question
stringlengths 13
90
| context
stringclasses 1
value | answer
stringlengths 1
5.37k
|
---|---|---|
Personnel Security (PS) | Refer to the specific section and subsections for details. | # |
PS-1 Personnel Security Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A personnel security policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the personnel security policy and associated personnel security controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Personnel security policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Personnel security procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|PS-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-1(a):
|Parameter PS-1(b)(1):
|Parameter PS-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|PS-1 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
PS-2 Position Categorization (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Assigns a risk designation to all positions;</li>
<li>Establishes screening criteria for individuals filling those positions; and</li>
<li>Reviews and revises position risk designations [FedRAMP Assignment: at least every three (3) years].</li>
</ol>
|PS-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-2(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-2 What is the solution and how is it implemented?|
|---
|Part a
|Part b
|Part c
# |
PS-3 Personnel Screening (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Screens individuals prior to authorizing access to the information system; and</li>
<li>Rescreens individuals according to [FedRAMP Assignment: For national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions].</li>
</ol>
|PS-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-3(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-3 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
PS-3 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization ensures that individuals accessing an information system processing, storing, or transmitting information requiring special protection:
<ol type="a">
<li>Have valid access authorizations that are demonstrated by assigned official government duties; and</li>
<li>Satisfy [FedRAMP Assignment: personnel screening criteria – as required by specific information].</li>
</ol>
|PS-3 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-3 (3)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-3 (3) What is the solution and how is it implemented?|
|---
|Part a
|Part b
# |
PS-4 Personnel Termination (L) (M) | Refer to the specific section and subsections for details. | The organization, upon termination of individual employment:
<ol type="a">
<li>Disables information system access within [FedRAMP Assignment: same day];</li>
<li>Terminates/revokes any authenticators/credentials associated with the individual;</li>
<li>Conducts exit interviews that include a discussion of [Assignment: organization-defined information security topics];</li>
<li>Retrieves all security-related organizational information system-related property;</li>
<li>Retains access to organizational information and information systems formerly controlled by terminated individual; and</li>
<li>Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period].</li>
</ol>
|PS-4|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-4(a):
|Parameter PS-4(c):
|Parameter PS-4(f)-1:
|Parameter PS-4(f)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-4 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
|Part f
# |
PS-5 Personnel Transfer (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Reviews and confirms ongoing operational need for current logical and physical access authorizations to information systems/facilities when individuals are reassigned or transferred to other positions within the organization;</li>
<li>Initiates [Assignment: organization-defined transfer or reassignment actions] within [Assignment: organization-defined time period following the formal transfer action];</li>
<li>Modifies access authorization as needed to correspond with any changes in operational need due to reassignment or transfer; and</li>
<li>Notifies [Assignment: organization-defined personnel or roles] within [FedRAMP Assignment: within five days of the formal transfer action (DoD 24 hours)].</li>
</ol>
|PS-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-5(b)-1:
|Parameter PS-5(b)-2:
|Parameter PS-5(d)-1:
|Parameter PS-5(d)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-5 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
# |
PS-6 Access Agreements (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops and documents access agreements for organizational information systems;</li>
<li>Reviews and updates the access agreements [FedRAMP Assignment: at least annually]; and</li>
<li>Ensures that individuals requiring access to organizational information and information systems:</li>
<ol type="1">
<li>Sign appropriate access agreements prior to being granted access; and</li>
<li>Re-sign access agreements to maintain access to organizational information systems when access agreements have been updated or [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|PS-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-6(b):
|Parameter PS-6(c)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-6 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
PS-7 Third-Party Personnel Security (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Establishes personnel security requirements including security roles and responsibilities for third-party providers;</li>
<li>Requires third-party providers to comply with personnel security policies and procedures established by the organization;</li>
<li>Documents personnel security requirements;</li>
<li>Requires third-party providers to notify [Assignment: organization-defined personnel or roles] of any personnel transfers or terminations of third-party personnel who possess organizational credentials and/or badges, or who have information system privileges within [FedRAMP Assignment: same day]; and</li>
<li>Monitors provider compliance.</li>
</ol>
|PS-7|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-7(d)-1:
|Parameter PS-7(d)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-7 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
# |
PS-8 Personnel Sanctions (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Employs a formal sanctions process for personnel failing to comply with established information security policies and procedures; and</li>
<li>Notifies [Assignment: organization-defined personnel or roles] within [Assignment: organization-defined time period] when a formal employee sanctions process is initiated, identifying the individual sanctioned and the reason for the sanction.</li>
</ol>
|PS-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PS-8(b)-1:
|Parameter PS-8(b)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PS-8 What is the solution and how is it implemented?|
|---|
|Part a
|Part b |
Media Protection (MP) | Refer to the specific section and subsections for details. | # |
MP-1 Media Protection Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A media protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the media protection policy and associated media protection controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Media protection policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Media protection procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|MP-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-1(a):
|Parameter MP-1(b)(1):
|Parameter MP-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|MP-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
MP-2 Media Access (L) (M) | Refer to the specific section and subsections for details. | The organization restricts access to [Assignment: organization-defined types of digital and/or non-digital media] to [Assignment: organization-defined personnel or roles].
|MP-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-2-1:
|Parameter MP-2-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-2 What is the solution and how is it implemented?|
|---|
||
# |
MP-3 Media Labeling (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Marks information system media indicating the distribution limitations, handling caveats, and applicable security markings (if any) of the information; and</li>
<li>Exempts [FedRAMP Assignment: no removable media types] from marking as long as the media remain within [Assignment: organization-defined controlled areas].</li>
<b>MP-3(b) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Second parameter in MP-3(b)-2 is not applicable.
</ol>
|MP-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-3(b)-1:
|Parameter MP-3(b)-2:| Not applicable
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-3 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
MP-4 Media Storage (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Physically controls and securely stores [FedRAMP Assignment: [all types of digital and non-digital media with sensitive information]] within [FedRAMP Assignment: see additional FedRAMP requirements and guidance]; and</li>
<b>MP-4a Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider defines controlled areas within facilities where the information and information system reside.
<li>Protects information system media until the media are destroyed or sanitized using approved equipment, techniques, and procedures.</li>
</ol>
|MP-4|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-4(a)-1:
|Parameter MP-4(a)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-4 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
MP-5 Media Transport (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Protects and controls [FedRAMP Assignment: all media with sensitive information] during transport outside of controlled areas using [FedRAMP Assignment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digital media, secured in locked container];</li>
<b>MP-5a Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider defines security measures to protect digital and non-digital media in transport. The security measures are approved and accepted by the JAB/AO.
<li>Maintains accountability for information system media during transport outside of controlled areas;</li>
<li>Documents activities associated with the transport of information system media; and</li>
<li>Restricts the activities associated with transport of information system media to authorized personnel.</li>
</ol>
|MP-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-5(a)-1:
|Parameter MP-5(a)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-5 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
# |
MP-5 (4) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs cryptographic mechanisms to protect the confidentiality and integrity of information stored on digital media during transport outside of controlled areas.
|MP-5 (4)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-5 (4) What is the solution and how is it implemented?|
|---|
||
# |
MP-6 Media Sanitization and Disposal (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Sanitizes [Assignment: organization-defined information system media] prior to disposal, release out of organizational control, or release for reuse using [Assignment: organization-defined sanitization techniques and procedures] in accordance with applicable federal and organizational standards and policies; and</li>
<li>Employs sanitization mechanisms with the strength and integrity commensurate with the security category or classification of the information.</li>
</ol>
|MP-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-6(a)-1:
|Parameter MP-6(a)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-6 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
MP-6 (2) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization tests sanitization equipment and procedures [FedRAMP Assignment: at least annually] to verify that the intended sanitization is being achieved.
<b>MP-6 (2) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Equipment and procedures may be tested or evaluated for effectiveness.
|MP-6 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-6(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-6 (2) What is the solution and how is it implemented?|
|---|
||
# |
MP-7 Media Use (L) (M) (H) | Refer to the specific section and subsections for details. | The organization [Selection: restricts; prohibits] the use of [Assignment: organization-defined types of information system media] on [Assignment: organization-defined information systems or system components] using [Assignment: organization-defined security safeguards].
|MP-6 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter MP-7-1:
|Parameter MP-7-2:
|Parameter MP-7-3:
|Parameter MP-7-4:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-6 (2) What is the solution and how is it implemented?|
|---|
||
# |
MP-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization prohibits the use of portable storage devices in organizational information systems when such devices have no identifiable owner.
|MP-7 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|MP-7 (1) What is the solution and how is it implemented?|
|---|
|| |
Risk Assessment (RA) | Refer to the specific section and subsections for details. | # |
RA-1 Risk Assessment Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A risk assessment policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the risk assessment policy and associated risk assessment controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Risk assessment policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Risk assessment procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|RA-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-1(a):
|Parameter RA-1(b)(1):
|Parameter RA-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|RA-1 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
RA-2 Security Categorization (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Categorizes information and the information system in accordance with applicable Federal Laws, Executive Orders, directives, policies, regulations, standards, and guidance;</li>
<li>Documents the security categorization results (including supporting rationale) in the security plan for the information system; and</li>
<li>Ensures the security categorization decision is reviewed and approved by the AO or authorizing official designated representative.</li>
</ol>
|RA-2|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-2 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
RA-3 Risk Assessment (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of the information system and the information it processes, stores, or transmits;</li>
<li>Documents risk assessment results in [Selection: security plan; risk assessment report; [FedRAMP Assignment: security assessment report]];</li>
<li>Reviews risk assessment results [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs];</li>
<li>Disseminates risk assessment results to [Assignment: organization-defined personnel or roles]; and</li>
<li>Updates the risk assessment [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs] or whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities), or other conditions that may impact the security state of the system.</li>
<b>RA-3 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F
<b>RA-3 (d) Requirement:</b> Include all Authorizing Officials; for JAB authorizations to include FedRAMP.
</ol>
|RA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-3(b):
|Parameter RA-3(c):
|Parameter RA-3(d):
|Parameter RA-3(e):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-3 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
# |
RA-5 Vulnerability Scanning (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Scans for vulnerabilities in the information system and hosted applications [FedRAMP Assignment: monthly operating system/infrastructure; monthly web applications and databases] and when new vulnerabilities potentially affecting the system/applications are identified and reported;</li>
<b>RA-5 (a) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> An accredited independent assessor scans operating systems/infrastructure, web applications, and databases once annually.
<li>Employs vulnerability scanning tools and techniques that promote interoperability among tools and automate parts of the vulnerability management process by using standards for:</li>
<ol type="1">
<li>Enumerating platforms, software flaws, and improper configurations;</li>
<li>Formatting and making transparent, checklists and test procedures; and</li>
<li>Measuring vulnerability impact;</li>
</ol>
<li>Analyzes vulnerability scan reports and results from security control assessments</li>
<li>Remediates legitimate vulnerabilities; [FedRAMP Assignment: high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery], in accordance with an organizational assessment of risk; and</li>
<li>Shares information obtained from the vulnerability scanning process and security control assessments with [Assignment: organization-defined personnel or roles] to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).</li>
<b>RA-5 (e) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> To include all Authorizing Officials; for JAB authorizations to include FedRAMP.<br>
<b>RA-5 Additional FedRAMP Requirements and Guidance</b>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents Vulnerability Scanning Requirements<br>
https://www.FedRAMP.gov/documents/
</ol>
|RA-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-5(a):
|Parameter RA-5(d):
|Parameter RA-5(e):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-5 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
# |
RA-5 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs vulnerability scanning tools that include the capability to readily update the list of information system vulnerabilities to be scanned.
|RA-5 (1)|Control Summary Information|
|---|---|
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-5 (1) What is the solution and how is it implemented?|
|---|
||
# |
RA-5 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization updates the information system vulnerabilities scanned [Selection (one or more): [FedRAMP Assignment: prior to a new scan]].
|RA-5 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-5(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-5 (2) What is the solution and how is it implemented?|
|---|
||
# |
RA-5 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs vulnerability scanning procedures that can demonstrate the breadth and depth of coverage (i.e., information system components scanned and vulnerabilities checked).
|RA-5 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-5(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-5 (3) What is the solution and how is it implemented?|
|---|
||
# |
RA-5 (5) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization includes privileged access authorization to [FedRAMP Assignment: operating systems, databases, web applications] for selected [FedRAMP Assignment: all scans].
|RA-5 (5)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter RA-5(5)-1:
|Parameter RA-5(5)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-5 (5) What is the solution and how is it implemented?|
|---|
||
# |
RA-5 (6) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs automated mechanisms to compare the results of vulnerability scans over time to determine trends in information system vulnerabilities.
|RA-6|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-6 What is the solution and how is it implemented?|
|---|
||
# |
RA-5 (8) Control Enhancement (L) (M) (H) | Refer to the specific section and subsections for details. | The organization reviews historic audit logs to determine if a vulnerability identified in the information system has been previously exploited.
<b>RA-5 (8) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> This enhancement is required for all high vulnerability scan findings.
<b>Guidance:</b> While scanning tools may label findings as high or critical, the intent of the control is based around NIST's definition of high vulnerability.
|RA-8|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|RA-8 What is the solution and how is it implemented?|
|---|
|| |
System and Services Acquisition (SA) | Refer to the specific section and subsections for details. | # |
SA-1 System and Services Acquisition Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A system and services acquisition policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the system and services acquisition policy and associated system and services acquisition controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>System and services acquisition policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>System and services acquisition procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|SA-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-1(a):
|Parameter SA-1(b)(1):
|Parameter SA-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|AC-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
SA-2 Allocation of Resources (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Determines information security requirements for the information system or information system service in mission/business process planning;</li>
<li>Determines, documents, and allocates the resources required to protect the information system or information system service as part of its capital planning and investment control process; and</li>
<li>Establishes a discrete line item for information security in organizational programming and budgeting documentation.</li>
</ol>
|SA-2|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-2 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
SA-3 System Development Life Cycle (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Manages the information system using [Assignment: organization-defined system development life cycle] that incorporates information security considerations;</li>
<li>Defines and documents information security roles and responsibilities throughout the system development life cycle;</li>
<li>Identifies individuals having information security roles and responsibilities; and</li>
<li>Integrates the organizational information security risk management process into system development life cycle activities.</li>
</ol>
|SA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-3(a):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-3 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
# |
SA-4 Acquisitions Process (L) (M) (H) | Refer to the specific section and subsections for details. | The organization includes the following requirements, descriptions, and criteria, explicitly or by reference, in the acquisition contract for the information system, system component, or information system service in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, guidelines, and organizational mission/business needs:
<ol type="a">
<li>Security functional requirements;</li>
<li>Security strength requirements;</li>
<li>Security assurance requirements;</li>
<li>Security-related documentation requirements;</li>
<li>Requirements for protecting security-related documentation;</li>
<li>Description of the information system development environment and environment in which the system is intended to operate; and</li>
<li>Acceptance criteria.</li><br>
<b>Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly preferred.
See http://www.niap-ccevs.org/vpl or http://www.commoncriteriaportal.org/products.html.
</ol>
|SA-4|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
|Part f
|Part g
# |
SA-4 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to provide a description of the functional properties of the security controls to be employed.
|SA-4 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 (1) What is the solution and how is it implemented?|
|---|
||
# |
SA-4 (2) Control Enhancement (L) (M) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to provide design and implementation information for the security controls to be employed that includes: [FedRAMP Selection (one or more): to include security-relevant external system interfaces, and high-level design]; [Assignment: organization-defined design/implementation information] at [Assignment: organization-defined level of detail].
|SA-4 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-4-1:
|Parameter SA-4-2:
|Parameter SA-4-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 (2) What is the solution and how is it implemented?|
|---|
||
# |
SA-4 (8) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to produce a plan for the continuous monitoring of security control effectiveness that contains [FedRAMP Assignment: at least the minimum requirement as defined in control CA-7].<br>
<b>SA-4 (8) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> CSP must use the same security standards regardless of where the system component or information system service is acquired.
|SA-4 (8)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-4(8):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 (8) What is the solution and how is it implemented?|
|---|
||
# |
SA-4 (9) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to identify early in the system development life cycle, the functions, ports, protocols, and services intended for organizational use.
|SA-4 (9)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 (9) What is the solution and how is it implemented?|
|---|
||
# |
SA-4 (10) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs only information technology products on the FIPS 201-approved products list for Personal Identity Verification (PIV) capability implemented within organizational information systems.
|SA-4 (10)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-4 (10) What is the solution and how is it implemented?|
|---|
||
# |
SA-5 Information System Documentation (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Obtains administrator documentation for the information system, system component, or information system service that describes:</li>
<ol type="1">
<li>Secure configuration, installation, and operation of the system, component, or service;</li>
<li>Effective use and maintenance of security functions/mechanisms; and</li>
<li>Known vulnerabilities regarding configuration and use of administrative (i.e., privileged) functions;</li>
</ol>
<li>Obtains user documentation for the information system, system component, or information system service that describes:</li>
<ol type="1">
<li>User-accessible security functions/mechanisms and how to effectively use those security functions/mechanisms;</li>
<li>Methods for user interaction, which enables individuals to use the system, component, or service in a more secure manner; and</li>
<li>User responsibilities in maintaining the security of the system, component, or service;</li>
</ol>
<li>Documents attempts to obtain information system, system component, or information system service documentation when such documentation is either unavailable or nonexistent and [Assignment: organization-defined actions] in response;</li>
<li>Protects documentation as required, in accordance with the risk management strategy; and</li>
<li>Distributes documentation to [Assignment: organization-defined personnel or roles)].</li>
</ol>
|SA-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-5(c):
|Parameter SA-5(e):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-5 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
# |
SA-8 Security Engineering Principles (M) (H) | Refer to the specific section and subsections for details. | The organization applies information system security engineering principles in the specification, design, development, implementation, and modification of the information system.
|SA-8|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-8 What is the solution and how is it implemented?|
|---|
||
# |
SA-9 External Information System Services (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Requires that providers of external information system services comply with organizational information security requirements and employ [FedRAMP Assignment: FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system] in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance;</li>
<li>Defines and documents government oversight and user roles and responsibilities with regard to external information system services; and</li>
<li>Employs [FedRAMP Assignment: Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored] to monitor security control compliance by external service providers on an ongoing basis.</li><br>
<b>Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service Provider (CSP) Documents> Continuous Monitoring Strategy Guide
https://www.FedRAMP.gov/documents <br>
<b>Guidance:</b> Independent Assessors should assess the risk associated with the use of external services. See the FedRAMP page under Key Cloud Service Provider (CSP) Documents>FedRAMP Authorization Boundary Guidance
</ol>
|SA-9|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-9(a):
|Parameter SA-9(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-9 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
SA-9 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Conducts an organizational assessment of risk prior to the acquisition or outsourcing of dedicated information security services; and</li>
<li>Ensures that the acquisition or outsourcing of dedicated information security services is approved by [Assignment: organization-defined personnel or roles].</li>
</ol>
|SA-9 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-9(1)(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-9 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
SA-9 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires providers of [FedRAMP Assignment: All external systems where Federal information is processed or stored] to identify the functions, ports, protocols, and other services required for the use of such services.
|SA-9 (2) Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-9(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-9 (2) What is the solution and how is it implemented?|
|---|
||
# |
SA-9 (4) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs [Assignment: organization-defined security safeguards] to ensure that the interests of [FedRAMP Assignment: All external systems where Federal information is processed or stored] are consistent with and reflect organizational interests.
|SA-9 (4)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-9(4)-1:
|Parameter SA-9(4)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-9 (4) What is the solution and how is it implemented?|
|---|
||
# |
SA-9 (5) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization restricts the location of [FedRAMP Selection: information processing, information data, AND information services] to [Assignment: organization-defined locations] based on [Assignment: organization-defined requirements or conditions].<br>
<b>Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> System services refer to FTP, Telnet, and TFTP, etc.
|SA-9 (5)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-9(5)-1:
|Parameter SA-9(5)-2:
|Parameter SA-9(5)-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-9 (5) What is the solution and how is it implemented?|
|---|
||
# |
SA-10 Developer Configuration Management (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to:
<ol type="a">
<li>Perform configuration management during system, component, or service [FedRAMP Selection: development, implementation, AND operation];</li>
<li>Document, manage, and control the integrity of changes to [Assignment: organization-defined configuration items under configuration management];</li>
<li>Implement only organization-approved changes to the system, component, or service;</li>
<li>Document approved changes to the system, component, or service and the potential security impacts of such changes; and</li>
<li>Track security flaws and flaw resolution within the system, component, or service and report findings to [Assignment: organization-defined personnel].</li>
<b>SA-10 (e) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> For JAB authorizations, track security flaws and flaw resolution within the system, component, or service and report findings to organization-defined personnel, to include FedRAMP.
</ol>
|SA-10|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-10(a):
|Parameter SA-10(b):
|Parameter SA-10(e):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-10 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
# |
SA-10 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to enable integrity verification of software and firmware components.
|SA-10 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-10 (1) What is the solution and how is it implemented?|
|---|
||
# |
SA-11 Developer Security Testing and Evaluation (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to:
<ol type="a">
<li>Create and implement a security assessment plan;</li>
<li>Perform [Selection (one or more): unit; integration; system; regression] testing/evaluation at [Assignment: organization-defined depth and coverage];</li>
<li>Produce evidence of the execution of the security assessment plan and the results of the security testing/evaluation;</li>
<li>Implement a verifiable flaw remediation process; and</li>
<li>Correct flaws identified during security testing/evaluation.</li>
</ol>
|SA-11|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-11(b)-1:
|Parameter SA-11(b)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-11 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part e|
|Part d|
# |
SA-11 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to employ static code analysis tools to identify common flaws and document the results of the analysis.<br>
<b>SA-11 (1) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider documents in the Continuous Monitoring Plan, how newly developed code for the information system is reviewed.
|SA-11 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SA-11(b)-1:
|Parameter SA-11(b)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-11 (1) What is the solution and how is it implemented?|
|---|
||
# |
SA-11 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to perform threat and vulnerability analyses and subsequent testing/evaluation of the as-built system, component, or service.
|SA-11 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-11 (2) What is the solution and how is it implemented?|
|---|
||
# |
SA-11 (8) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization requires the developer of the information system, system component, or information system service to employ dynamic code analysis tools to identify common flaws and document the results of the analysis.
|SA-11 (8)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SA-11 (8) What is the solution and how is it implemented?|
|---|
|| |
Physical and Environmental Protection (PE) | Refer to the specific section and subsections for details. | # |
PE-1 Physical and Environmental Protection Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A physical and environmental protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the physical and environmental protection policy and associated physical and environmental protection controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Physical and environmental protection policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Physical and environmental protection procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|PE-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-1(a):
|Parameter PE-1(b)(1):
|Parameter PE-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|PE-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
PE-2 Physical Access Authorizations (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, approves, and maintains a list of individuals with authorized access to the facility where the information system resides;</li>
<li>Issues authorization credentials for facility access;</li>
<li>Reviews the access list detailing authorized facility access by individuals [FedRAMP Assignment: at least annually]; and</li>
<li>Removes individuals from the facility access list when access is no longer required.</li>
</ol>
|PE-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-2(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-2 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
# |
PE-3 Physical Access Control (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Enforces physical access authorizations at [Assignment: organization-defined entry/exit points to the facility where the information system resides] by:</li>
<ol type="1">
<li>Verifying individual access authorizations before granting access to the facility; and</li>
<li>Controlling ingress/egress to the facility using [FedRAMP Assignment: CSP defined physical access control systems/devices AND guards];</li>
</ol>
<li>Maintains physical access audit logs for [Assignment: organization-defined entry/exit points];</li>
<li>Provides [Assignment: organization-defined security safeguards] to control access to areas within the facility officially designated as publicly accessible;</li>
<li>Escorts visitors and monitors visitor activity [FedRAMP Assignment: in all circumstances within restricted access area where the information system resides];</li>
<li>Secures keys, combinations, and other physical access devices;</li>
<li>Inventories [Assignment: organization-defined physical access devices] every [FedRAMP Assignment: at least annually]; and</li>
<li>Changes combinations and keys [FedRAMP Assignment: at least annually] and/or when keys are lost, combinations are compromised, or individuals are transferred or terminated.</li>
</ol>
|PE-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-3(a):
|Parameter PE-3(a)(2):
|Parameter PE-3(b):
|Parameter PE-3(c):
|Parameter PE-3(d):
|Parameter PE-3(f)-1:
|Parameter PE-3(f)-2:
|Parameter PE-3(g):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-3 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
|Part d
|Part e
|Part f
|Part g
# |
PE-4 Access Control for Transmission Medium (M) (H) | Refer to the specific section and subsections for details. | The organization controls physical access to [Assignment: organization-defined information system distribution and transmission lines] within organizational facilities using [Assignment: organization-defined security safeguards].
|PE-4|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-4-1:
|Parameter PE-4-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-4 What is the solution and how is it implemented?|
|---|
||
# |
PE-5 Access Control for Output Devices (M) (H) | Refer to the specific section and subsections for details. | The organization controls physical access to information system output devices to prevent unauthorized individuals from obtaining the output.
|PE-5|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-5 What is the solution and how is it implemented?|
|---|
||
# |
PE-6 Monitoring Physical Access (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;</li>
<li>Reviews physical access logs [FedRAMP Assignment: at least monthly] and upon occurrence of [Assignment: organization-defined events or potential indications of events]; and</li>
<li>Coordinates results of reviews and investigations with the organization’s incident response capability.</li>
</ol>
|PE-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-6(b)-1:
|Parameter PE-6(b)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-6 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
PE-6 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization monitors physical intrusion alarms and surveillance equipment.
|PE-6 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-6 (1) What is the solution and how is it implemented?|
|---|
||
# |
PE-8 Visitor Access Records (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Maintains visitor access records to the facility where the information system resides for [FedRAMP Assignment: for a minimum of one (1) year]; and</li>
<li>Reviews visitor access records [FedRAMP Assignment: at least monthly]</li>
</ol>
|PE-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-8(a):
|Parameter PE-8(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-8 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
PE-9 Power Equipment and Cabling (M) (H) | Refer to the specific section and subsections for details. | The organization protects power equipment and power cabling for the information system from damage and destruction.
|PE-9|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-9 What is the solution and how is it implemented?|
|---|
||
# |
PE-10 Emergency Shutoff (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Provides the capability of shutting off power to the information system or individual system components in emergency situations;</li>
<li>Places emergency shutoff switches or devices in [Assignment: organization-defined location by information system or system component] to facilitate safe and easy access for personnel; and</li>
<li>Protects emergency power shutoff capability from unauthorized activation.</li>
</ol>
|PE-10|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-10(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-10 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
PE-11 Emergency Power (M) (H) | Refer to the specific section and subsections for details. | The organization provides a short-term uninterruptible power supply to facilitate [Selection (one or more): an orderly shutdown of the information system; transition of the information system to long-term alternate power] in the event of a primary power source loss.
|PE-11|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-11:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-11 What is the solution and how is it implemented?|
|---|
||
# |
PE-12 Emergency Lighting (L) (M) (H) | Refer to the specific section and subsections for details. | The organization employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption and that covers emergency exits and evacuation routes within the facility.
|PE-12|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-12 What is the solution and how is it implemented?|
|---|
||
# |
PE-13 Fire Protection (L) (M) (H) | Refer to the specific section and subsections for details. | The organization employs and maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
|PE-13|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-13 What is the solution and how is it implemented?|
|---|
||
# |
PE-13 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs fire suppression devices/systems for the information system that provide automatic notification of any activation [Assignment: organization-defined personnel or roles] and [Assignment: organization-defined emergency responders].
|PE-13 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-13(2)-1:
|Parameter PE-13(2)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-13 (2) What is the solution and how is it implemented?|
|---|
||
# |
PE-13 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs an automatic fire suppression capability for the information system when the facility is not staffed on a continuous basis.
|PE-13 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-13 (3) What is the solution and how is it implemented?|
|---|
||
# |
PE-14 Temperature and Humidity Controls (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Maintains temperature and humidity levels within the facility where the information system resides at [FedRAMP Assignment: consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled "Thermal Guidelines for Data Processing Environments]; and</li>
<b>PE-14 (a) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> The service provider measures temperature at server inlets and humidity levels by dew point.
<li>Monitors temperature and humidity levels [FedRAMP Assignment: continuously].</li>
</ol>
|PE-14|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-14(a):
|Parameter PE-14(b):
|Parameter PE-14(b) Additional:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-14 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
# |
PE-14 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs temperature and humidity monitoring that provides an alarm or notification of changes potentially harmful to personnel or equipment.
|PE-14 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-14 (2) What is the solution and how is it implemented?|
|---|
||
# |
PE-15 Water Damage Protection (L) (M) (H) | Refer to the specific section and subsections for details. | The organization protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are accessible, working properly, and known to key personnel.
|PE-15|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-15 What is the solution and how is it implemented?|
|---|
||
# |
PE-16 Delivery and Removal (L) (M) (H) | Refer to the specific section and subsections for details. | The organization authorizes, monitors, and controls [FedRAMP Assignment: all information system components] entering and exiting the facility and maintains records of those items.
|PE-16|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-16:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-16 What is the solution and how is it implemented?|
|---|
||
# |
PE-17 Alternate Work Site (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Employs [Assignment: organization-defined security controls] at alternate work sites;</li>
<li>Assesses as feasible, the effectiveness of security controls at alternate work sites; and</li>
<li>Provides a means for employees to communicate with information security personnel in case of security incidents or problems.</li>
</ol>
|PE-17|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter PE-17(a):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|PE-17 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c |
Security Assessment and Authorization (CA) | Refer to the specific section and subsections for details. | # |
CA-1 Certification, Authorization, Security Assessment Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A security assessment and authorization policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the security assessment and authorization policy and associated security assessment and authorization controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>Security assessment and authorization policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>Security assessment and authorization procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|CA-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-1(a):
|Parameter CA-1(b)(1):
|Parameter CA-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|CA-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CA-2 Security Assessments (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops a security assessment plan that describes the scope of the assessment including:</li>
<ol type="1">
<li>Security controls and control enhancements under assessment;</li>
<li>Assessment procedures to be used to determine security control effectiveness; and</li>
<li>Assessment environment, assessment team, and assessment roles and responsibilities;</li>
</ol>
<li>Assesses the security controls in the information system and its environment of operation [FedRAMP Assignment: at least annually] to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements;</li>
<li>Produces a security assessment report that documents the results of the assessment; and</li>
<li>Provides the results of the security control assessment to [FedRAMP Assignment: individuals or roles to include the FedRAMP Program Management Office (PMO)].</li>
<b>CA-2 Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Annual Assessment Guidance https://www.fedramp.gov/documents/
</ol>
|CA-2|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(b):
|Parameter CA-2(d):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
# |
CA-2 (1) Control Enhancement (L) (M) (H) | Refer to the specific section and subsections for details. | The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to conduct security control assessments.<br>
<b>CA-2 (1) Additional FedRAMP Requirements and Guidance: </b><br>
<b>Requirement:</b> For JAB Authorization, must use an accredited Third Party Assessment Organization (3PAO).
|CA-2 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-2 (2) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization includes as part of security control assessments, [FedRAMP Assignment: at least annually], [Selection: announced; unannounced], [Selection (one or more): in-depth monitoring; vulnerability scanning; malicious user testing; insider threat assessment; performance/load testing; [Assignment: organization-defined other forms of security assessment]].<br>
<b>CA-2 (2) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> To include 'announced', 'vulnerability scanning’ to occur at least annually.
|CA-2 (2)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(2)-1:
|Parameter CA-2(2)-2:
|Parameter CA-2(2)-3:
|Parameter CA-2(2)-4:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (2) What is the solution and how is it implemented?|
|---|
||
# |
CA-2 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization accepts the results of an assessment of [FedRAMP Assignment: organization-defined information system] performed by [FedRAMP Assignment: any FedRAMP Accredited 3PAO] when the assessment meets [FedRAMP Assignment: the conditions of the JAB/AO in the FedRAMP Repository].
|CA-2 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-2(3)-1:
|Parameter CA-2(3)-2:
|Parameter CA-2(3)-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-2 (3) What is the solution and how is it implemented?|
|---|
||
# |
CA-3 System Interconnections (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements;</li>
<li>Documents, for each interconnection, the interface characteristics, security requirements, and the nature of the information communicated; and</li>
<li>Reviews and updates Interconnection Security Agreements [FedRAMP Assignment: at least annually and on input from FedRAMP].</li>
</ol>
|Authorized Connections Information System Name|Name of Organization CSP Name System Connects To|Role and Name of Person Who Signed Connection Agreement|Name and Date of Interconnection Agreement|
|---|---|---|---|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|Authorized Connections System Name|Name Org CSP System Connects To|Role and Name Signed Connection Agreement|Name and Date of Interconnection Agreement|
|CA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 What is the solution and how is it implemented?|
|---|
|Part a: See System Interconnections for information about implementation.|
|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|
|Part c|
# |
CA-3 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].<br>
<b>CA-3 (3) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Refer to Appendix H – Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22
|CA-3|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 What is the solution and how is it implemented?|
|---|
|Part a: See System Interconnections for information about implementation.|
|Part b: See Table Control Origination and Definitions and Table System Interconnections for information about implementation.|
|Part c|
# |
CA-3 (3) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization prohibits the direct connection of an [Assignment: organization-defined unclassified, non-national security system] to an external network without the use of [FedRAMP Assignment: boundary protections which meet Trusted Internet Connection (TIC) requirements].<br>
<b>CA-3 (3) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Refer to Appendix H – Cloud Considerations of the TIC Reference Architecture document. Link: https://www.dhs.gov/publication/tic-reference-architecture-22
|CA-3 (3)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(3)-1:
|Parameter CA-3(3)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 (3) What is the solution and how is it implemented?|
|---|
||
# |
CA-3 (5) Control Enhancement (M) | Refer to the specific section and subsections for details. | The organization employs [Selection: allow-all, deny-by-exception, deny-all, permit by exception] policy for allowing [Assignment: organization-defined information systems] to connect to external information systems.<br>
<b>CA-3 (5) Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> For JAB Authorization, CSPs shall include details of this control in their architecture briefing.
|CA-3 (5)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-3(5)-1:
|Parameter CA-3(5)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-3 (5) What is the solution and how is it implemented?|
|---|
||
# |
CA-5 Plan of Action and Milestones (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops a plan of action and milestones for the information system to document the organization’s planned remedial actions to correct weaknesses or deficiencies noted during the assessment of the security controls and to reduce or eliminate known vulnerabilities in the system; and</li>
<li>Updates existing plan of action and milestones [FedRAMP Assignment: at least monthly] based on the findings from security controls assessments, security impact analyses, and continuous monitoring activities.</li>
<b>CA-5 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Plan of Action & Milestones (POA&M) must be provided at least monthly.
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Plan of Action and Milestones (POA&M) Template Completion Guide
https://www.FedRAMP.gov/documents/
</ol>
|CA-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-5(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-5 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
CA-6 Security Authorization (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Assigns a senior-level executive or manager as the authorizing official for the information system;</li>
<li>Ensures that the authorizing official authorizes the information system for processing before commencing operations; and</li>
<li>Updates the security authorization [FedRAMP Assignment: in accordance with OMB A-130 requirements or when a significant change occurs].</li>
<b>CA-6c Additional FedRAMP Requirements and Guidance:</b><br>
<b>Guidance:</b> Significant change is defined in NIST Special Publication 800-37 Revision 1, Appendix F (SP 800-37). The service provider describes the types of changes to the information system or the environment of operations that would impact the risk posture. The types of changes are approved and accepted by the JAB/AO.
</ol>
|CA-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-6(c):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-6 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
# |
CA-7 Continuous Monitoring (L) (M) (H) | Refer to the specific section and subsections for details. | The organization develops a continuous monitoring strategy and implements a continuous monitoring program that includes:
<ol type="a">
<li>Establishment of [Assignment: organization-defined metrics] to be monitored;</li>
<li>Establishment of [Assignment: organization-defined frequencies] for monitoring and [Assignment: organization-defined frequencies] for assessments supporting such monitoring;</li>
<li>Ongoing security control assessments in accordance with the organizational continuous monitoring strategy;</li>
<li>Ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy;</li>
<li>Correlation and analysis of security-related information generated by assessments and monitoring;</li>
<li>Response actions to address results of the analysis of security-related information; and</li>
<li>Reporting the security status of organization and the information system to [FedRAMP Assignment: to meet Federal and FedRAMP requirements] [Assignment: organization-defined frequency].</li>
<b>CA-7 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement:</b> Operating System Scans: at least monthly. Database and Web Application Scans: at least monthly. All scans performed by Independent Assessor: at least annually.<br>
<b>Guidance:</b> CSPs must provide evidence of closure and remediation of a high vulnerability within the timeframe for standard POA&M updates.<br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Continuous Monitoring Strategy Guide
https://www.fedramp.gov/documents/
</ol>
|CA-7|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-7(a):
|Parameter CA-7(b)-1:
|Parameter CA-7(b)-2:
|Parameter CA-7(g)-1:
|Parameter CA-7(g)-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
|Part c|
|Part d|
|Part e|
|Part f|
|Part g|
<b>CA-7 Additional FedRAMP Requirements and Guidance:</b><br>
<b>Requirement 1:</b> Operating System Scans: at least monthly<br>
<b>Requirement 2:</b> Database and Web Application Scans: at least monthly<br>
<b>Requirement 3:</b> All scans performed by Independent Assessor: at least annually<br>
|CA-7 Req.|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 What is the solution and how is it implemented?|
|---|
|Req. 1|
|Req. 2|
|Req. 3|
# |
CA-7 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs assessors or assessment teams with [Assignment: organization-defined level of independence] to monitor the security controls in the information system on an ongoing basis.
|CA-7 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-7(1):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-7 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-8 Penetration Testing (M) (H) | Refer to the specific section and subsections for details. | The organization conducts penetration testing [FedRAMP Assignment: at least annually] on [Assignment: organization-defined information systems or system components].
<b>CA-8 Additional FedRAMP Requirements and Guidance</b><br>
<b>Guidance:</b> See the FedRAMP Documents page under Key Cloud Service
Provider (CSP) Documents> Penetration Test Guidance
https://www.fedramp.gov/documents/
|CA-8|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-8-1:
|Parameter CA-8-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-8 What is the solution and how is it implemented?|
|---|
||
# |
CA-8 (1) Control Enhancement (M) (H) | Refer to the specific section and subsections for details. | The organization employs an independent penetration agent or penetration team to perform penetration testing on the information system or system components.
|CA-8 (1)|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-8 (1) What is the solution and how is it implemented?|
|---|
||
# |
CA-9 Internal System Connections (L) (M) (H) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Authorizes internal connections of [Assignment: organization-defined information system components or classes of components] to the information system; and</li>
<li>Documents, for each internal connection, the interface characteristics, security requirements, and the nature of the information communicated.</li>
</ol>
|CA-9|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter CA-9(a):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|CA-9 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b| |
System and Communications Protection (SC) | Refer to the specific section and subsections for details. | # |
SC-1 System and Communications Protection Policy and Procedures (L) (M) | Refer to the specific section and subsections for details. | The organization:
<ol type="a">
<li>Develops, documents, and disseminates to [Assignment: organization-defined personnel or roles]:</li>
<ol type="1">
<li>A system and communications protection policy that addresses purpose, scope, roles, responsibilities, management commitment, coordination among organizational entities, and compliance; and</li>
<li>Procedures to facilitate the implementation of the system and communications protection policy and associated system and communications protection controls; and</li>
</ol>
<li>Reviews and updates the current:</li>
<ol type="1">
<li>System and communications protection policy [FedRAMP Assignment: at least every three (3) years]; and</li>
<li>System and communications protection procedures [FedRAMP Assignment: at least annually].</li>
</ol>
</ol>
|SC-1|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SC-1(a):
|Parameter SC-1(b)(1):
|Parameter SC-1(b)(2):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)
|SC-1 What is the solution and how is it implemented?|
|---|
|Part a|
|Part b|
# |
SC-2 Application Partitioning (M) (H) | Refer to the specific section and subsections for details. | The information system separates user functionality (including user interface services) from information system management functionality.
|SC-2|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SC-2 What is the solution and how is it implemented?|
|---|
||
# |
SC-4 Information in Shared Resources (M) (H) | Refer to the specific section and subsections for details. | The information system prevents unauthorized and unintended information transfer via shared system resources.
|SC-4|Control Summary Information|
|---|---|
|Responsible Role:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SC-4 What is the solution and how is it implemented?|
|---|
||
# |
SC-5 Denial of Service Protection (L) (M) (H) | Refer to the specific section and subsections for details. | The information system protects against or limits the effects of the following types of denial of service attacks: [Assignment: organization-defined types of denial of service attacks or reference to source for such information] by employing [Assignment: organization-defined security safeguards].
|SC-5|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SC-5-1:
|Parameter SC-5-2:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SC-5 What is the solution and how is it implemented?|
|---|
||
# |
SC-6 Resource Availability (M) (H) | Refer to the specific section and subsections for details. | The information system protects the availability of resources by allocating [Assignment: organization-defined resources] by [Selection (one or more); priority; quota; [Assignment: organization-defined security safeguards]].
|SC-6|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SC-6-1:
|Parameter SC-6-2:
|Parameter SC-6-3:
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SC-6 What is the solution and how is it implemented?|
|---|
||
# |
SC-7 Boundary Protection (L) (M) (H) | Refer to the specific section and subsections for details. | The information system:
<ol type="a">
<li>Monitors and controls communications at the external boundary of the system and at key internal boundaries within the system; and</li>
<li>Implements subnetworks for publicly accessible system components that are [Selection: physically; logically] separated from internal organizational networks; and</li>
<li>Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with organizational security architecture.</li>
</ol>
|SC-7|Control Summary Information|
|---|---|
|Responsible Role:
|Parameter SC-7(b):
|Implementation Status (check all that apply):|☐ Implemented<br/>☐ Partially implemented<br/>☐ Planned<br/>☐ Alternative implementation<br/>☐ Not applicable
|Control Origination (check all that apply):|☐ Service Provider Corporate<br/>☐ Service Provider System Specific<br/>☐ Service Provider Hybrid (Corporate and System Specific)<br/>☐ Configured by Customer (Customer System Specific)<br/>☐ Provided by Customer (Customer System Specific)<br/>☐ Shared (Service Provider and Customer Responsibility)<br/>☐ Inherited from pre-existing FedRAMP Authorization for _insert text here_.
|SC-7 What is the solution and how is it implemented?|
|---|
|Part a
|Part b
|Part c
# |
Subsets and Splits