards equivalent to that of the primary site.
  4. \n
\n\n|CP-6 |Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies an alternate storage site that is separated from the primary storage site to reduce susceptibility to the same threats.\n\n|CP-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-6 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies potential accessibility problems to the alternate storage site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.\n\nCP-6 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-6 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 Alternate Processing Site (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes an alternate processing site including necessary agreements to permit the transfer and resumption of [Assignment: organization-defined information system operations] for essential missions/business functions within [FedRAMP Assignment: see additional FedRAMP requirements and guidance] when the primary processing capabilities are unavailable;
  2. \nCP-7a Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis. \n
  3. Ensures that equipment and supplies required to transfer and resume operations are available at the alternate processing site or contracts are in place to support delivery to the site within the organization-defined time period for transfer/resumption; and
  4. \n
  5. Ensures that the alternate processing site provides information security safeguards equivalent to that of the primary site.
  6. \n
\n\nCP-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-7(a)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CP-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies an alternate processing site that is separated from the primary processing site to reduce susceptibility to the same threats.
\nCP-7 (1) Additional FedRAMP Requirements and Guidance
\nGuidance: The service provider may determine what is considered a sufficient degree of separation between the primary and alternate processing sites, based on the types of threats that are of concern. For one particular type of threat (i.e., hostile cyber-attack), the degree of separation between sites will be less relevant.\n\nCP-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization identifies potential accessibility problems to the alternate processing site in the event of an area-wide disruption or disaster and outlines explicit mitigation actions.\n\nCP-7 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-7 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops alternate processing site agreements that contain priority-of-service provisions in accordance with organizational availability requirements (including recovery time objectives).\n\nCP-7 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-7 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-8 Telecommunications Services (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes alternate telecommunications services including necessary agreements to permit the resumption of [Assignment: organization-defined information system operations] for essential missions and business functions within [FedRAMP Assignment: See CP-8 additional FedRAMP requirements and guidance] when the primary telecommunications capabilities are unavailable at either the primary or alternate processing or storage sites.
\nCP-8 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines a time period consistent with the recovery time objectives and business impact analysis.\n\nCP-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-8-1:\n|Parameter CP-8-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 What is the solution and how is it implemented?|\n|---|\n||\n\n1. CP-8 (1) Control Enhancement (M) (H)\nThe organization:\n
    \n
  1. Develops primary and alternate telecommunications service agreements that contain priority- of-service provisions in accordance with organizational availability requirements (including recovery time objectives); and
  2. \n
  3. Requests Telecommunications Service Priority for all telecommunications services used for national security emergency preparedness in the event that the primary and/or alternate telecommunications services are provided by a common carrier.
  4. \n
\n\nCP-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CP-8 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization obtains alternate telecommunications services to reduce the likelihood of sharing a single point of failure with primary telecommunications services.\n\nCP-8 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-8 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-9 Information System Backup (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \nCP-9 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider shall determine what elements of the cloud environment require the Information System Backup control. The service provider shall determine how Information System Backup is going to be verified and appropriate periodicity of the check.\n
  1. Conducts backups of user-level information contained in the information system [FedRAMP Assignment: daily incremental; weekly full]
  2. \nCP-9 (a) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of user-level information (at least one of which is available online).\n
  3. Conducts backups of system-level information contained in the information system [FedRAMP Assignment: daily incremental; weekly full];
  4. \nCP-9 (b) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of system-level information (at least one of which is available online).\n
  5. Conducts backups of information system documentation including security-related documentation [FedRAMP Assignment: daily incremental; weekly full ]; and
  6. \nCP-9 (c) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider maintains at least three backup copies of information system documentation including security information (at least one of which is available online).\n
  7. Protects the confidentiality, integrity, and availability of backup information at storage locations.
  8. \n
\n\nCP-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9(a):\n|Parameter CP-9(b):\n|Parameter CP-9(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CP-9 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization tests backup information [FedRAMP Assignment: at least annually] to verify media reliability and information integrity.\n\nCP-9 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9 (1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-9 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization stores backup copies of [Assignment: organization-defined critical information system software and other security-related information] in a separate facility or in a fire-rated container that is not collocated with the operational system.\n\nCP-9 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-9(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-9 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-10 Information System Recovery and Reconstitution (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization provides for the recovery and reconstitution of the information system to a known state after a disruption, compromise, or failure.\n\nCP-10|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CP-10:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CP-10 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system implements transaction recovery for systems that are transaction-based.\n\nCP-10 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CP-10 (2) What is the solution and how is it implemented?|\n|---|\n||"} {"question": "Audit and Accountability (AU)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "AU-1 Audit and Accountability Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. An audit and accountability policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the audit and accountability policy and associated audit and accountability controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Audit and accountability policy [FedRAMP Assignment: at every 3 years]; and
    2. \n
    3. Audit and accountability procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|AU-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-1(a):\n|Parameter AU-1(b)(1):\n|Parameter AU-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|AU-1 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n\n#"} {"question": "AU-2 Audit Events (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Determines that the information system is capable of auditing the following events: [FedRAMP Assignment: [Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes];
  2. \n
  3. Coordinates the security audit function with other organizational entities requiring audit-related information to enhance mutual support and to help guide the selection of auditable events
  4. \n
  5. Provides a rationale for why the auditable events are deemed to be adequate to support after-the-fact investigations of security incidents; and
  6. \n
  7. Determines that the following events are to be audited within the information system: [FedRAMP Assignment: organization-defined subset of the auditable events defined in AU-2 a. to be audited continually for each identified event].
  8. \nAU-2 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Coordination between service provider and consumer shall be documented and accepted by the JAB/AO.\n
\n\n|AU-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-1(a):\n|Parameter AU-1(d):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-2 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "AU-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews and updates the audited events [FedRAMP Assignment: annually or whenever there is a change in the threat environment].
\nAU-2 (3) Additional FedRAMP Requirements and Guidance:\nGuidance: Annually or whenever changes in the threat environment are communicated to the service provider by the JAB/AO.\n\n|AU-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-3 Content of Audit Records (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system generates audit records containing information that establishes what type of event occurred, when the event occurred, where the event occurred, the source of the event, the outcome of the event, and the identity of any individuals or subjects associated with the event.\n\n|AU-3|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-3 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-3 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system generates audit records containing the following additional information: [Assignment: organization-defined additional, more detailed information].
\nAU-3 (1) Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider defines audit record types [FedRAMP Assignment: session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon]. The audit record types are approved and accepted by the JAB.
\nGuidance: For client-server transactions, the number of bytes sent and received gives bidirectional transfer information that can be helpful during an investigation or inquiry.\n\n|AU-3 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-3(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-3 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-4 Audit Storage Capacity (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization allocates audit record storage capacity in accordance with [Assignment: organization-defined audit record storage requirements].\n\n|AU-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-4:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-5 Response to Audit Processing Failures (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Alerts [Assignment: organization-defined personnel or roles] in the event of an audit processing failure; and
  2. \n
  3. Takes the following additional actions: [FedRAMP Assignment: organization-defined actions to be taken; (overwrite oldest record)].
  4. \n
\n\n|AU-5|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-5(a):\n|Parameter AU-5(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-5 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-6 Audit Review, Analysis, and Reporting (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews and analyzes information system audit records [FedRAMP Assignment: at least weekly] for indications of [Assignment: organization-defined inappropriate or unusual activity]; and
  2. \n
  3. Reports findings to [Assignment: organization-defined personnel or roles].
  4. \nAU-6 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Coordination between service provider and consumer shall be documented and accepted by the Authorizing Official. In multi-tenant environments, capability and means for providing review, analysis, and reporting to consumer for data pertaining to consumer shall be documented.\n
\n\n|AU-6|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-6(a)-1:\n|Parameter AU-6(a)-2:\n|Parameter AU-6(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to integrate audit review, analysis, and reporting processes to support organizational processes for investigation and response to suspicious activities.\n\n|AU-6 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-6 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization analyzes and correlates audit records across different repositories to gain organization-wide situational awareness.\n\n|AU-6 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-6 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-7 Audit Reduction and Report Generation (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system provides an audit reduction and report generation capability that:\n
    \n
  1. Supports on-demand audit review, analysis, and reporting requirements and after-the-fact investigations of security incidents; and
  2. \n
  3. Does not alter the original content or time ordering of audit records.
  4. \n
\n\n|AU-7|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system provides the capability to process audit records for events of interest based on [Assignment: organization-defined audit fields within audit records].\n\n|AU-7 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-7(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-7 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-8 Time Stamps (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Uses internal system clocks to generate time stamps for audit records; and
  2. \n
  3. Records time stamps for audit records that can be mapped to Coordinated Universal Time (UTC) or Greenwich Mean Time (GMT) and meets [Assignment: one second granularity of time measurement].
  4. \n
\n\n|AU-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-8(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-8 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Compares the internal information system clocks with [FedRAMP Assignment: authoritative time source: [http://tf.nist.gov/tf-cgi/servers.cgi] [at least hourly]]; and
  2. \n
  3. Synchronizes the internal system clocks to the authoritative time source when the time difference is greater than [Assignment: organization-defined time period].
  4. \nAU-8 (1) Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider selects primary and secondary time servers used by the NIST Internet time service. The secondary server is selected from a different geographic region than the primary server.
    \nRequirement:< The service provider synchronizes the system clocks of network computers that run operating systems other than Windows to the Windows Server Domain Controller emulator or to the same time source for that server.
    \nGuidance: The service provider selects primary and secondary time servers used by the NIST Internet time service, or by a Stratum-1 time server. The secondary server is selected from a different geographic region than the primary server.
    \nIf using Windows Active Directory, all servers should synchronize time with the time source for the Windows Domain Controller. If using some other directory services (e.g., LDAP), all servers should synchronize time with the time source for the directory server. Synchronization of system clocks improves the accuracy of log analysis.\n
\n\n|AU-8 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-8(1)(a)-1:\n|Parameter AU-8(1)(a)-2:\n|Parameter AU-8(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-8 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "AU-9 Protection of Audit Information (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system protects audit information and audit tools from unauthorized access, modification, and deletion.\n\n|AU-9|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-9 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system backs up audit records [FedRAMP Assignment: at least weekly] onto a physically different system or system component than the system or component being audited.\n\n|AU-9 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-9(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-9 (4) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization authorizes access to management of audit functionality to only [Assignment: organization-defined subset of privileged users].\n\n|AU-9 (4)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-9(4):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-9 (4) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-11 Audit Record Retention (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization retains audit records for [FedRAMP Assignment: at least ninety (90) days] to provide support for after-the-fact investigations of security incidents and to meet regulatory and organizational information retention requirements.
\nAU-11 Additional FedRAMP Requirements and Guidance:
\nRequirement: The service provider retains audit records on-line for at least ninety days and further preserves audit records off-line for a period that is in accordance with NARA requirements\n\n|AU-11|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-11:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-11 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "AU-12 Audit Generation (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system:\n
    \n
  1. Provides audit record generation capability for the auditable events defined in AU-2 a. at [FedRAMP Assignment: all information system components where audit capability is deployed/available];
  2. \n
  3. Allows [Assignment: organization-defined personnel or roles] to select which auditable events are to be audited by specific components of the information system; and
  4. \n
  5. Generates audit records for the events defined in AU-2 d. with the content defined in AU-3.
  6. \n
\n\n|AU-12|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter AU-12(a):\n|Parameter AU-12(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|AU-12 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|"} {"question": "Configuration Management (CM)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "CM-1 Configuration Management Policies and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A configuration management policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the configuration management policy and associated configuration management controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Configuration management policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Configuration management procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|CM-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CM-1(a):\n|Parameter CM-1(b)(1):\n|Parameter CM-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|CM-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-2 Baseline Configuration (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops, documents, and maintains under configuration control, a current baseline configuration of the information system.\n\n|CM-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n\n#"} {"question": "CM-2 (1) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization reviews and updates the baseline configuration of the information system:\n
    \n
  1. [FedRAMP Assignment: at least annually];
  2. \n
  3. When required due to [FedRAMP Assignment: to include when directed by the JAB]; and
  4. \n
  5. As an integral part of information system component installations and upgrades.
  6. \n
\n\n|CM-2 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter CM-2(1)(a):\n|Parameter CM-2(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-2 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to maintain an up-to-date, complete, accurate, and readily available baseline configuration of the information system.\n\n|CM-2 (2)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-2 (3) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization retains [Assignment: organization-defined previous versions of baseline configurations of the information system] to support rollback.\n\n|CM-2 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-2 (7) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Issues [Assignment: organization-defined information systems, system components, or devices] with [Assignment: organization-defined configurations] to individuals traveling to locations that the organization deems to be of significant risk; and
  2. \n
  3. Applies [Assignment: organization-defined security safeguards] to the devices when the individuals return.
  4. \n
\n\n|CM-2 (7)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-2(7)(a)-1:\n|Parameter CM-2(7)(a)-2:\n|Parameter CM-2(7)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-2 (7) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-3 Configuration Change Control (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. (a) Determines the types of changes to the information system that are configuration-controlled;
  2. \n
  3. Reviews proposed configuration-controlled changes to the information system and approves or disapproves such changes with explicit consideration for security impact analyses;
  4. \n
  5. Documents configuration change decisions associated with the information system;
  6. \n
  7. Implements approved configuration-controlled changes to the information system;
  8. \n
  9. Retains records of configuration-controlled changes to the information system for [Assignment: organization-defined time period];
  10. \nCM-3 (e) Additional FedRAMP Requirements and Guidance:
    \nGuidance: In accordance with record retention policies and procedures.\n
  11. Audits and reviews activities associated with configuration-controlled changes to the information system; and
  12. \n
  13. Coordinates and provides oversight for configuration change control activities through [FedRAMP Assignment: see additional FedRAMP requirements and guidance] that convenes [Selection (one or more): [Assignment: organization-defined frequency]; [Assignment: organization-defined configuration change conditions]].
  14. \nCM-3 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider establishes a central means of communicating major changes to or developments in the information system or environment of operations that may affect its services to the federal government and associated service consumers (e.g., electronic bulletin board, web status page). The means of communication are approved and accepted by the JAB/AO.\n
\n\n|CM-3|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-3(e):\n|Parameter CM-3(g)-1:\n|Parameter CM-3(g)-2:\n|Parameter CM-3(g)-3:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-3 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n|Part f|\n|Part g|\n\n#"} {"question": "CM-4 Security Impact Analysis (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization analyzes changes to the information system to determine potential security impacts prior to change implementation.\n\n|CM-4|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-4 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 Access Restrictions for Change (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization defines, documents, approves, and enforces physical and logical access restrictions associated with changes to the information system.\n\n|CM-5|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system enforces access restrictions and supports auditing of the enforcement actions.\n\n|CM-5 (1)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents the installation of [Assignment: organization-defined software and firmware components] without verification that the component has been digitally signed using a certificate that is recognized and approved by the organization.
\nCM-5 (3) Additional FedRAMP Requirements and Guidance:
\nGuidance: If digital signatures/certificates are unavailable, alternative cryptographic integrity checks (hashes, self-signed certs, etc.) can be used.\n\n|CM-5 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-5(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-5 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Limits privileges to change information system components and system-related information within a production or operational environment; and
  2. \n
  3. Reviews and reevaluates privileges [FedRAMP Assignment: at least quarterly].
  4. \n
\n\n|CM-5 (5)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-5(5):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-5 (5) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-6 Configuration Settings (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and documents configuration settings for information technology products employed within the information system using [FedRAMP Assignment: see CM-6(a) Additional FedRAMP Requirements and Guidance] that reflect the most restrictive mode consistent with operational requirements;
  2. \nCM-6(a) Additional FedRAMP Requirements and Guidance:
    \nRequirement 1: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish configuration settings or establishes its own configuration settings if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.
    \nRequirement 2: The service provider shall ensure that checklists for configuration settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP compatible (if validated checklists are not available).
    \nGuidance: Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.\n
\n\n
    \n
  1. Implements the configuration settings;
  2. \n
  3. Identifies, documents, and approves any deviations from established configuration settings for [Assignment: organization-defined information system components] based on [Assignment: organization-defined operational requirements]; and
  4. \n
  5. Monitors and controls changes to the configuration settings in accordance with organizational policies and procedures.
  6. \n
\n\n|CM-6|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-6(a)-1:\n|Parameter CM-6(a)-2:\n|Parameter CM-6(c)-1:\n|Parameter CM-6(c)-2:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CM-6 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization employs automated mechanisms to centrally manage, apply, and verify configuration settings for [Assignment: organization-defined information system components].\n\n|CM-6|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-6(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-6 What is the solution and how is it implemented?|\n|---|\n|Part a|\n\n#"} {"question": "CM-7 Least Functionality (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Configures the information system to provide only essential capabilities; and
  2. \n
  3. Prohibits or restricts the use of the following functions, ports, protocols, and/or services [FedRAMP Assignment: United States Government Configuration Baseline (USGCB)]
  4. \nCM-7 Additional FedRAMP Requirements and Guidance:
    \nRequirement: The service provider shall use the Center for Internet Security guidelines (Level 1) to establish list of prohibited or restricted functions, ports, protocols, and/or services or establishes its own list of prohibited or restricted functions, ports, protocols, and/or services if USGCB is not available. If no recognized USGCB is available for the technology in use, the CSP should create their own baseline and include a justification statement as to how they came up with the baseline configuration settings.
    \nGuidance: Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline\nPartially derived from AC-17 (8).\n
\n\n|CM-7|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-7 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Reviews the information system [FedRAMP Assignment: at least Monthly] to identify unnecessary and/or nonsecure functions, ports, protocols, and services; and
  2. \n
  3. Disables [Assignment: organization-defined functions, ports, protocols, and services within the information system deemed to be unnecessary and/or nonsecure].
  4. \n
\n\n|CM-7 (1) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(1)(a):\n|Parameter CM-7(1)(b):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (1) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-7 (2) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The information system prevents program execution in accordance with [Selection (one or more): [Assignment: organization-defined policies regarding software program usage and restrictions]; rules authorizing the terms and conditions of software program usage].
\nCM-7 (2) Additional FedRAMP Requirements and Guidance:
\nGuidance: This control shall be implemented in a technical manner on the information system to only allow programs to run that adhere to the policy (i.e., white listing). This control is not to be based off of strictly written policy on what is allowed or not allowed to run.\n\n|CM-7 (2) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (2) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-7 (5) Control Enhancement (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Identifies [Assignment: organization-defined software programs authorized to execute on the information system];
  2. \n
  3. Employs a deny-all, permit-by-exception policy to allow the execution of authorized software programs on the information system; and
  4. \n
  5. Reviews and updates the list of authorized software programs [FedRAMP Assignment: at least annually or when there is a change].
  6. \n
\n\n|CM-7 (5) |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-7(5)(a):\n|Parameter CM-7(5)(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-7 (5) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-8 Information System Component Inventory (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops and documents an inventory of information system components that:
  2. \n
      \n
    1. Accurately reflects the current information system;
    2. \n
    3. Includes all components within the authorization boundary of the information system;
    4. \n
    5. Is at the level of granularity deemed necessary for tracking and reporting; and
    6. \n
    \n
  3. Includes [Assignment: organization-defined information deemed necessary to achieve effective information system component accountability]; and
  4. \n
  5. Reviews and updates the information system component inventory [FedRAMP Assignment: at least monthly].
  6. \nCM-8 Additional FedRAMP Requirements and Guidance:
    \nRequirement: Must be provided at least monthly or when there is a change.\n
\n\n|CM-8 |Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-8(a)(4):\n|Parameter CM-8(b): \n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-8 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization updates the inventory of information system components as an integral part of component installations, removals, and information system updates.\n\nInstruction: A description of the inventory information is documented in Section 10. It is not necessary to re-document it here.
\nDelete this and all other instructions from your final version of this document.\n\n|CM-8 (1)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-8 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Employs automated mechanisms [FedRAMP Assignment: Continuously, using automated mechanisms with a maximum five-minute delay in detection] to detect the presence of unauthorized hardware, software, and firmware components within the information system; and
  2. \n
  3. Takes the following actions when unauthorized components are detected: [Selection (one or more): disables network access by such components; isolates the components; notifies [Assignment: organization-defined personnel or roles]].
  4. \n
\n\n|CM-8 (3)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (3) What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "CM-8 (5) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization verifies that all components within the authorization boundary of the information system are not duplicated in other information system inventories.\n\n|CM-8 (5)|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-8 (5) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-9 Configuration Management Plan (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization develops, documents, and implements a configuration management plan for the information system that:\n
    \n
  1. Addresses roles, responsibilities, and configuration management processes and procedures;
  2. \n
  3. Establishes a process for identifying configuration items throughout the system development life cycle and for managing the configuration of the configuration items;
  4. \n
  5. Defines the configuration items for the information system and places the configuration items under configuration management; and
  6. \n
  7. Protects the configuration management plan for unauthorized disclosure and modification.
  8. \n
\n\n|CM-9|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-9 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n\n#"} {"question": "CM-10 Software Usage Restrictions (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Uses software and associated documentation in accordance with contract agreements and copyright laws;
  2. \n
  3. Tracks the use of software and associated documentation protected by quantity licenses to control copying and distribution; and
  4. \n
  5. Controls and documents the use of peer-to-peer file sharing technology to ensure that this capability is not used for the unauthorized distribution, display, performance, or reproduction of copyrighted work.
  6. \n
\n\n|CM-10|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-10 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n\n#"} {"question": "CM-10 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization establishes the following restrictions on the use of open source software: [Assignment: organization-defined restrictions].\n\nCM-10|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-10(1):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-10 What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "CM-11 User-Installed Software (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes [Assignment: organization-defined policies] governing the installation of software by users;
  2. \n
  3. Enforces software installation policies through [Assignment: organization-defined methods]; and
  4. \n
  5. Monitors policy compliance [FedRAMP Assignment: Continuously (via CM-7 (5))].
  6. \n
\n\nCM-11|Control Summary Information|\n|---|--|\n|Responsible Role:\n|Parameter CM-11(a):\n|Parameter CM-11(b):\n|Parameter CM-11(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|CM-11 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|"} {"question": "Planning (PL)", "context": "Refer to the specific section and subsections for details.", "answer": "#"} {"question": "PL-1 Security Planning Policy and Procedures (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:
  2. \n
      \n
    1. A security planning policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and
    2. \n
    3. Procedures to facilitate the implementation of the security planning policy and associated security planning controls; and
    4. \n
    \n
  3. Reviews and updates the current:
  4. \n
      \n
    1. Security planning policy [FedRAMP Assignment: at least every three (3) years]; and
    2. \n
    3. Security planning procedures [FedRAMP Assignment: at least annually].
    4. \n
    \n
\n\n|PL-1|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-1(a):\n|Parameter PL-1(b)(1):\n|Parameter PL-1(b)(2):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)\n\n|PL-1 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n\n#"} {"question": "PL-2 System Security Plan (L) (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops a security plan for the information system that:
  2. \n
      \n
    1. Is consistent with the organization\u2019s enterprise architecture;
    2. \n
    3. Explicitly defines the authorization boundary for the system;
    4. \n
    5. Describes the operational context of the information system in terms of missions and business processes;
    6. \n
    7. Provides the security categorization of the information system including supporting rationale;
    8. \n
    9. Describes the operational environment for the information system and relationships with or connections to other information;
    10. \n
    11. Provides an overview of the security requirements for the system;
    12. \n
    13. Identifies any relevant overlays, if applicable;
    14. \n
    15. Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and
    16. \n
    17. Is reviewed and approved by the authorizing official or designated representative prior to plan implementation;
    18. \n
    \n
  3. Distributes copies of the security plan and communicates subsequent changes to the plan to [Assignment: organization-defined personnel or roles];
  4. \n
  5. Reviews the security plan for the information system [FedRAMP Assignment: at least annually];
  6. \n
  7. Updates the plan to address changes to the information system/environment of operation or problems identified during plan implementation or security control assessments; and
  8. \n
  9. Protects the security plan from unauthorized disclosure and modification.
  10. \n
\n\n\n|PL-2|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-2(b):\n|Parameter PL-2(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-2 What is the solution and how is it implemented?|\n|---|\n|Part a|\n|Part b|\n|Part c|\n|Part d|\n|Part e|\n\n#"} {"question": "PL-2 (3) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization plans and coordinates security-related activities affecting the information system with [Assignment: organization-defined individuals or groups] before conducting such activities in order to reduce the impact on other organizational entities.\n\n|PL-2 (3)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-2(3):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-2 (3) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PL-4 Rules of Behavior (L) (M)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Establishes and makes readily available to individuals requiring access to the information system, the rules that describe their responsibilities and expected behavior with regard to information and information system usage;
  2. \n
  3. Receives a signed acknowledgment from such individuals, indicating that they have read, understand, and agree to abide by the rules of behavior, before authorizing access to information and the information system;
  4. \n
  5. Reviews and updates the rules of behavior [FedRAMP Assignment: at least every three (3) years]; and
  6. \n
  7. Requires individuals who have signed a previous version of the rules of behavior to read and resign when the rules of behavior are revised/updated.
  8. \n
\n\n|PL-4|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Parameter PL-4(c):\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-4 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c\n|Part d\n\n#"} {"question": "PL-4 (1) Control Enhancement (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization includes in the rules of behavior, explicit restrictions on the use of social media/networking sites and posting organizational information on public websites.\n\n|PL-4 (1)|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-4 (1) What is the solution and how is it implemented?|\n|---|\n||\n\n#"} {"question": "PL-8 Information Security Architecture (M) (H)", "context": "Refer to the specific section and subsections for details.", "answer": "The organization:\n
    \n
  1. Develops an information security architecture for the information system that:
  2. \n
      \n
    1. Describes the overall philosophy, requirements, and approach to be taken with regard to protecting the confidentiality, integrity, and availability of organizational information;
    2. \n
    3. Describes how the information security architecture is integrated into and supports the enterprise architecture; and
    4. \n
    5. Describes any information security assumptions about, and dependencies on, external services;
    6. \n
    \n
  3. Reviews and updates the information security architecture [FedRAMP Assignment: at least annually or when a significant change occurs] to reflect updates in the enterprise architecture; and
  4. \nPL-8 (b) Additional FedRAMP Requirements and Guidance:
    \nGuidance: Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F, on Page F-8.\n
  5. Ensures that planned information security architecture changes are reflected in the security plan, the security Concept of Operations (CONOPS), and organizational procurements/acquisitions.
  6. \n
\n\n|PL-8|Control Summary Information|\n|---|---|\n|Responsible Role:\n|Implementation Status (check all that apply):|☐ Implemented
☐ Partially implemented
☐ Planned
☐ Alternative implementation
☐ Not applicable\n|Control Origination (check all that apply):|☐ Service Provider Corporate
☐ Service Provider System Specific
☐ Service Provider Hybrid (Corporate and System Specific)
☐ Configured by Customer (Customer System Specific)
☐ Provided by Customer (Customer System Specific)
☐ Shared (Service Provider and Customer Responsibility)
☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.\n\n|PL-8 What is the solution and how is it implemented?|\n|---|\n|Part a\n|Part b\n|Part c"}