diff --git a/src/content/rev5/baselines/xml/FedRAMP_rev4_HIGH-baseline_profile.xml b/src/content/rev5/baselines/xml/FedRAMP_rev4_HIGH-baseline_profile.xml deleted file mode 100644 index 5d989d86f..000000000 --- a/src/content/rev5/baselines/xml/FedRAMP_rev4_HIGH-baseline_profile.xml +++ /dev/null @@ -1,13060 +0,0 @@ - - - - - - FedRAMP Rev 4 High Baseline - 2021-02-05T00:00:00.000-04:00 - 2021-06-09T14:27:59.366-04:00 - fedramp1.1.0-oscal1.0.0 - 1.0.0 - - Document creator - - - The FedRAMP Program Management Office (PMO) - CSP - - - The FedRAMP Joint Authorization Board (JAB) - CSP - - - Federal Risk and Authorization Management Program: Program Management Office - FedRAMP PMO - - - - - info@fedramp.gov -
- 1800 F St. NW - Washington - DC - 20006 - US -
-
- - Federal Risk and Authorization Management Program: Joint Authorization Board - FedRAMP JAB - - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - ca9ba80e-1342-4bfd-b32a-abac468c24b4 - -
- - - ac-1 - ac-2 - ac-2.1 - ac-2.2 - ac-2.3 - ac-2.4 - ac-2.5 - ac-2.7 - ac-2.9 - ac-2.10 - ac-2.11 - ac-2.12 - ac-2.13 - ac-3 - ac-4 - ac-4.8 - ac-4.21 - ac-5 - ac-6 - ac-6.1 - ac-6.2 - ac-6.3 - ac-6.5 - ac-6.7 - ac-6.8 - ac-6.9 - ac-6.10 - ac-7 - ac-7.2 - ac-8 - ac-10 - ac-11 - ac-11.1 - ac-12 - ac-12.1 - ac-14 - ac-17 - ac-17.1 - ac-17.2 - ac-17.3 - ac-17.4 - ac-17.9 - ac-18 - ac-18.1 - ac-18.3 - ac-18.4 - ac-18.5 - ac-19 - ac-19.5 - ac-20 - ac-20.1 - ac-20.2 - ac-21 - ac-22 - at-1 - at-2 - at-2.2 - at-3 - at-3.3 - at-3.4 - at-4 - au-1 - au-2 - au-2.3 - au-3 - au-3.1 - au-3.2 - au-4 - au-5 - au-5.1 - au-5.2 - au-6 - au-6.1 - au-6.3 - au-6.4 - au-6.5 - au-6.6 - au-6.7 - au-6.10 - au-7 - au-7.1 - au-8 - au-8.1 - au-9 - au-9.2 - au-9.3 - au-9.4 - au-10 - au-11 - au-12 - au-12.1 - au-12.3 - ca-1 - ca-2 - ca-2.1 - ca-2.2 - ca-2.3 - ca-3 - ca-3.3 - ca-3.5 - ca-5 - ca-6 - ca-7 - ca-7.1 - ca-7.3 - ca-8 - ca-8.1 - ca-9 - cm-1 - cm-2 - cm-2.1 - cm-2.2 - cm-2.3 - cm-2.7 - cm-3 - cm-3.1 - cm-3.2 - cm-3.4 - cm-3.6 - cm-4 - cm-4.1 - cm-5 - cm-5.1 - cm-5.2 - cm-5.3 - cm-5.5 - cm-6 - cm-6.1 - cm-6.2 - cm-7 - cm-7.1 - cm-7.2 - cm-7.5 - cm-8 - cm-8.1 - cm-8.2 - cm-8.3 - cm-8.4 - cm-8.5 - cm-9 - cm-10 - cm-10.1 - cm-11 - cm-11.1 - cp-1 - cp-2 - cp-2.1 - cp-2.2 - cp-2.3 - cp-2.4 - cp-2.5 - cp-2.8 - cp-3 - cp-3.1 - cp-4 - cp-4.1 - cp-4.2 - cp-6 - cp-6.1 - cp-6.2 - cp-6.3 - cp-7 - cp-7.1 - cp-7.2 - cp-7.3 - cp-7.4 - cp-8 - cp-8.1 - cp-8.2 - cp-8.3 - cp-8.4 - cp-9 - cp-9.1 - cp-9.2 - cp-9.3 - cp-9.5 - cp-10 - cp-10.2 - cp-10.4 - ia-1 - ia-2 - ia-2.1 - ia-2.2 - ia-2.3 - ia-2.4 - ia-2.5 - ia-2.8 - ia-2.9 - ia-2.11 - ia-2.12 - ia-3 - ia-4 - ia-4.4 - ia-5 - ia-5.1 - ia-5.2 - ia-5.3 - ia-5.4 - ia-5.6 - ia-5.7 - ia-5.8 - ia-5.11 - ia-5.13 - ia-6 - ia-7 - ia-8 - ia-8.1 - ia-8.2 - ia-8.3 - ia-8.4 - ir-1 - ir-2 - ir-2.1 - ir-2.2 - ir-3 - ir-3.2 - ir-4 - ir-4.1 - ir-4.2 - ir-4.3 - ir-4.4 - ir-4.6 - ir-4.8 - ir-5 - ir-5.1 - ir-6 - ir-6.1 - ir-7 - ir-7.1 - ir-7.2 - ir-8 - ir-9 - ir-9.1 - ir-9.2 - ir-9.3 - ir-9.4 - ma-1 - ma-2 - ma-2.2 - ma-3 - ma-3.1 - ma-3.2 - ma-3.3 - ma-4 - ma-4.2 - ma-4.3 - ma-4.6 - ma-5 - ma-5.1 - ma-6 - mp-1 - mp-2 - mp-3 - mp-4 - mp-5 - mp-5.4 - mp-6 - mp-6.1 - mp-6.2 - mp-6.3 - mp-7 - mp-7.1 - pe-1 - pe-2 - pe-3 - pe-3.1 - pe-4 - pe-5 - pe-6 - pe-6.1 - pe-6.4 - pe-8 - pe-8.1 - pe-9 - pe-10 - pe-11 - pe-11.1 - pe-12 - pe-13 - pe-13.1 - pe-13.2 - pe-13.3 - pe-14 - pe-14.2 - pe-15 - pe-15.1 - pe-16 - pe-17 - pe-18 - pl-1 - pl-2 - pl-2.3 - pl-4 - pl-4.1 - pl-8 - ps-1 - ps-2 - ps-3 - ps-3.3 - ps-4 - ps-4.2 - ps-5 - ps-6 - ps-7 - ps-8 - ra-1 - ra-2 - ra-3 - ra-5 - ra-5.1 - ra-5.2 - ra-5.3 - ra-5.4 - ra-5.5 - ra-5.6 - ra-5.8 - ra-5.10 - sa-1 - sa-2 - sa-3 - sa-4 - sa-4.1 - sa-4.2 - sa-4.8 - sa-4.9 - sa-4.10 - sa-5 - sa-8 - sa-9 - sa-9.1 - sa-9.2 - sa-9.4 - sa-9.5 - sa-10 - sa-10.1 - sa-11 - sa-11.1 - sa-11.2 - sa-11.8 - sa-12 - sa-15 - sa-16 - sa-17 - sc-1 - sc-2 - sc-3 - sc-4 - sc-5 - sc-6 - sc-7 - sc-7.3 - sc-7.4 - sc-7.5 - sc-7.7 - sc-7.8 - sc-7.10 - sc-7.12 - sc-7.13 - sc-7.18 - sc-7.20 - sc-7.21 - sc-8 - sc-8.1 - sc-10 - sc-12 - sc-12.1 - sc-12.2 - sc-12.3 - sc-13 - sc-15 - sc-17 - sc-18 - sc-19 - sc-20 - sc-21 - sc-22 - sc-23 - sc-23.1 - sc-24 - sc-28 - sc-28.1 - sc-39 - si-1 - si-2 - si-2.1 - si-2.2 - si-2.3 - si-3 - si-3.1 - si-3.2 - si-3.7 - si-4 - si-4.1 - si-4.2 - si-4.4 - si-4.5 - si-4.11 - si-4.14 - si-4.16 - si-4.18 - si-4.19 - si-4.20 - si-4.22 - si-4.23 - si-4.24 - si-5 - si-5.1 - si-6 - si-7 - si-7.1 - si-7.2 - si-7.5 - si-7.7 - si-7.14 - si-8 - si-8.1 - si-8.2 - si-10 - si-11 - si-12 - si-16 - - - - - true - - - - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

monthly for privileged accessed, every six (6) months for non-privileged access

-
-
-
- - - -

Selection: disables

-
-
-
- - - -

24 hours from last use

-
-
-
- - - -

35 days for user accounts

-
-
-
- - - -

organization and/or service provider system owner

-
-
-
- - - -

inactivity is anticipated to exceed Fifteen (15) minutes

-
-
-
- - - -

disables/revokes access within a organization-specified timeframe

-
-
-
- - - -

organization-defined need with justification statement that explains why such accounts are necessary

-
-
-
- - - -

at a minimum, the ISSO and/or similar role within the organization

-
-
-
- - - -

one (1) hour

-
-
-
- - - -

all functions not publicly accessible and all security-relevant information not publicly available

-
-
-
- - - -

all security functions

-
-
-
- - - -

all privileged commands

-
-
-
- - - -

at a minimum, annually

-
-
-
- - - -

all users with privileges

-
-
-
- - - -

any software except software explicitly documented

-
-
-
- - - -

not more than three (3)

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

locks the account/node for a minimum of three (3) hours or until unlocked by an administrator

-
-
-
- - - -

mobile devices as defined by organization policy

-
-
-
- - - -

three (3)

-
-
-
- - - -

see additional Requirements and Guidance

-
-
-
- - - -

see additional Requirements and Guidance

-
-
-
- - - -

three (3) sessions for privileged access and two (2) sessions for non-privileged access

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

at least quarterly

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

malicious code indicators as defined by organization incident policy/capability.

-
-
-
- - - -

five (5) years or 5 years after completion of a specific training program

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes

-
-
-
- - - -

organization-defined subset of the auditable events defined in AU-2a to be audited continually for each identified event

-
-
-
- - - -

annually or whenever there is a change in the threat environment

-
-
-
- - - -

session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon; individual identities of group account users; full-text of privileged commands

-
-
-
- - - -

all network, data storage, and computing devices

-
-
-
- - - -

organization-defined actions to be taken (overwrite oldest record)

-
-
-
- - - -

real-time

-
-
-
- - - -

service provider personnel with authority to address failed audit events

-
-
-
- - - -

audit failure events requiring real-time alerts, as defined by organization audit policy

-
-
-
- - - -

at least weekly

-
-
-
- - - -

Possibly to include penetration test data.

-
-
-
- - - -

information system process; role; user

-
-
-
- - - -

one second granularity of time measurement

-
-
-
- - - -

At least hourly

-
-
-
- - - -

http://tf.nist.gov/tf-cgi/servers.cgi

-
-
-
- - - -

at least weekly

-
-
-
- - - -

minimum actions including the addition, modification, deletion, approval, sending, or receiving of data

-
-
-
- - - -

at least one (1) year

-
-
-
- - - -

all information system and network components where audit capability is deployed/available

-
-
-
- - - -

all network, data storage, and computing devices

-
-
-
- - - -

service provider-defined individuals or roles with audit configuration responsibilities

-
-
-
- - - -

all network, data storage, and computing devices

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

individuals or roles to include FedRAMP PMO

-
-
-
- - - -

at least annually

-
-
-
- - - -

any FedRAMP Accredited 3PAO

-
-
-
- - - -

any FedRAMP Accredited 3PAO

-
-
-
- - - -

the conditions of the JAB/AO in the FedRAMP Repository

-
-
-
- - - -

At least annually and on input from FedRAMP

-
-
-
- - - -

boundary protections which meet the Trusted Internet Connection (TIC) requirements

-
-
-
- - - -

deny-all, permit by exception

-
-
-
- - - -

any systems

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually or when a significant change occurs

-
-
-
- - - -

to include when directed by the JAB

-
-
-
- - - -

organization-defined previous versions of baseline configurations of the previously approved baseline configuration of IS components

-
-
-
- - - -

organization agreed upon time period

-
-
-
- - - -

organization defined configuration management approval authorities

-
-
-
- - - -

Configuration control board (CCB) or similar (as defined in CM-3)

-
-
-
- - - -

All security safeguards that rely on cryptography

-
-
-
- - - -

at least every thirty (30) days

-
-
-
- - - -

at least quarterly

-
-
-
- - -

See CM-6(a) Additional FedRAMP Requirements and Guidance

-
-
- - - -

United States Government Configuration Baseline (USGCB)

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least quarterly or when there is a change

-
-
-
- - - -

at least monthly

-
-
-
- - - -

Continuously, using automated mechanisms with a maximum five-minute delay in detection.

-
-
-
- - - -

position and role

-
-
-
- - - -

Continuously (via CM-7 (5))

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

time period defined in service provider and organization SLA

-
-
-
- - - -

ten (10) days

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

functional exercises

-
-
-
- - - -

annually

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

at least monthly

-
-
-
- - - -

time period and transfer rate consistent with the recovery time and recovery point objectives defined in the service provider and organization SLA

-
-
-
- - - -

time period consistent with the restoration time-periods defined in the service provider and organization SLA

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

FIPS 140-2, NIAP Certification, or NSA approval

-
-
-
- - - -

at a minimum, the ISSO (or similar role within the organization)

-
-
-
- - - -

at least two (2) years

-
-
-
- - - -

thirty-five (35) days (See additional requirements and guidance.)

-
-
-
- - - -

contractors; foreign nationals]

-
-
-
- - - -

at least fifty percent (50%)

-
-
-
- - - -

twenty four (24)

-
-
-
- - - -

All hardware/biometric (multifactor authenticators)

-
-
-
- - - -

in person

-
-
-
- - - -

complexity as identified in IA-5 (1) Control Enhancement Part (a)

-
-
-
- - - -

different authenticators on different systems

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

within ten (10) days

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every six (6) months, including functional at least annually

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

all network, data storage, and computing devices

-
-
-
- - - -

external organizations including consumer incident responders and network defenders and the appropriate CIRT/CERT (such as US-CERT, DOD CERT, IC CERT)

-
-
-
- - - -

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least annually

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

the information owner explicitly authorizing removal of the equipment from the facility

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

any digital and non-digital media deemed sensitive

-
-
-
- - - -

no removable media types

-
-
-
- - - -

organization-defined security safeguards not applicable

-
-
-
- - - -

all types of digital and non-digital media with sensitive information

-
-
-
- - - -

see additional FedRAMP requirements and guidance

-
-
-
- - - -

all media with sensitive information

-
-
-
- - - -

prior to leaving secure/controlled environment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digital media, secured in locked container

-
-
-
- - - -

techniques and procedures IAW NIST SP 800-88 R1, Appendix A - Minimum Sanitization Recommendations

-
-
-
- - - -

at least every six (6) months

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least every ninety (90) days

-
-
-
- - - -

CSP defined physical access control systems/devices AND guards

-
-
-
- - - -

CSP defined physical access control systems/devices

-
-
-
- - - -

in all circumstances within restricted access area where the information system resides

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least monthly

-
-
-
- - - -

for a minimum of one (1) year

-
-
-
- - - -

at least monthly

-
-
-
- - - -

service provider building maintenance/physical security personnel

-
-
-
- - - -

service provider emergency responders with incident response responsibilities

-
-
-
- - - -

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

-
-
-
- - - -

continuously

-
-
-
- - - -

service provider building maintenance/physical security personnel

-
-
-
- - - -

all information system components

-
-
-
- - - -

physical and environmental hazards identified during threat assessment

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

annually

-
-
-
- - - -

at least annually or when a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least annually

-
-
-
- - - -

for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions

-
-
-
- - - -

personnel screening criteria - as required by specific information

-
-
-
- - - -

eight (8) hours

-
-
-
- - - -

access control personnel responsible for disabling access to the system

-
-
-
- - - -

twenty-four (24) hours

-
-
-
- - - -

twenty-four (24) hours

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually and any time there is a change to the user's level of access

-
-
-
- - - -

terminations: immediately; transfers: within twenty-four (24) hours

-
-
-
- - - -

at a minimum, the ISSO and/or similar role within the organization

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

security assessment report

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

annually

-
-
-
- - - -

monthly operating system/infrastructure; monthly web applications and databases

-
-
-
- - - -

high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery

-
-
-
- - - -

prior to a new scan

-
-
-
- - - -

notify appropriate service provider personnel and follow procedures for organization and service provider-defined corrective actions

-
-
-
- - - -

operating systems / web applications / databases

-
-
-
- - - -

all scans

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at a minimum to include security-relevant external system interfaces; high-level design; low-level design; source code or network and data flow diagram; [organization-defined design/implementation information]

-
-
-
- - - -

at least the minimum requirement as defined in control CA-7

-
-
-
- - - -

at a minimum, the ISSO (or similar role within the organization)

-
-
-
- - - -

FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system

-
-
-
- - - -

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

-
-
-
- - - -

all external systems where Federal information is processed or stored

-
-
-
- - - -

all external systems where Federal information is processed or stored

-
-
-
- - - -

information processing, information data, AND information services

-
-
-
- - - -

U.S./U.S. Territories or geographic locations where there is U.S. jurisdiction

-
-
-
- - - -

all High Impact Data, Systems, or Services

-
-
-
- - - -

development, implementation, AND operation

-
-
-
- - - -

organization and service provider-defined personnel security requirements, approved HW/SW vendor list/process, and secure SDLC procedures

-
-
-
- - - -

as needed and as dictated by the current threat posture

-
-
-
- - - -

organization and service provider- defined security requirements

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

at least every ninety (90) days or whenever there is a change in the threat environment that warrants a review of the exceptions

-
-
-
- - - -

Host Intrusion Prevention System (HIPS), Host Intrusion Detection System (HIDS), or minimally a host-based firewall

-
-
-
- - - -

confidentiality AND integrity

-
-
-
- - - -

prevent unauthorized disclosure of information AND detect changes to information

-
-
-
- - - -

a hardened or alarmed carrier Protective Distribution System (PDS)

-
-
-
- - - -

no longer than ten (10) minutes for privileged sessions and no longer than fifteen (15) minutes for user sessions

-
-
-
- - - -

NIST FIPS-compliant

-
-
-
- - - -

FIPS-validated or NSA-approved cryptography

-
-
-
- - - -

no exceptions

-
-
-
- - - -

confidentiality AND integrity

-
-
-
- - - -

all information system components storing customer data deemed sensitive

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or whenever a significant change occurs

-
-
-
- - - -

thirty (30) days of release of updates

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least weekly

-
-
-
- - - -

to include endpoints

-
-
-
- - - -

to include blocking and quarantining malicious code and alerting administrator or defined security personnel near-realtime

-
-
-
- - - -

continuously

-
-
-
- - - -

to include US-CERT

-
-
-
- - - -

to include system security personnel and administrators with configuration/patch-management responsibilities

-
-
-
- - - -

to include upon system startup and/or restart

-
-
-
- - - -

at least monthly

-
-
-
- - - -

to include system administrators and security personnel

-
-
-
- - - -

to include notification of system administrators and security personnel

-
-
-
- - - -

selection to include security relevant events

-
-
-
- - - -

at least monthly

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-12 (1) Additional FedRAMP Requirements and Guidance - - -

https://www.owasp.org/index.php/Testing_for_logout_functionality_%28OTG-SESS-006%29

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (10) Additional FedRAMP Requirements and Guidance - - -

Required if shared/group accounts are deployed

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - AC-2 (12) Additional FedRAMP Requirements and Guidance - - -

Required for privileged accounts.

-
- - -

Required for privileged accounts.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (3) Additional FedRAMP Requirements and Guidance - - -

The service provider defines the time period for non-user accounts (e.g., - accounts associated with devices). The time periods are approved and - accepted by the JAB/AO. Where user management is a function of the - service, reports of activity of consumer users shall be made - available.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - AC-2 (5) Additional FedRAMP Requirements and Guidance - - -

Should use a shorter timeframe than AC-12.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (9) Additional FedRAMP Requirements and Guidance - - -

Required if shared/group accounts are deployed

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-5 Additional FedRAMP Requirements and Guidance - - -

Guidance: CSPs have the option to provide a separation of duties matrix - as an attachment to the SSP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-6 (2) Additional FedRAMP Requirements and Guidance - - -

Examples of security functions include but are not limited to: - establishing system accounts, configuring access authorizations (i.e., - permissions, privileges), setting events to be audited, and setting - intrusion detection parameters, system programming, system and security - administration, other privileged functions.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-8 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine elements of the cloud environment - that require the System Use Notification control. The elements of the - cloud environment that require System Use Notification are approved and - accepted by the JAB/AO.

-
- - -

The service provider shall determine how System Use Notification is going - to be verified and provide appropriate periodicity of the check. The - System Use Notification verification and periodicity are approved and - accepted by the JAB/AO.

-
- - -

If performed as part of a Configuration Baseline - check, then the % of items requiring setting that are checked and that - pass (or fail) check can be provided.

-
- - -

If not performed as part of a Configuration Baseline check, then there - must be documented agreement on how to provide results of verification - and the necessary periodicity of the verification by the service - provider. The documented agreement on how to provide verification of the - results are approved and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-11 Additional FedRAMP Requirements and Guidance - - -

The service provider retains audit records on-line for at least ninety - days and further preserves audit records off-line for a period that is - in accordance with NARA requirements.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-2 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - AU-2 (3) Additional FedRAMP Requirements and Guidance - - -

Annually or whenever changes in the threat environment are communicated - to the service provider by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - AU-3 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider defines audit record types [FedRAMP Assignment: - session, connection, transaction, or activity duration; for - client-server transactions, the number of bytes received and bytes - sent; additional informational messages to diagnose or identify the - event; characteristics that describe or identify the object or - resource being acted upon; individual identities of group account - users; full-text of privileged commands]. The audit record - types are approved and accepted by the JAB/AO.

-
- - -

For client-server transactions, the number of bytes sent and received - gives bidirectional transfer information that can be helpful during an - investigation or inquiry.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-6 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO. In multi-tennant environments, capability - and means for providing review, analysis, and reporting to consumer for - data pertaining to consumer shall be documented.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-6 (6) Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-8 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider selects primary and secondary time servers used by - the NIST Internet time service. The secondary server is selected from a - different geographic region than the primary server.

-
- - -

The service provider synchronizes the system clocks of network computers - that run operating systems other than Windows to the Windows Server - Domain Controller emulator or to the same time source for that - server.

-
- - -

Synchronization of system clocks improves the accuracy of log - analysis.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-2 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-2 (1) Additional FedRAMP Requirements and Guidance - - -

For JAB Authorization, must use an accredited Third Party Assessment - Organization (3PAO).

-
-
-
- - - - - - - - - - - - -
- - - - CA-2 (2) Additional FedRAMP Requirements and Guidance - - -

To include 'announced', 'vulnerability scanning'

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-3 (3) Additional FedRAMP Requirements and Guidance - - -

Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference - Architecture document.

-
-
-
- - - - - - - - - - - - - - - - - -
- - - - CA-3 (5) Additional FedRAMP Requirements and Guidance - - -

For JAB Authorization, CSPs shall include details of this control in - their Architecture Briefing

-
-
-
- - - - - - - - - - - - - - - -
- - - - CA-5 Additional FedRAMP Requirements and Guidance - - -

Plan of Action & Milestones (POA&M) must be provided at least - monthly.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Plan of Action & Milestones (POA&M) Template - Completion Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-6(c) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F. The service provider describes the types of changes to - the information system or the environment of operations that would - impact the risk posture. The types of changes are approved and accepted - by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-7 Additional FedRAMP Requirements and Guidance - - -

Operating System Scans: at least monthly. Database and Web Application - Scans: at least monthly. All scans performed by Independent Assessor: at - least annually.

-
- - -

CSPs must provide evidence of closure and remediation of high - vulnerabilities within the timeframe for standard POA&M updates.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-8 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Penetration Test Guidance https://www.FedRAMP.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-8 Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F, page F-7.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-3 Additional FedRAMP Requirements and Guidance - - -

The service provider establishes a central means of communicating major - changes to or developments in the information system or environment of - operations that may affect its services to the federal government and - associated service consumers (e.g., electronic bulletin board, web - status page). The means of communication are approved and accepted by - the JAB/AO.

-
- - -

In accordance with record retention policies and procedures.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-5 (3) Additional FedRAMP Requirements and Guidance - - -

If digital signatures/certificates are unavailable, alternative - cryptographic integrity checks (hashes, self-signed certs, etc.) can be - utilized.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-6(a) Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish configuration settings or establishes - its own configuration settings if USGCB is not available.

-
- - -

The service provider shall ensure that checklists for configuration - settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or - SCAP compatible (if validated checklists are not available).

-
- - -

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-7 Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish list of prohibited or restricted - functions, ports, protocols, and/or services or establishes its own list - of prohibited or restricted functions, ports, protocols, and/or services - if USGCB is not available.

-
- - -

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc. - Partially derived from AC-17(8).

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-7 (2) Additional FedRAMP Requirements and Guidance - - -

This control shall be implemented in a technical manner on the - information system to only allow programs to run that adhere to the - policy (i.e. white listing). This control is not to be based off of - strictly written policy on what is allowed or not allowed to run.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-8 Additional FedRAMP Requirements and Guidance - - -

Must be provided at least monthly or when there is a change.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-2 Additional FedRAMP Requirements and Guidance - - -

For JAB authorizations the contingency lists include designated FedRAMP - personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-4(a) Additional FedRAMP Requirements and Guidance - - -

The service provider develops test plans in accordance with NIST Special - Publication 800-34 (as amended); plans are approved by the JAB/AO prior - to initiating testing.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-7 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a time period consistent with the recovery - time objectives and business impact analysis.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CP-7 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider may determine what is considered a sufficient degree - of separation between the primary and alternate processing sites, based - on the types of threats that are of concern. For one particular type of - threat (i.e., hostile cyber attack), the degree of separation between - sites will be less relevant.

-
-
-
- - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-8 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a time period consistent with the recovery - time objectives and business impact analysis.

-
-
-
- - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-9 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine what elements of the cloud - environment require the Information System Backup control. The service - provider shall determine how Information System Backup is going to be - verified and appropriate periodicity of the check.

-
- - -

The service provider maintains at least three backup copies of user-level - information (at least one of which is available online).

-
- - -

The service provider maintains at least three backup copies of - system-level information (at least one of which is available - online).

-
- - -

The service provider maintains at least three backup copies of - information system documentation including security information (at - least one of which is available online).

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-2 (11) Additional FedRAMP Requirements and Guidance - - -

PIV=separate device. Please refer to NIST SP 800-157 Guidelines for - Derived Personal Identity Verification (PIV) Credentials.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-2 (12) Additional FedRAMP Requirements and Guidance - - -

Include Common Access Card (CAC), i.e., the DoD technical implementation - of PIV/FIPS 201/HSPD-12.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-4(e) Additional FedRAMP Requirements and Guidance - - -

The service provider defines the time period of inactivity for device - identifiers.

-
- - -

For DoD clouds, see DoD cloud website for specific DoD requirements that - go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - IA-5 Additional FedRAMP Requirements and Guidance - - -

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity - Guidelines IAL, AAL, FAL level 3. Link https://pages.nist.gov/800-63-3.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-5 (1), (a) and (d) Additional FedRAMP Requirements and - Guidance - - -

If password policies are compliant with NIST SP 800-63B Memorized Secret - (Section 5.1.1) Guidance, the control may be considered compliant.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-5 (4) Additional FedRAMP Requirements and Guidance - - -

If automated mechanisms which enforce password authenticator strength at - creation are not used, automated mechanisms must be used to audit - strength of created password authenticators.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-3 Additional FedRAMP Requirements and Guidance - - -

The service provider defines tests and/or exercises in accordance with - NIST Special Publication 800-61 (as amended). Functional Testing must occur prior to - testing for initial authorization. Annual functional testing may be concurrent with - required penetration tests (see CA-8). The service provider provides test plans to the - JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test - commencing.

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - IR-4 Additional FedRAMP Requirements and Guidance - - -

The service provider ensures that individuals conducting incident - handling meet personnel security requirements commensurate with the - criticality/sensitivity of the information being processed, stored, and - transmitted by the information system.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-6 Additional FedRAMP Requirements and Guidance - - -

Report security incident information according to FedRAMP Incident - Communications Procedure.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-8 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
- - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MP-3 Additional FedRAMP Requirements and Guidance - - -

Second parameter not-applicable

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - -
- - - - MP-4 Additional FedRAMP Requirements and Guidance - - -

The service provider defines controlled areas within facilities where the - information and information system reside.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - MP-5 Additional FedRAMP Requirements and Guidance - - -

The service provider defines security measures to protect digital and - non-digital media in transport. The security measures are approved and - accepted by the JAB.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MP-6 (2) Additional FedRAMP Requirements and Guidance - - -

Equipment and procedures may be tested or validated for effectiveness

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PE-14(a) Additional FedRAMP Requirements and Guidance - - -

The service provider measures temperature at server inlets and humidity - levels by dew point.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PL-8(b) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F, page F-7.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RA-3 Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F

-
- - -

Include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - RA-5(a) Additional FedRAMP Requirements and Guidance - -

An accredited independent assessor scans operating systems/infrastructure, - web applications, and databases once annually.

-
- - RA-5(e) Additional FedRAMP Requirements and Guidance - -

To include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
- - RA-5 Additional FedRAMP Requirements and Guidance - - -

- See the FedRAMP Documents page under Key Cloud Service Provider - (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - RA-5 (10) Additional FedRAMP Requirements and Guidance - - -

If multiple tools are not used, this control is not applicable.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RA-5 (6) Additional FedRAMP Requirements and Guidance - - -

Include in Continuous Monitoring ISSO digest/report to JAB/AO

-
-
-
- - - - - - - - - -
- - - - RA-5 (8) Additional FedRAMP Requirements and Guidance - - -

This enhancement is required for all high vulnerability scan - findings.

-
- - -

While scanning tools may label findings as high or critical, the intent - of the control is based around NIST's definition of high - vulnerability.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-10 Additional FedRAMP Requirements and Guidance - - -

For JAB authorizations, track security flaws and flaw resolution within - the system, component, or service and report findings to - organization-defined personnel, to include FedRAMP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-11 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider documents in the Continuous Monitoring Plan, how - newly developed code for the information system is reviewed.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - SA-11 (8) Additional FedRAMP Requirements and Guidance - - -

The service provider documents in the Continuous Monitoring Plan, how - newly developed code for the information system is reviewed.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-4 Additional FedRAMP Requirements and Guidance - - -

The service provider must comply with Federal Acquisition Regulation - (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense - Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, - which implements Section 889 (as well as any added updates related to FISMA to - address security concerns in the system acquisitions process).

-
- - -

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly - preferred. See https://www.niap-ccevs.org/Product/.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-4 (8) Additional FedRAMP Requirements and Guidance - - -

CSP must use the same security standards regardless of where the system - component or information system service is acquired.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-12 Additional FedRAMP Requirements and Guidance - - -

Federally approved and validated cryptography.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-15 Additional FedRAMP Requirements and Guidance - - -

The information system provides disablement (instead of physical - disconnect) of collaborative computing devices in a manner that supports - ease of use.

-
-
-
- - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-28 Additional FedRAMP Requirements and Guidance - - -

The organization supports the capability to use cryptographic mechanisms - to protect information at rest.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-7 (13) Additional FedRAMP Requirements and Guidance - - -

The service provider defines key information security tools, mechanisms, - and support components associated with system and security - administration and isolates those tools, mechanisms, and support - components from other internal information system components via - physically or logically separate subnets.

-
- - -

Examples include: information security tools, mechanisms, and support - components such as, but not limited to PKI, patching infrastructure, - cyber defense tools, special purpose gateway, vulnerability tracking - systems, internet access points (IAPs); network element and data center - administrative/management traffic; Demilitarized Zones (DMZs), Server - farms/computing centers, centralized audit log servers etc.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SI-4 Additional FedRAMP Requirements and Guidance - - -

See US-CERT Incident Response Reporting Guidelines.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SI-4 (5) Additional FedRAMP Requirements and Guidance - - -

In accordance with the incident response plan.

-
-
-
- - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - FedRAMP Applicable Laws and Regulations - - - - FedRAMP Master Acronym and Glossary - - - - -

FedRAMP Logo

-
- - -
- - NIST Special Publication (SP) 800-53 - - - - - -
-
diff --git a/src/content/rev5/baselines/xml/FedRAMP_rev4_LI-SaaS-baseline_profile.xml b/src/content/rev5/baselines/xml/FedRAMP_rev4_LI-SaaS-baseline_profile.xml deleted file mode 100644 index cbdc8e26f..000000000 --- a/src/content/rev5/baselines/xml/FedRAMP_rev4_LI-SaaS-baseline_profile.xml +++ /dev/null @@ -1,3929 +0,0 @@ - - - - - - FedRAMP Rev 4 Tailored Low Impact Software as a Service (LI-SaaS) Baseline - 2021-02-17T00:00:00.000-04:00 - 2021-06-09T14:28:03.343-04:00 - fedramp1.1.0-oscal1.0.0 - 1.0.0 - - Document creator - - - The FedRAMP Program Management Office (PMO) - CSP - - - The FedRAMP Joint Authorization Board (JAB) - CSP - - - Federal Risk and Authorization Management Program: Program Management Office - FedRAMP PMO - - - - - info@fedramp.gov -
- 1800 F St. NW - Washington - DC - 20006 - US -
-
- - Federal Risk and Authorization Management Program: Joint Authorization Board - FedRAMP JAB - - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - ca9ba80e-1342-4bfd-b32a-abac468c24b4 - -
- - - ac-1 - ac-2 - ac-3 - ac-7 - ac-8 - ac-14 - ac-17 - ac-18 - ac-19 - ac-20 - ac-22 - at-1 - at-2 - at-3 - at-4 - au-1 - au-2 - au-3 - au-4 - au-5 - au-6 - au-8 - au-9 - au-11 - au-12 - ca-1 - ca-2 - ca-2.1 - ca-3 - ca-5 - ca-6 - ca-7 - ca-9 - cm-1 - cm-2 - cm-4 - cm-6 - cm-7 - cm-8 - cm-10 - cm-11 - cp-1 - cp-2 - cp-3 - cp-4 - cp-9 - cp-10 - ia-1 - ia-2 - ia-2.1 - ia-2.12 - ia-4 - ia-5 - ia-5.1 - ia-5.11 - ia-6 - ia-7 - ia-8 - ia-8.1 - ia-8.2 - ia-8.3 - ia-8.4 - ir-1 - ir-2 - ir-4 - ir-5 - ir-6 - ir-7 - ir-8 - ir-9 - ma-1 - ma-2 - ma-4 - ma-5 - mp-1 - mp-2 - mp-6 - mp-7 - pe-1 - pe-2 - pe-3 - pe-6 - pe-8 - pe-12 - pe-13 - pe-14 - pe-15 - pe-16 - pl-1 - pl-2 - pl-4 - ps-1 - ps-2 - ps-3 - ps-4 - ps-5 - ps-6 - ps-7 - ps-8 - ra-1 - ra-2 - ra-3 - ra-5 - sa-1 - sa-2 - sa-3 - sa-4 - sa-4.10 - sa-5 - sa-9 - sc-1 - sc-5 - sc-7 - sc-12 - sc-13 - sc-15 - sc-20 - sc-21 - sc-22 - sc-39 - si-1 - si-2 - si-3 - si-4 - si-5 - si-12 - - - - - true - - - - - - -

at least quarterly

-
-
-
- - - - -

organization-defined actions to be taken (overwrite oldest record)

-
-
-
- - - - -

at least weekly

-
-
-
- - - - -

at least annually

-
-
-
- - - -

individuals or roles to include FedRAMP PMO

-
-
-
- - - - - -

at least annually and on input from FedRAMP

-
-
-
- - - - -

at least monthly

-
-
-
- - - - -

at least every three years or when a significant change occurs

-
-
-
- - - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - - -

see CM-6(a) Additional FedRAMP Requirements and Guidance

-
-
-
- - - - -

at least monthly

-
-
-
- - - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - - -

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

-
-
-
- - - - -

at least annually

-
-
-
- - - - -

CSP defined physical access control systems/devices AND guards

-
-
-
- - - -

in all circumstances within restricted access area where the information system resides

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - - -

at least monthly

-
-
-
- - - - -

for a minimum of one (1) year

-
-
-
- - - -

at least monthly

-
-
-
- - - - -

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

-
-
-
- - - -

continuously

-
-
-
- - - - -

all information system components

-
-
-
- - - - -

at least annually

-
-
-
- - - - -

For national security clearances; a reinvestigation is required during the 5th year for top secret security clearance, the 10th year for secret security clearance, and 15th year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year. There is no reinvestigation for other moderate risk positions or any low risk positions.

-
-
-
- - - - -

security assessment report

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - - -

monthly operating system/infrastructure; monthly web applications and databases

-
-
-
- - - -

[high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery.

-
-
-
- - - - -

FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system

-
-
-
- - - -

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

-
-
-
- - - - -

FIPS-validated or NSA-approved cryptography

-
-
-
- - - - -

within 30 days of release of updates

-
-
-
- - - - -

at least weekly

-
-
-
- - - -

to include endpoints

-
-
-
- - - -

to include alerting administrator or defined security personnel

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 Additional FedRAMP Requirements and Guidance - - -

Parts (b), (c), (d), (e), (i), (j), and (k) are excluded from FedRAMP Tailored - for LI-SaaS.

-
-
-
- - - - - - - -

Determine if the organization defines information system account types to be identified and selected to support organizational missions/business functions.

-
- - - -

Access control policy; procedures addressing account management; security plan; information system design documentation; information system configuration settings and associated documentation; list of active system accounts along with the name of the individual associated with each account; list of conditions for group and role membership; notifications or records of recently transferred, separated, or terminated employees; list of recently disabled information system accounts along with the name of the individual associated with each account; access authorization records; account management compliance reviews; information system monitoring records; information system audit records; other relevant documents or records.

-
-
- - - -

Organizational personnel with account management responsibilities; system/network administrators; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for account management on the information system; automated mechanisms for implementing account management.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the information system enforces approved authorizations for logical access to information and system resources in accordance with applicable access control policies.

-
- - - -

Access control policy; procedures addressing access enforcement; information system design documentation; information system configuration settings and associated documentation; list of approved authorizations (user privileges); information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with access enforcement responsibilities; system/network administrators; organizational personnel with information security responsibilities; and system developers.

-
-
- - - -

Automated mechanisms implementing access control policy.

-
-
-
-
- - - - - - - - -

NSO for non-privileged users. Attestation for privileged users related to - multi-factor identification and authentication.

-
-
-
- - - - - - - -

FED - This is related to agency data and agency policy solution.

-
-
-
- - - - - - - -

FED - This is related to agency data and agency policy solution.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization authorizes remote access to the information system prior to allowing such connections

-
- - - -

Access control policy; procedures addressing remote access implementation and usage (including restrictions); configuration management plan; security plan; information system configuration settings and associated documentation; remote access authorizations; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with responsibilities for managing remote access connections; system/network administrators; and organizational personnel with information security responsibilities.

-
-
- - - -

Remote access management capability for the information system.

-
-
-
-
- - - - - - - -

NSO - All access to Cloud SaaS are via web services and/or API. The device - accessed from or whether via wired or wireless connection is out of scope. - Regardless of device accessed from, must utilize approved remote access methods - (AC-17), secure communication with strong encryption (SC-13), key management - (SC-12), and multi-factor authentication for privileged access (IA-2[1]).

-
-
-
- - - - - - - -

NSO - All access to Cloud SaaS are via web service and/or API. The device accessed - from is out of the scope. Regardless of device accessed from, must utilize - approved remote access methods (AC-17), secure communication with strong - encryption (SC-13), key management (SC-12), and multi-factor authentication for - privileged access (IA-2 [1]).

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization designates individuals authorized to post information onto a publicly accessible information system.

-
- - - -

Access control policy; procedures addressing publicly accessible content; list of users authorized to post publicly accessible content on organizational information systems; training materials and/or records; records of publicly accessible information reviews; records of response to nonpublic information on public websites; system audit logs; security awareness training records; other relevant documents or records Interview - Organizational personnel with responsibilities for managing remote access connections; system/network administrators; and organizational personnel with information security responsibilities.

-
-
- - - -

Organizational personnel with responsibilities for managing publicly accessible information posted on organizational information systems; and organizational personnel with information security responsibilities.

-
-
- - - -

Automated mechanisms implementing management of publicly accessible content.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the information system:

-

Generates audit records containing information that establishes:

-
    -
  • What type of event occurred
  • -
  • When the event occurred
  • -
  • Where the event occurred
  • -
  • The source of the event
  • -
  • The outcome of the event
  • -
  • The identity of any individuals or subjects associated with the event
  • -
-
- - - -

Audit and accountability policy; procedures addressing content of audit records; information system design documentation; information system configuration settings and associated documentation; list of organization-defined auditable events; information system audit records; information system incident reports; and other relevant documents or records.

-
-
- - - -

Organizational personnel with audit and accountability responsibilities; organizational personnel with information security responsibilities; and system/network administrators.

-
-
- - - -

Automated mechanisms implementing information system auditing of auditable events.

-
-
-
-
- - - - - - - -

NSO - Loss of availability of the audit data has been determined to have little or - no impact to government business/mission needs.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization defines the personnel or roles to be alerted in the event of an audit processing failure.

-
- - - -

Audit and accountability policy; procedures addressing response to audit processing failures; information system design documentation; security plan; information system configuration settings and associated documentation; list of personnel to be notified in case of an audit processing failure; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with responsibilities for managing remote access connections; system/network administrators; and organizational personnel with information security responsibilities.

-

Organizational personnel with audit and accountability responsibilities; organizational personnel with information security responsibilities; and system/network administrators; system developers.

-
-
- - - -

Automated mechanisms implementing information system response to audit processing failures.

-
-
-
-
- - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines the types of inappropriate or unusual activity to look for when information system audit records are reviewed and analyzed.
  • -
  • Defines the frequency to review and analyze information system audit records for indications of organization-defined inappropriate or unusual activity.
  • -
  • Reviews and analyzes information system audit records for indications of organization-defined inappropriate or unusual activity with the organization-defined frequency.
  • -
  • Defines personnel or roles to whom findings resulting from reviews and analysis of information system audit records are to be reported.
  • -
  • Reports findings to organization-defined personnel or roles.
  • -
-
- - - -

Audit and accountability policy; procedures addressing audit review, analysis, and reporting; reports of audit findings; records of actions taken in response to reviews/analyses of audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with audit review, analysis, and reporting responsibilities; and organizational personnel with information security responsibilities.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -

NSO - Loss of availability of the audit data has been determined as little or no - impact to government business/mission needs.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Develops a security assessment plan that describes the scope of the assessment including:
  • -
  • -
      -
    • Security controls and control enhancements under assessment.
    • -
    • Assessment procedures to be used to determine security control effectiveness.
    • -
    • Assessment environment.
    • -
    • Assessment team.
    • -
    • Assessment roles and responsibilities.
    • -
    -
  • -
  • Defines the frequency to assess the security controls in the information system and its environment of operation.
  • -
  • Assesses the security controls in the information system with the organization-defined frequency to determine the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting established security requirements.
  • -
  • Produces a security assessment report that documents the results of the assessment.
  • -
  • Defines individuals or roles to whom the results of the security control assessment are to be provided.
  • -
  • Provides the results of the security control assessment to organization-defined individuals or roles. -
  • -
-
- - - -

Security assessment and authorization policy; procedures addressing security assessment planning; procedures addressing security assessments; security assessment plan; and other relevant documents or records.

-
-
- - - -

Organizational personnel with security assessment responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Automated mechanisms supporting security assessment, security assessment plan development, and/or security assessment reporting.

-
-
- - CA-2 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/ -

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Authorizes connections from the information system to other information systems through the use of Interconnection Security Agreements.
  • -
  • Documents, for each interconnection:
  • -
  • -
      -
    • The interface characteristics;
    • -
    • The security requirements; and
    • -
    • The nature of the information communicated.
    • -
    -
  • -
  • Defines the frequency to review and update Interconnection Security Agreements.
  • -
  • Reviews and updates Interconnection Security Agreements with the organization-defined frequency.
  • -
-
- - - -

Access control policy; procedures addressing information system connections; system and communications protection policy; security plan; information system design documentation; information system configuration settings and associated documentation; list of components or classes of components authorized as system interconnections; security assessment report; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with responsibility for developing, implementing, or authorizing system interconnections; organizational personnel with information security responsibilities.

-
-
- -

Condition: There are connection(s) to external systems. Connections (if any) shall - be authorized and must: 1) Identify the interface/connection. 2) Detail what data - is involved and its sensitivity. 3) Determine whether the connection is one-way or - bi-directional. 4) Identify how the connection is secured.

-
-
-
- - - - - - - -

Attestation - for compliance with FedRAMP Tailored LI-SaaS Continuous Monitoring - Requirements.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Assigns a senior-level executive or manager as the authorizing official for the information system.
  • -
  • Ensures that the authorizing official authorizes the information system for processing before commencing operations.
  • -
  • Defines the frequency to update the security authorization.
  • -
  • Updates the security authorization with the organization-defined frequency.
  • -
-
- - - -

Security assessment and authorization policy; procedures addressing security authorization; security authorization package (including security plan; security assessment report; plan of action and milestones; authorization statement); and other relevant documents or records.

-
-
- - - -

Organizational personnel with security authorization responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Automated mechanisms that facilitate security authorizations and updates.

-
-
- - CA-6(c) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision 1, - Appendix F. The service provider describes the types of changes to the - information system or the environment of operations that would impact the risk - posture. The types of changes are approved and accepted by the Authorizing - Official.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Develops a continuous monitoring strategy that defines metrics to be monitored.
  • -
  • Develops a continuous monitoring strategy that includes monitoring of organization-defined metrics.
  • -
  • Implements a continuous monitoring program that includes monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that defines frequencies for monitoring and defines frequencies for assessments supporting monitoring.
  • -
  • Develops a continuous monitoring strategy that includes establishment of the organization-defined frequencies for monitoring and for assessments supporting monitoring.
  • -
  • Implements a continuous monitoring program that includes establishment of organization-defined frequencies for monitoring and for assessments supporting such monitoring in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that includes ongoing security control assessments.
  • -
  • Implements a continuous monitoring program that includes ongoing security control assessments in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that includes ongoing security status monitoring of organization-defined metrics.
  • -
  • Implements a continuous monitoring program that includes ongoing security status monitoring of organization-defined metrics in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that includes correlation and analysis of security-related information generated by assessments and monitoring.
  • -
  • Implements a continuous monitoring program that includes correlation and analysis of security-related information generated by assessments and monitoring in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that includes response actions to address results of the analysis of security-related information.
  • -
  • Implements a continuous monitoring program that includes response actions to address results of the analysis of security-related information in accordance with the organizational continuous monitoring strategy.
  • -
  • Develops a continuous monitoring strategy that defines the personnel or roles to whom the security status of the organization and information system are to be reported.
  • -
  • Develops a continuous monitoring strategy that defines the frequency to report the security status of the organization and information system to organization-defined personnel or roles.
  • -
  • Develops a continuous monitoring strategy that includes reporting the security status of the organization or information system to organizational-defined personnel or roles with the organization-defined frequency.
  • -
  • Implements a continuous monitoring program that includes reporting the security status of the organization and information system to organization-defined personnel or roles with the organization-defined frequency in accordance with the organizational continuous monitoring strategy.
  • -
-
- - - -

Security assessment and authorization policy; procedures addressing continuous monitoring of information system security controls; procedures addressing configuration management; security plan; security assessment report; plan of action and milestones; information system monitoring records; configuration management records, security impact analyses; status reports; and other relevant documents or records.

-
-
- - - -

Organizational personnel with continuous monitoring responsibilities; organizational personnel with information security responsibilities; and system/network administrators.

-
-
- - - -

Mechanisms implementing continuous monitoring.

-
-
- - CA-7 Additional FedRAMP Requirements and Guidance - - -

CSPs must provide evidence of closure and remediation of high vulnerabilities - within the timeframe for standard POA&M updates.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/ -

-
-
-
-
- - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines information system components or classes of components to be authorized as internal connections to the information system.
  • -
  • Authorizes internal connections of organization-defined information system components or classes of components to the information system.
  • -
  • Documents, for each internal connection:
  • -
  • -
      -
    • The interface characteristics;
    • -
    • The security requirements; and
    • -
    • The nature of the information communicated.
    • -
    -
  • -
-
- - - -

Access control policy; procedures addressing information system connections; system and communications protection policy; security plan; information system design documentation; information system configuration settings and associated documentation; list of components or classes of components authorized as internal system connections; security assessment report; information system audit records; and other relevant documents or records.

-
-
- - - -

9.a.2 only: Organizational personnel with responsibility for developing, implementing, or authorizing internal system connections; organizational personnel with information security responsibilities.

-
-
- -

Condition: There are connection(s) to external systems. Connections (if any) shall - be authorized and must: 1) Identify the interface/connection. 2) Detail what data - is involved and its sensitivity. 3) Determine whether the connection is one-way or - bi-directional. 4) Identify how the connection is secured.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization analyzes changes to the information system to determine potential security impacts prior to change implementation.

-
- - - -

Configuration management policy; procedures addressing security impact analysis for changes to the information system; configuration management plan; security impact analysis documentation; analysis tools and associated outputs; change control records; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with responsibility for conducting security impact analysis; organizational personnel with information security responsibilities; and system/network administrators.

-
-
- - - -

Organizational processes for security impact analysis.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines security configuration checklists to be used to establish and document configuration settings for the information technology products employed.
  • -
  • Ensures the defined security configuration checklists reflect the most restrictive mode consistent with operational requirements.
  • -
  • Establishes and documents configuration settings for information technology products employed within the information system using organization-defined security configuration checklists.
  • -
  • Implements the configuration settings established/documented in CM-6(a).
  • -
  • Defines information system components for which any deviations from established configuration settings must be:
  • -
  • -
      -
    • Identified;
    • -
    • Documented; and
    • -
    • Approved.
    • -
    -
  • -
  • Defines operational requirements to support:
  • -
  • -
      -
    • The identification of any deviations from established configuration settings;
    • -
    • The documentation of any deviations from established configuration settings; and
    • -
    • The approval of any deviations from established configuration settings.
    • -
    -
  • -
  • Identifies any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements.
  • -
  • Approves any deviations from established configuration settings for organization-defined information system components based on organizational-defined operational requirements.
  • -
  • Monitors changes to the configuration settings in accordance with organizational policies and procedures.
  • -
  • Controls changes to the configuration settings in accordance with organizational policies and procedures.
  • -
-
- - - -

Configuration management policy; procedures addressing configuration settings for the information system; configuration management plan; security plan; information system design documentation; information system configuration settings and associated documentation; security configuration checklists; evidence supporting approved deviations from established configuration settings; change control records; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with security configuration management responsibilities; organizational personnel with information security responsibilities; and system/network administrators.

-
-
- - - -

Organizational processes for managing configuration settings; automated mechanisms that implement, monitor, and/or control information system configuration settings; and automated mechanisms that identify and/or document deviations from established configuration settings.

-
-
- -

Required - Specifically include details of least functionality.

-
- - CM-6(a) Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security guidelines - (Level 1) to establish configuration settings or establishes its own - configuration settings if USGCB is not available.

-
- - -

The service provider shall ensure that checklists for configuration settings - are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or SCAP - compatible (if validated checklists are not available).

-
- - -

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Develops and documents an inventory of information system components that accurately reflects the current information system.
  • -
  • Develops and documents an inventory of information system components that includes all components within the authorization boundary of the information system.
  • -
  • Develops and documents an inventory of information system components that is at the level of granularity deemed necessary for tracking and reporting.
  • -
  • Defines the information deemed necessary to achieve effective information system component accountability.
  • -
  • Develops and documents an inventory of information system components that includes organization-defined information deemed necessary to achieve effective information system component accountability.
  • -
  • Defines the frequency to review and update the information system component inventory.
  • -
  • Reviews and updates the information system component inventory with the organization-defined frequency.
  • -
-
- - - -

Configuration management policy; procedures addressing information system component inventory; configuration management plan; security plan; information system inventory records; inventory reviews and update records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with responsibilities for information system component inventory; organizational personnel with information security responsibilities; and system/network administrators.

-
-
- - - -

Organizational processes for developing and documenting an inventory of information system components; automated mechanisms supporting and/or implementing the information system component inventory.

-
-
- - CM-8 Additional FedRAMP Requirements and Guidance - - -

Must be provided at least monthly or when there is a change.

-
-
-
-
- - - - - - - -

NSO- Not directly related to protection of the data.

-
-
-
- - - - - - - -

NSO - Boundary is specific to SaaS environment; all access is via web services; - users' machine or internal network are not contemplated. External services (SA-9), - internal connection (CA-9), remote access (AC-17), and secure access (SC-12 and - SC-13), and privileged authentication (IA-2[1]) are considerations.

-
-
-
- - - - - - - - - - - - - - - -

NSO - Loss of availability of the SaaS has been determined as little or no impact - to government business/mission needs.

-
-
-
- - - - - - - -

NSO - Loss of availability of the SaaS has been determined as little or no impact - to government business/mission needs.

-
-
-
- - - - - - - -

NSO - Loss of availability of the SaaS has been determined as little or no impact - to government business/mission needs.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of user-level information contained in the information system.
  • -
  • Conducts backups of user-level information contained in the information system with the organization-defined frequency.
  • -
  • Defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of system-level information contained in the information system.
  • -
  • Conducts backups of system-level information contained in the information system with the organization-defined frequency.
  • -
  • Defines a frequency, consistent with recovery time objectives and recovery point objectives as specified in the information system contingency plan, to conduct backups of information system documentation including security-related documentation.
  • -
  • Conducts backups of information system documentation, including security-related documentation, with the organization-defined frequency.
  • -
  • Protects the confidentiality, integrity, and availability of backup information at storage locations.
  • -
-
- - - -

Contingency planning policy; procedures addressing information system backup; contingency plan; backup storage location(s);information system backup logs or records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information system backup responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for conducting information system backups; automated mechanisms supporting and/or implementing information system backups.

-
-
-
- - - CP-9 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine what elements of the cloud environment - require the Information System Backup control. The service provider shall - determine how Information System Backup is going to be verified and appropriate - periodicity of the check.

-
- - -

The service provider maintains at least three backup copies of user-level - information (at least one of which is available online).

-
- - -

The service provider maintains at least three backup copies of system-level - information (at least one of which is available online).

-
- - -

The service provider maintains at least three backup copies of information - system documentation including security information (at least one of which is - available online).

-
-
-
-
- - - - - - - -

NSO - Loss of availability of the SaaS has been determined as little or no impact - to government business/mission needs.

-
-
-
- - - - - - - - - - - - - - - - -

NSO for non-privileged users. Attestation for privileged users related to - multi-factor identification and authentication - specifically include description - of management of service accounts.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization implements multifactor authentication for network access to privileged accounts.

-
- - - -

Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; list of information system accounts; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information system operations responsibilities; organizational personnel with account management responsibilities; organizational personnel with information security responsibilities; and system/network administrators; system developer.

-
-
- - - -

Automated mechanisms supporting and/or implementing multifactor authentication capability.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the information system:

-
    -
  • Accepts PIV credentials.
  • -
  • Electronically verifies PIV credentials.
  • -
-
- - - -

Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; PIV verification records; evidence of PIV credentials; PIV credential authorizations; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information system operations responsibilities; organizational personnel with account management responsibilities; organizational personnel with information security responsibilities; system/network administrators; and system developers.

-
-
- - - -

Automated mechanisms supporting and/or implementing acceptance and verification of PIV credentials.

-
-
- -

Condition: Must document and assess for privileged users. May attest to this - control for non-privileged users. FedRAMP requires a minimum of multi-factor - authentication for all Federal privileged users, if acceptance of PIV credentials - is not supported. The implementation status and details of how this control is - implemented must be clearly defined by the CSP.

-
-
- - - IA-2 (12) Additional FedRAMP Requirements and Guidance - - -

Include Common Access Card (CAC), i.e., the DoD technical implementation of - PIV/FIPS 201/HSPD-12.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if, for hardware token-based authentication, the organization:

-
    -
  • Defines token quality requirements to be satisfied.
  • -
  • Employs mechanisms that satisfy organization-defined token quality requirements.
  • -
-
- - - -

Identification and authentication policy; procedures addressing authenticator management; security plan; information system design documentation; automated mechanisms employing hardware token-based authentication for the information system; list of token quality requirements; information system configuration settings and associated documentation; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with authenticator management responsibilities; organizational personnel with information security responsibilities; system/network administrators; and system developers.

-
-
- - - -

Automated mechanisms supporting and/or implementing hardware token-based authenticator management capability.

-
-
- -

FED - for Federal privileged users. Condition - Must document and assess for - privileged users. May attest to this control for non-privileged users.

-
-
-
- - - - - - - - - - - - - - -

Determine if the information system obscures feedback of authentication information during the authentication process to protect the information from possible exploitation/use by unauthorized individuals.

-
- - - -

Identification and authentication policy; procedures addressing authenticator feedback; information system design documentation; information system configuration settings and associated documentation; information system audit records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information security responsibilities; system/network administrators; and system developers.

-
-
- - - -

Automated mechanisms supporting and/or implementing the obscuring of feedback of authentication information during authentication.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the information system:

-
    -
  • Accepts PIV credentials from other agencies.
  • -
  • Electronically verifies PIV credentials from other agencies.
  • -
-
- - - -

Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; PIV verification records; evidence of PIV credentials; PIV credential authorizations; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information system operations responsibilities; organizational personnel with information security responsibilities; system/network administrators; system developers; and organizational personnel with account management responsibilities.

-
-
- - - -

Automated mechanisms supporting and/or implementing identification and authentication capability; automated mechanisms that accept and verify PIV credentials.

-
-
- -

Condition: Must document and assess for privileged users. May attest to this - control for non-privileged users. FedRAMP requires a minimum of multi-factor - authentication for all Federal privileged users, if acceptance of PIV credentials - is not supported. The implementation status and details of how this control is - implemented must be clearly defined by the CSP.

-
-
-
- - - - - - - - - - - - - - -

Determine if the information system accepts only FICAM-approved third-party credentials.

-
- - - -

Identification and authentication policy; procedures addressing user identification and authentication; information system design documentation; information system configuration settings and associated documentation; information system audit records; list of FICAM-approved, third-party credentialing products, components, or services procured and implemented by organization; third-party credential verification records; evidence of FICAM-approved third-party credentials; third-party credential authorizations; and other relevant documents or records.

-
-
- - - -

Organizational personnel with information system operations responsibilities; organizational personnel with information security responsibilities; system/network administrators; system developers; and organizational personnel with account management responsibilities.

-
-
- - - -

Automated mechanisms supporting and/or implementing identification and authentication capability; automated mechanisms that accept FICAM-approved credentials.

-
-
- -

Condition: Must document and assess for privileged users. May attest to this - control for non-privileged users. FedRAMP requires a minimum of multi-factor - authentication for all Federal privileged users, if acceptance of PIV credentials - is not supported. The implementation status and details of how this control is - implemented must be clearly defined by the CSP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Implements an incident handling capability for security incidents that includes:
  • -
  • -
      -
    • Preparation;
    • -
    • Detection and analysis;
    • -
    • Containment;
    • -
    • Eradication; and
    • -
    • Recovery.
    • -
    -
  • -
  • Coordinates incident handling activities with contingency planning activities.
  • -
  • Incorporates lessons learned from ongoing incident handling activities into:
  • -
  • -
      -
    • Incident response procedures;
    • -
    • Training; and
    • -
    • Testing/exercises.
    • -
    -
  • -
  • Implements the resulting changes accordingly to:
  • -
  • -
      -
    • Incident response procedures;
    • -
    • Training; and
    • -
    • Testing/exercises.
    • -
    -
  • -
-
- - - -

Incident response policy; contingency planning policy; procedures addressing incident handling; incident response plan; contingency plan; security plan; and other relevant documents or records.

-
-
- - - -

Organizational personnel with incident handling responsibilities; organizational personnel with contingency planning responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Incident handling capability for the organization

-
-
- - IR-4 Additional FedRAMP Requirements and Guidance - - -

The service provider ensures that individuals conducting incident handling meet - personnel security requirements commensurate with the criticality/sensitivity - of the information being processed, stored, and transmitted by the information - system.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines the time period within which personnel report suspected security incidents to the organizational incident response capability.
  • -
  • Requires personnel to report suspected security incidents to the organizational incident response capability within the organization-defined time period.
  • -
  • Defines authorities to whom security incident information is to be reported.
  • -
  • Reports security incident information to organization-defined authorities.
  • -
-
- - - -

Incident response policy; procedures addressing incident reporting; incident reporting records and documentation; incident response plan; security plan; and other relevant documents or records.

-
-
- - - -

Organizational personnel with incident reporting responsibilities; organizational personnel with information security responsibilities; personnel who have/should have reported incidents; and personnel (authorities) to whom incident information is to be reported.

-
-
- - - -

Organizational processes for incident reporting; automated mechanisms supporting and/or implementing incident reporting.

-
-
-
- - - IR-6 Additional FedRAMP Requirements and Guidance - - -

Report security incident information according to FedRAMP Incident - Communications Procedure.

-
-
-
-
- - - - - - - - - - - - - - - -

Attestation - Specifically attest to US-CERT compliance.

-
-
-
- - - - - - - -

Attestation - Specifically describe information spillage response processes.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • schedules maintenance and repairs on information system components in accordance with manufacturer or vendor specifications; and/or organizational requirements;
  • -
  • performs maintenance and repairs on information system components in accordance with manufacturer or vendor specifications; and/or organizational requirements;
  • -
  • documents maintenance and repairs on information system components in accordance with manufacturer or vendor specifications; and/or organizational requirements;
  • -
  • reviews records of maintenance and repairs on information system components in accordance with manufacturer or vendor specifications; and/or organizational requirements;
  • -
  • approves all maintenance activities, whether performed on-site or remotely and whether the equipment is serviced on-site or removed to another location;
  • -
  • monitors all maintenance activities, whether performed on-site or remotely and whether the equipment is serviced on-site or removed to another location;
  • -
  • defines personnel or roles required to explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
  • -
  • requires that organization-defined personnel or roles explicitly approve the removal of the information system or system components from organizational facilities for off-site maintenance or repairs;
  • -
  • sanitizes equipment to remove all information from associated media prior to removal from organizational facilities for off-site maintenance or repairs;
  • -
  • checks all potentially impacted security controls to verify that the controls are still functioning properly following maintenance or repair actions;
  • -
  • defines maintenance-related information to be included in organizational maintenance records; and
  • -
  • includes organization-defined maintenance-related information in organizational maintenance records.
  • -
-
- - - -

Information system maintenance policy; procedures addressing controlled information system maintenance; maintenance records; manufacturer/vendor maintenance specifications; equipment sanitization records; media sanitization records; other relevant documents or records.

-
-
- - - -

Organizational personnel with information system maintenance responsibilities; organizational personnel with information security responsibilities; organizational personnel responsible for media sanitization; system/network administrators.

-
-
- - - -

Organizational processes for scheduling, performing, documenting, reviewing, approving, and monitoring maintenance and repairs for the information system; organizational processes for sanitizing information system components; automated mechanisms supporting and/or implementing controlled maintenance; automated mechanisms implementing sanitization of information system components.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • establishes a process for maintenance personnel authorization;
  • -
  • maintains a list of authorized maintenance organizations or personnel;
  • -
  • ensures that non-escorted personnel performing maintenance on the information system have required access authorizations; and
  • -
  • designates organizational personnel with required access authorizations and technical competence to supervise the maintenance activities of personnel who do not possess the required access authorizations.
  • -
-
- - - -

Information system maintenance policy; procedures addressing maintenance personnel; service provider contracts; service-level agreements; list of authorized personnel; maintenance records; access control records; other relevant documents or records.

-
-
- - - -

Organizational personnel with information system maintenance responsibilities; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for authorizing and managing maintenance personnel; automated mechanisms supporting and/or implementing authorization of maintenance personnel.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines types of digital and/or non-digital media requiring restricted access;
  • -
  • defines personnel or roles authorized to access organization-defined types of digital and/or non-digital media; and
  • -
  • restricts access to organization-defined types of digital and/or non-digital media to organization-defined personnel or roles.
  • -
-
- - - -

Information system media protection policy; procedures addressing media access restrictions; access control policy and procedures; physical and environmental protection policy and procedures; media storage facilities; access control records; other relevant documents or records.

-
-
- - - -

Organizational personnel with information system media protection responsibilities; organizational personnel with information security responsibilities; system/network administrators.

-
-
- - - -

Organizational processes for restricting information media; automated mechanisms supporting and/or implementing media access restrictions.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines information system media to be sanitized prior to:
  • -
  • -
      -
    • disposal;
    • -
    • release out of organizational controls; or
    • -
    • release for reuse.
    • -
    -
  • -
  • defines sanitization techniques or procedures to be used for sanitizing organization-defined information system media prior to:
  • -
  • -
      -
    • disposal;
    • -
    • release out of organizational controls; or
    • -
    • release for reuse.
    • -
    -
  • -
  • sanitizes organization-defined information system media prior to disposal, release out of organizational control, or release for reuse using organization-defined sanitization techniques or procedures in accordance with applicable federal and organizational standards and policies; and
  • -
  • employs sanitization mechanisms with strength and integrity commensurate with the security category or classification of the information.
  • -
-
- - - -

Information system media protection policy; procedures addressing media sanitization and disposal; applicable federal standards and policies addressing media sanitization; media sanitization records; audit records; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with information system media protection responsibilities; organizational personnel with information security responsibilities; system/network administrators.

-
-
- - - -

Organizational processes for media sanitization; automated mechanisms supporting and/or implementing media sanitization.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines types of information system media to be:
  • -
  • -
      -
    • restricted on information systems or system components; or
    • -
    • prohibited from use on information systems or system components
    • -
    -
  • -
  • defines information systems or system components on which the use of organization-defined types of information system media is to be one of the following:
  • -
  • -
      -
    • restricted; or
    • -
    • prohibited.
    • -
    -
  • -
  • defines security safeguards to be employed to restrict or prohibit the use of organization-defined types of information system media on organization-defined information systems or system components; and,
  • -
  • restricts or prohibits the use of organization-defined information system media on organization-defined information systems or system components using organization-defined security safeguards.
  • -
-
- - - -

Information system media protection policy; procedures addressing media sanitization and disposal; applicable federal standards and policies addressing media sanitization; media sanitization records; audit records; information system design documentation; information system configuration settings and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with information system media protection responsibilities; organizational personnel with information security responsibilities; system/network administrators.

-
-
- - - -

Organizational processes for media sanitization; automated mechanisms supporting and/or implementing media sanitization.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • develops a list of individuals with authorized access to the facility where the information system resides;
  • -
  • approves a list of individuals with authorized access to the facility where the information system resides;
  • -
  • maintains a list of individuals with authorized access to the facility where the information system resides;
  • -
  • issues authorization credentials for facility access;
  • -
  • defines the frequency to review the access list detailing authorized facility access by individuals;
  • -
  • reviews the access list detailing authorized facility access by individuals with the organization-defined frequency; and,
  • -
  • removes individuals from the facility access list when access is no longer required.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/ or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines entry/exit points to the facility where the information system resides;
  • -
  • enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides by:
  • -
  • -
      -
    • verifying individual access authorizations before granting access to the facility;
    • -
    -
  • -
  • enforces physical access authorizations at organization-defined entry/exit points to the facility where the information system resides by:
  • -
  • -
      -
    • defining physical access control systems/devices to be employed to control ingress/egress to the facility where the information system resides;
    • -
    • using one or more of the following ways to control ingress/egress to the facility:
    • -
    • -
        -
      • organization-defined physical access control systems/devices; and/or
      • -
      • guards;
      • -
      -
    • -
    -
  • -
  • defines entry/exit points for which physical access audit logs are to be maintained;
  • -
  • maintains physical access audit logs for organization-defined entry/exit points;
  • -
  • defines security safeguards to be employed to control access to areas within the facility officially designated as publicly accessible;
  • -
  • provides organization-defined security safeguards to control access to areas within the facility officially designated as publicly accessible;
  • -
  • defines circumstances requiring visitor:
  • -
  • -
      -
    • escorts; and
    • -
    • monitoring;
    • -
    -
  • -
  • in accordance with organization-defined circumstances requiring visitor escorts and monitoring:
  • -
  • -
      -
    • escorts visitors; and
    • -
    • monitors visitor activities.
    • -
    -
  • -
  • secures keys;
  • -
  • secures combinations;
  • -
  • secures other physical access devices;
  • -
  • defines physical access devices to be inventoried;
  • -
  • defines the frequency to inventory organization-defined physical access devices;
  • -
  • inventories the organization-defined physical access devices with the organization-defined frequency;
  • -
  • defines the frequency to change combinations and keys; and
  • -
  • changes combinations and keys with the organization-defined frequency and/or when:
  • -
  • -
      -
    • keys are lost;
    • -
    • combinations are compromised; or
    • -
    • individuals are transferred or terminated.
    • -
    -
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • monitors physical access to the facility where the information system resides to detect and respond to physical security incidents;
  • -
  • defines the frequency to review physical access logs;
  • -
  • defines events or potential indication of events requiring physical access logs to be reviewed;
  • -
  • reviews physical access logs with the organization-defined frequency and upon occurrence of organization-defined events or potential indications of events; and
  • -
  • coordinates results of reviews and investigations with the organizational incident response capability.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines the time period to maintain visitor access records to the facility where the information system resides;
  • -
  • maintains visitor access records to the facility where the information system resides for the organization-defined time period;
  • -
  • defines the frequency to review visitor access records; and
  • -
  • reviews visitor access records with the organization-defined frequency.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • employs and maintains automatic emergency lighting for the information system that activates in the event of a power outage or disruption; and
  • -
  • employs and maintains automatic emergency lighting for the information system that covers emergency exits and evacuation routes within the facility.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • employs fire suppression and detection devices/systems for the information system that are supported by an independent energy source; and
  • -
  • maintains fire suppression and detection devices/systems for the information system that are supported by an independent energy source.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines acceptable temperature levels to be maintained within the facility where the information system resides;
  • -
  • defines acceptable humidity levels to be maintained within the facility where the information system resides;
  • -
  • maintains temperature levels within the facility where the information system resides at the organization-defined levels;
  • -
  • maintains humidity levels within the facility where the information system resides at the organization-defined levels;
  • -
  • defines the frequency to monitor temperature levels;
  • -
  • defines the frequency to monitor humidity levels;
  • -
  • monitors temperature levels with the organization-defined frequency; and
  • -
  • monitors humidity levels with the organization-defined frequency.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
- - - PE-14(a) Additional FedRAMP Requirements and Guidance - - -

The service provider measures temperature at server inlets and humidity levels - by dew point.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • protects the information system from damage resulting from water leakage by providing master shutoff or isolation valves that are:
  • -
  • -
      -
    • accessible;
    • -
    • working properly; and
    • -
    • known to key personnel.
    • -
    -
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • defines types of information system components to be authorized, monitored, and controlled as such components are entering and exiting the facility;
  • -
  • authorizes organization-defined information system components entering the facility;
  • -
  • monitors organization-defined information system components entering the facility;
  • -
  • controls organization-defined information system components entering the facility;
  • -
  • authorizes organization-defined information system components exiting the facility;
  • -
  • monitors organization-defined information system components exiting the facility;
  • -
  • controls organization-defined information system components exiting the facility;
  • -
  • maintains records of information system components entering the facility; and
  • -
  • maintains records of information system components exiting the facility.
  • -
-
- - - -

Physical and environmental protection policy; procedures addressing physical access authorizations; security plan; authorized personnel access list; authorization credentials; physical access list reviews; physical access termination records and associated documentation; other relevant documents or records.

-
-
- - - -

Organizational personnel with physical access authorization responsibilities; organizational personnel with physical access to information system facility; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for physical access authorizations; automated mechanisms supporting and/or implementing physical access authorizations.

-
-
- -

Condition: Control is not inherited from a FedRAMP-authorized PaaS or IaaS.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Develops a security plan for the information system that:
  • -
  • -
      -
    • Is consistent with the organization’s enterprise architecture;
    • -
    • Explicitly defines the authorization boundary for the system;
    • -
    • Describes the operational context of the information system in terms of missions and business processes;
    • -
    • Provides the security categorization of the information system including supporting rationale;
    • -
    • Describes the operational environment for the information system and relationships with or connections to other information systems;
    • -
    • Provides an overview of the security requirements for the system;
    • -
    • Identifies any relevant overlays, if applicable;
    • -
    • Describes the security controls in place or planned for meeting those requirements including a rationale for the tailoring decisions; and
    • -
    • Is reviewed and approved by the authorizing official or designated representative prior to plan implementation.
    • -
    -
  • -
  • Defines personnel or roles to whom copies of the security plan are to be distributed and subsequent changes to the plan are to be communicated.
  • -
  • Distributes copies of the security plan and communicates subsequent changes to the plan to organization-defined personnel or roles.
  • -
  • Defines the frequency to review the security plan for the information system.
  • -
  • Reviews the security plan for the information system with the organization-defined frequency.
  • -
  • Updates the plan to address:
  • -
  • -
      -
    • Changes to the information system/environment of operation;
    • -
    • Problems identified during plan implementation; and
    • -
    • Problems identified during security control assessments.
    • -
    -
  • -
  • Protects the security plan from unauthorized:
  • -
  • -
      -
    • Disclosure; and
    • -
    • Modification.
    • -
    -
  • -
-
- - - -

Security planning policy; procedures addressing security plan development and implementation; procedures addressing security plan reviews and updates; enterprise architecture documentation; security plan for the information system; records of security plan reviews and updates; and other relevant documents or records.

-
-
- - - -

Organizational personnel with security planning and plan implementation responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for security plan development/review/update/approval; automated mechanisms supporting the information system security plan.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Screens individuals prior to authorizing access to the information system.
  • -
  • Defines conditions requiring re-screening.
  • -
  • Defines the frequency of re-screening where it is so indicated.
  • -
  • Re-screens individuals in accordance with organization-defined conditions requiring re-screening and, where re-screening is so indicated, with the organization-defined frequency of such re-screening.
  • -
-
- - - -

Personnel security policy; procedures addressing personnel screening; records of screened personnel; security plan; and other relevant documents or records.

-
-
- - - -

Organizational personnel with personnel security responsibilities; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for personnel screening.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Attestation - Specifically stating that any third-party security personnel are - treated as CSP employees.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Categorizes information and the information system in accordance with applicable Federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
  • -
  • Documents the security categorization results (including supporting rationale) in the security plan for the information system.
  • -
  • Ensures the authorizing official or authorizing official designated representative reviews and approves the security categorization decision.
  • -
-
- - - -

Risk assessment policy; security planning policy and procedures; procedures addressing security categorization of organizational information and information systems; security plan; security categorization documentation; and other relevant documents or records.

-
-
- - - -

Organizational personnel with security categorization and risk assessment responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for security categorization.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:
  • -
  • -
      -
    • The information system.
    • -
    Conducts an assessment of risk, including the likelihood and magnitude of harm, from the unauthorized access, use, disclosure, disruption, modification, or destruction of:
  • -
  • -
      -
    • The information the system processes, stores, or transmits.
    • -
    -
  • -
  • Defines a document in which risk assessment results are to be documented (if not documented in the security plan or risk assessment report).
  • -
  • Documents risk assessment results in one of the following:
  • -
  • -
      -
    • The security plan;
    • -
    • The risk assessment report; or
    • -
    • The organization-defined document.
    • -
    -
  • -
  • Reviews risk assessment results with the organization-defined frequency.Defines the frequency to review risk assessment results.
  • -
  • Defines personnel or roles to whom risk assessment results are to be disseminated.
  • -
  • Disseminates risk assessment results to organization-defined personnel or roles.
  • -
  • Defines the frequency to update the risk assessment.
  • -
  • Updates the risk assessment:
  • -
  • -
      -
    • With the organization-defined frequency;
    • -
    • Whenever there are significant changes to the information system or environment of operation (including the identification of new threats and vulnerabilities); and
    • -
    • Whenever there are other conditions that may impact the security state of the system.
    • -
    -
  • -
-
- - - -

Risk assessment policy; security planning policy and procedures; procedures addressing organizational assessments of risk; security plan; risk assessment; risk assessment results; risk assessment reviews; risk assessment updates; and other relevant documents or records.

-
-
- - - -

Organizational personnel with risk assessment responsibilities; and organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for risk assessment; automated mechanisms supporting and/or for conducting, documenting, reviewing, disseminating, and updating the risk assessment.

-
-
-
- - - RA-3 Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision 1, - Appendix F

-
- - -

Include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines the frequency for conducting vulnerability scans on the information system and hosted applications.
  • -
  • Defines the process for conducting random vulnerability scans on the information system and hosted applications.
  • -
  • In accordance with the organization-defined frequency and/or organization-defined process for conducting random scans, scans for vulnerabilities in:
  • -
  • -
      -
    • The information system; and
    • -
    • Hosted applications.
    • -
    -
  • -
  • When new vulnerabilities potentially affecting the system/applications are identified and reported, scans for vulnerabilities in:
  • -
  • -
      -
    • The information system; and
    • -
    • Hosted applications.
    • -
    -
  • -
  • Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
  • -
  • -
      -
    • Enumerating platforms;
    • -
    • Enumerating software flaws; and
    • -
    • Enumerating improper configurations.
    • -
    -
  • -
  • Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
  • -
  • -
      -
    • Formatting checklists; and
    • -
    • Formatting test procedures.
    • -
    -
  • -
  • Employs vulnerability scanning tools and techniques that facilitate interoperability among tools and automate parts of the vulnerability management process by using standards for:
  • -
  • -
      -
    • Measuring vulnerability impact.
    • -
    -
  • -
  • Analyzes vulnerability scan reports.
  • -
  • Analyzes results from security control assessments.
  • -
  • Defines response times to remediate legitimate vulnerabilities in accordance with an organizational assessment of risk.
  • -
  • Remediates legitimate vulnerabilities within the organization-defined response times in accordance with an organizational assessment of risk.
  • -
  • Defines personnel or roles with whom information obtained from the vulnerability scanning process and security control assessments is to be shared.
  • -
  • Shares information obtained from the vulnerability scanning process with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
  • -
  • Shares information obtained from security control assessments with organization-defined personnel or roles to help eliminate similar vulnerabilities in other information systems (i.e., systemic weaknesses or deficiencies).
  • -
-
- - - -

Risk assessment policy; procedures addressing vulnerability scanning; risk assessment; security plan; security assessment report; vulnerability scanning tools and associated configuration documentation; vulnerability scanning results; patch and vulnerability management records; and other relevant documents or records.

-
-
- - - -

Organizational personnel with risk assessment, security control assessment and vulnerability scanning responsibilities; organizational personnel with vulnerability scan analysis responsibilities; organizational personnel with vulnerability remediation responsibilities; organizational personnel with information security responsibilities; system/network administrators.

-
-
- - - -

Organizational processes for vulnerability scanning, analysis, remediation, and information sharing; automated mechanisms supporting and/or implementing vulnerability scanning, analysis, remediation, and information sharing.

-
-
- - RA-5(a) Additional FedRAMP Requirements and Guidance - -

An accredited independent assessor scans operating systems/infrastructure, web - applications, and databases once annually.

-
- - RA-5(e) Additional FedRAMP Requirements and Guidance - -

To include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
- - - RA-5 Additional FedRAMP Requirements and Guidance - - -

- See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines security controls to be employed by providers of external information system services.
  • -
  • Requires that providers of external information system services comply with organizational information security requirements.
  • -
  • Requires that providers of external information system services employ organization-defined security controls in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, standards, and guidance.
  • -
  • Defines and documents government oversight with regard to external information system services.
  • -
  • Defines and documents user roles and responsibilities with regard to external information system services.
  • -
  • Defines processes, methods, and techniques to be employed to monitor security control compliance by external service providers.
  • -
  • Employs organization-defined processes, methods, and techniques to monitor security control compliance by external service providers on an ongoing basis.
  • -
-
- - - -

System and services acquisition policy; procedures addressing external information system services; procedures addressing methods and techniques for monitoring security control compliance by external service providers of information system services; acquisition contracts, service-level agreements; organizational security requirements and security specifications for external provider services; security control assessment evidence from external providers of information system services; and other relevant documents or records.

-
-
- - - -

Organizational personnel with system and services acquisition responsibilities; external providers of information system services; organizational personnel with information security responsibilities.

-
-
- - - -

Organizational processes for monitoring security control compliance by external service providers on an ongoing basis; automated mechanisms for monitoring security control compliance by external service providers on an ongoing basis.

-
-
-
-
- - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines types of denial of service attacks or reference to source of such information for the information system to protect against or limit the effects.
  • -
  • Defines security safeguards to be employed by the information system to protect against or limit the effects of organization-defined types of denial of service attacks.
  • -
  • Protects against or limits the effects of the organization-defined denial or service attacks (or reference to source for such information) by employing organization-defined security safeguards.
  • -
-
- - - -

System and communications protection policy; procedures addressing denial of service protection; information system design documentation; security plan; list of denial of services attacks requiring employment of security safeguards to protect against or limit effects of such attacks; list of security safeguards protecting against or limiting the effects of denial of service attacks; information system configuration settings and associated documentation; information system audit records; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; organizational personnel with incident response responsibilities; system developer.

-
-
- - - -

Automated mechanisms protecting against or limiting the effects of denial of service attacks.

-
-
- -

Condition: If availability is a requirement, define protections in place as per - control requirement.

-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Monitors communications at the external boundary of the information system.
  • -
  • Monitors communications at key internal boundaries within the system.
  • -
  • Controls communications at the external boundary of the information system.
  • -
  • Controls communications at key internal boundaries within the system.
  • -
  • Implements subnetworks for publicly accessible system components that are either:
  • -
  • -
      -
    • Physically separated from internal organizational networks; and/or
    • -
    • Logically separated from internal organizational networks.
    • -
    -
  • -
  • Connects to external networks or information systems only through managed interfaces consisting of boundary protection devices arranged in accordance with an organizational security architecture.
  • -
-
- - - -

System and communications protection policy; procedures addressing boundary protection; list of key internal boundaries of the information system; information system design documentation; boundary protection hardware and software; information system configuration settings and associated documentation; enterprise security architecture documentation; information system audit records; and other relevant documents or records.

-
-
- - - -

System/network administrators; and organizational personnel with information security responsibilities; system developer; organizational personnel with boundary protection responsibilities.

-
-
- - - -

Automated mechanisms implementing boundary protection capability.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines requirements for cryptographic key:
  • -
  • -
      -
    • Generation;
    • -
    • Distribution;
    • -
    • Storage;
    • -
    • Access; and
    • -
    • Destruction.
    • -
    -
  • -
  • Establishes and manages cryptographic keys for required cryptography employed within the information system in accordance with organization-defined requirements for key generation, distribution, storage, access, and destruction.
  • -
-
- - - -

System and communications protection policy; procedures addressing cryptographic key establishment and management; information system design documentation; cryptographic mechanisms; information system configuration settings and associated documentation; information system audit records; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; and organizational personnel with responsibilities for cryptographic key establishment and/or management.

-
-
- - - -

Automated mechanisms supporting and/or implementing cryptographic key establishment and management.

-
-
- - SC-12 Additional FedRAMP Requirements and Guidance - - -

Federally approved cryptography.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines cryptographic uses.
  • -
  • Defines the type of cryptography required for each use.
  • -
  • Implements the organization-defined cryptographic uses and type of cryptography required for each use in accordance with applicable federal laws, Executive Orders, directives, policies, regulations, and standards.
  • -
-
- - - -

System and communications protection policy; procedures addressing cryptographic protection; information system design documentation; information system configuration settings and associated documentation; cryptographic module validation certificates; list of FIPS validated cryptographic modules; information system audit records; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; system developer; and organizational personnel with responsibilities for cryptographic protection.

-
-
- - - -

Automated mechanisms supporting and/or implementing cryptographic protection.

-
-
- -

Condition: If implementing need to detail how they meet it or don't meet it.

-
-
-
- - - - - - - -

NSO - Not directly related to the security of the SaaS.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Identifies information system flaws.
  • -
  • Reports information system flaws.
  • -
  • Corrects information system flaws.
  • -
  • Tests software updates related to flaw remediation for effectiveness and potential side effects before installation.
  • -
  • Tests firmware updates related to flaw remediation for effectiveness and potential side effects before installation.
  • -
  • Defines the time period within which to install security-relevant software updates after the release of the updates.
  • -
  • Defines the time period within which to install security-relevant firmware updates after the release of the updates.
  • -
  • Installs software updates within the organization-defined time period of the release of the updates.
  • -
  • Installs firmware updates within the organization-defined time period of the release of the updates.
  • -
  • Incorporates flaw remediation into the organizational configuration management process.
  • -
-
- - - -

System and information integrity policy; procedures addressing flaw remediation; procedures addressing configuration management; list of flaws and vulnerabilities potentially affecting the information system; list of recent security flaw remediation actions performed on the information system (e.g., list of installed patches, service packs, hot fixes, and other software updates to correct information system flaws); test results from the installation of software and firmware updates to correct information system flaws; installation/change control records for security-relevant software and firmware updates; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for flaw remediation; and organizational personnel with configuration management responsibility.

-
-
- - - -

Organizational processes for identifying, reporting, and correcting information system flaws; organizational process for installing software and firmware updates; automated mechanisms supporting and/or implementing reporting, and correcting information system flaws; and automated mechanisms supporting an/or implementing testing software and firmware updates.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Employs malicious code protection mechanisms to detect and eradicate malicious code at information system:
  • -
  • -
      -
    • Entry points; and
    • -
    • Exit points.
    • -
    -
  • -
  • Updates malicious code protection mechanisms whenever new releases are available in accordance with organizational configuration management policy and procedures (as identified in CM-1).
  • -
  • Defines a frequency for malicious code protection mechanisms to perform periodic scans of the information system.
  • -
  • Defines action to be initiated by malicious protection mechanisms in response to malicious code detection.
  • -
  • Configures malicious code protection mechanisms to:
  • -
  • -
      -
    • Perform periodic scans of the information system with the organization-defined frequency;
    • -
    • Perform real-time scans of files from external sources at endpoint and/or network entry/exit points as the files are downloaded, opened, or executed in accordance with organizational security policy.
    • -
    -
  • -
  • Configures malicious code protection mechanisms to do one or more of the following:
  • -
  • -
      -
    • Block malicious code in response to malicious code detection;
    • -
    • Quarantine malicious code in response to malicious code detection;
    • -
    • Send alert to administrator in response to malicious code detection; and/or
    • -
    • Initiate organization-defined action in response to malicious code detection.
    • -
    -
  • -
  • Addresses the receipt of false positives during malicious code detection and eradication.
  • -
  • Addresses the resulting potential impact on the availability of the information system.
  • -
-
- - - -

System and information integrity policy; configuration management policy and procedures; procedures addressing malicious code protection; malicious code protection mechanisms; records of malicious code protection updates; information system design documentation; information system configuration settings and associated documentation; scan results from malicious code protection mechanisms; record of actions initiated by malicious code protection mechanisms in response to malicious code detection; information system audit records; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; organizational personnel with responsibility for malicious code protection; and organizational personnel with configuration management responsibility.

-
-
- - - -

Organizational processes for employing, updating, and configuring malicious code protection mechanisms; organizational process for addressing false positives and resulting potential impact; automated mechanisms supporting and/or implementing employing, updating, and configuring malicious code protection mechanisms; automated mechanisms supporting and/or implementing malicious code scanning and subsequent act.

-
-
-
-
- - - - - - - - - - - - - - -

Determine if the organization:

-
    -
  • Defines monitoring objectives to detect attacks and indicators of potential attacks on the information system.
  • -
  • Monitors the information system to detect, in accordance with organization-defined monitoring objectives:
  • -
  • -
      -
    • Attacks; and/or
    • -
    • Indicators of potential attacks.
    • -
    -
  • -
  • Monitors the information system to detect unauthorized:
  • -
  • -
      -
    • Local connections;
    • -
    • Network connections; and/or
    • -
    • Remote connections.
    • -
    -
  • -
  • Defines techniques and methods to identify unauthorized use of the information system.
  • -
  • Identifies unauthorized use of the information system through organization-defined techniques and methods.
  • -
  • Deploys monitoring devices:
  • -
  • -
      -
    • Strategically within the information system to collect organization-determined essential information.
    • -
    • At ad hoc locations within the system to track specific types of transactions of interest to the organization.
    • -
    -
  • -
  • Protects information obtained from intrusion-monitoring tools from unauthorized:
  • -
  • -
      -
    • Access;
    • -
    • Modification; and/or
    • -
    • Deletion.
    • -
    -
  • -
  • Heightens the level of information system monitoring activity whenever there is an indication of increased risk to organizational operations and assets, individuals, other organizations, or the Nation based on law enforcement information, intelligence information, or other credible sources of information.
  • -
  • Obtains legal opinion with regard to information system monitoring activities in accordance with applicable federal laws, Executive Orders, directives, policies, or regulations.
  • -
  • Defines personnel or roles to whom information system monitoring information is to be provided.
  • -
  • Defines information system monitoring information to be provided to organization-defined personnel or roles.
  • -
  • Defines a frequency to provide organization-defined information system monitoring to organization-defined personnel or roles.
  • -
  • Provides organization-defined information system monitoring information to organization-defined personnel or roles one or more of the following:
  • -
  • -
      -
    • As needed; and/or
    • -
    • With the organization-defined frequency.
    • -
    -
  • -
-
- - - -

Continuous monitoring strategy; system and information integrity policy; procedures addressing information system monitoring tools and techniques; facility diagram/layout; information system design documentation; information system monitoring tools and techniques documentation; locations within information system where monitoring devices are deployed; information system configuration settings and associated documentation; and other relevant documents or records.

-
-
- - - -

System/network administrators; organizational personnel with information security responsibilities; organizational personnel installing, configuring, and/or maintaining the information system; and organizational personnel with responsibility monitoring the information system.

-
-
- - - -

Organizational processes for information system monitoring; automated mechanisms supporting and/or implementing information system monitoring capability.

-
-
-
-
- - - - - - - - - - - - - - - -

Attestation - Specifically related to US-CERT and FedRAMP communications - procedures.

-
-
-
- -
- - - FedRAMP Applicable Laws and Regulations - - - - FedRAMP Master Acronym and Glossary - - - - -

FedRAMP Logo

-
- - -
- - NIST Special Publication (SP) 800-53 - - - - - -
-
diff --git a/src/content/rev5/baselines/xml/FedRAMP_rev4_LOW-baseline_profile.xml b/src/content/rev5/baselines/xml/FedRAMP_rev4_LOW-baseline_profile.xml deleted file mode 100644 index 67481f90a..000000000 --- a/src/content/rev5/baselines/xml/FedRAMP_rev4_LOW-baseline_profile.xml +++ /dev/null @@ -1,6237 +0,0 @@ - - - - - - FedRAMP Rev 4 Low Baseline - 2021-02-05T00:00:00.000-04:00 - 2021-06-09T14:27:40.706-04:00 - fedramp1.1.0-oscal1.0.0 - 1.0.0 - - Document creator - - - The FedRAMP Program Management Office (PMO) - CSP - - - The FedRAMP Joint Authorization Board (JAB) - CSP - - - Federal Risk and Authorization Management Program: Program Management Office - FedRAMP PMO - - - - - info@fedramp.gov -
- 1800 F St. NW - Washington - DC - 20006 - US -
-
- - Federal Risk and Authorization Management Program: Joint Authorization Board - FedRAMP JAB - - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - ca9ba80e-1342-4bfd-b32a-abac468c24b4 - -
- - - ac-1 - ac-2 - ac-3 - ac-7 - ac-8 - ac-14 - ac-17 - ac-18 - ac-19 - ac-20 - ac-22 - at-1 - at-2 - at-3 - at-4 - au-1 - au-2 - au-3 - au-4 - au-5 - au-6 - au-8 - au-9 - au-11 - au-12 - ca-1 - ca-2 - ca-2.1 - ca-3 - ca-5 - ca-6 - ca-7 - ca-9 - cm-1 - cm-2 - cm-4 - cm-6 - cm-7 - cm-8 - cm-10 - cm-11 - cp-1 - cp-2 - cp-3 - cp-4 - cp-9 - cp-10 - ia-1 - ia-2 - ia-2.1 - ia-2.12 - ia-4 - ia-5 - ia-5.1 - ia-5.11 - ia-6 - ia-7 - ia-8 - ia-8.1 - ia-8.2 - ia-8.3 - ia-8.4 - ir-1 - ir-2 - ir-4 - ir-5 - ir-6 - ir-7 - ir-8 - ma-1 - ma-2 - ma-4 - ma-5 - mp-1 - mp-2 - mp-6 - mp-7 - pe-1 - pe-2 - pe-3 - pe-6 - pe-8 - pe-12 - pe-13 - pe-14 - pe-15 - pe-16 - pl-1 - pl-2 - pl-4 - ps-1 - ps-2 - ps-3 - ps-4 - ps-5 - ps-6 - ps-7 - ps-8 - ra-1 - ra-2 - ra-3 - ra-5 - sa-1 - sa-2 - sa-3 - sa-4 - sa-5 - sa-9 - sc-1 - sc-5 - sc-7 - sc-12 - sc-13 - sc-15 - sc-20 - sc-21 - sc-22 - sc-39 - si-1 - si-2 - si-3 - si-4 - si-5 - si-12 - si-16 - - - - - true - - - - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

not more than three (3)

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

thirty (30) minutes

-
-
-
- - - -

see additional Requirements and Guidance

-
-
-
- - - -

see additional Requirements and Guidance

-
-
-
- - - -

at least quarterly

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

At least one year

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

Successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes

-
-
-
- - - -

organization-defined subset of the auditable events defined in AU-2 a to be audited continually for each identified event

-
-
-
- - - -

organization-defined actions to be taken (overwrite oldest record)

-
-
-
- - - -

at least weekly

-
-
-
- - - -

at least ninety days

-
-
-
- - - -

all information system and network components where audit capability is deployed/available

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

individuals or roles to include FedRAMP PMO

-
-
-
- - - -

at least annually and on input from FedRAMP

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least every three years or when a significant change occurs

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

United States Government Configuration Baseline (USGCB)

-
-
-
- - - -

United States Government Configuration Baseline (USGCB)

-
-
-
- - - -

at least monthly

-
-
-
- - - -

Continuously (via CM-7 (5))

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

ten (10) days

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every three years

-
-
-
- - - -

classroom exercises/table top written tests

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

IA-4 (d) [at least two years]

-
-
-
- - - -

ninety days for user identifiers (See additional requirements and guidance)

-
-
-
- - - -

at least one

-
-
-
- - - -

twenty four

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least annually

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

CSP defined physical access control systems/devices AND guards

-
-
-
- - - -

CSP defined physical access control systems/devices

-
-
-
- - - -

in all circumstances within restricted access area where the information system resides

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least monthly

-
-
-
- - - -

for a minimum of one (1) year

-
-
-
- - - -

at least monthly

-
-
-
- - - -

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

-
-
-
- - - -

continuously

-
-
-
- - - -

all information system components

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

At least every 3 years

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every three years

-
-
-
- - - -

For national security clearances; a reinvestigation is required during the 5th year for top secret security clearance, the 10th year for secret security clearance, and 15th year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the 5th year. There is no reinvestigation for other moderate risk positions or any low risk positions.

-
-
-
- - - -

same day

-
-
-
- - - -

five days of the time period following the formal transfer action (DoD 24 hours)

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

organization-defined time period - same day

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

security assessment report

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

monthly operating system/infrastructure; monthly web applications and databases

-
-
-
- - - -

[high-risk vulnerabilities mitigated within thirty days from date of discovery; moderate-risk vulnerabilities mitigated within ninety days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery.

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system

-
-
-
- - - -

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

FIPS-validated or NSA-approved cryptography

-
-
-
- - - -

no exceptions

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

within 30 days of release of updates

-
-
-
- - - -

at least weekly

-
-
-
- - - -

to include endpoints

-
-
-
- - - -

to include alerting administrator or defined security personnel

-
-
-
- - - -

to include US-CERT

-
-
-
- - - -

to include system security personnel and administrators with configuration/patch-management responsibilities

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-8 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine elements of the cloud environment - that require the System Use Notification control. The elements of the - cloud environment that require System Use Notification are approved and - accepted by the JAB/AO.

-
- - -

The service provider shall determine how System Use Notification is going - to be verified and provide appropriate periodicity of the check. The - System Use Notification verification and periodicity are approved and - accepted by the JAB/AO.

-
- - -

If performed as part of a Configuration Baseline - check, then the % of items requiring setting that are checked and that - pass (or fail) check can be provided.

-
- - -

If not performed as part of a Configuration Baseline check, then there - must be documented agreement on how to provide results of verification - and the necessary periodicity of the verification by the service - provider. The documented agreement on how to provide verification of the - results are approved and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-11 Additional FedRAMP Requirements and Guidance - - -

The service provider retains audit records on-line for at least ninety - days and further preserves audit records off-line for a period that is - in accordance with NARA requirements.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-2 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-6 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO. In multi-tennant environments, capability - and means for providing review, analysis, and reporting to consumer for - data pertaining to consumer shall be documented.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-2 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-2 (1) Additional FedRAMP Requirements and Guidance - - -

For JAB Authorization, must use an accredited Third Party Assessment - Organization (3PAO).

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-5 Additional FedRAMP Requirements and Guidance - - -

Plan of Action & Milestones (POA&M) must be provided at least - monthly.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Plan of Action & Milestones (POA&M) Template - Completion Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-6(c) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F. The service provider describes the types of changes to - the information system or the environment of operations that would - impact the risk posture. The types of changes are approved and accepted - by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-7 Additional FedRAMP Requirements and Guidance - - -

Operating System Scans: at least monthly. Database and Web Application - Scans: at least monthly. All scans performed by Independent Assessor: at - least annually.

-
- - -

CSPs must provide evidence of closure and remediation of high - vulnerabilities within the timeframe for standard POA&M updates.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-6(a) Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish configuration settings or establishes - its own configuration settings if USGCB is not available.

-
- - -

The service provider shall ensure that checklists for configuration - settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or - SCAP compatible (if validated checklists are not available).

-
- - -

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CM-7 Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish list of prohibited or restricted - functions, ports, protocols, and/or services or establishes its own list - of prohibited or restricted functions, ports, protocols, and/or services - if USGCB is not available.

-
- - -

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc - Partially derived from AC-17(8).

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - CM-8 Additional FedRAMP Requirements and Guidance - - -

Must be provided at least monthly or when there is a change.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-2 Additional FedRAMP Requirements and Guidance - - -

For JAB authorizations the contingency lists include designated FedRAMP - personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-4(a) Additional FedRAMP Requirements and Guidance - - -

The service provider develops test plans in accordance with NIST Special - Publication 800-34 (as amended); plans are approved by the JAB/AO prior - to initiating testing.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CP-9 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine what elements of the cloud - environment require the Information System Backup control. The service - provider shall determine how Information System Backup is going to be - verified and appropriate periodicity of the check.

-
- - -

The service provider maintains at least three backup copies of user-level - information (at least one of which is available online).

-
- - -

The service provider maintains at least three backup copies of - system-level information (at least one of which is available - online).

-
- - -

The service provider maintains at least three backup copies of - information system documentation including security information (at - least one of which is available online).

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-2 (12) Additional FedRAMP Requirements and Guidance - - -

Include Common Access Card (CAC), i.e., the DoD technical implementation - of PIV/FIPS 201/HSPD-12.

-
-
-
- - - - - - - - - - - - - - - -
- - - - IA-4(e) Additional FedRAMP Requirements and Guidance - - -

The service provider defines the time period of inactivity for device - identifiers.

-
- - -

For DoD clouds, see DoD cloud website for specific DoD requirements that - go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-5 Additional FedRAMP Requirements and Guidance - - -

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity - Guidelines IAL, AAL, FAL level 1. Link https://pages.nist.gov/800-63-3.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-5 (1) (a) and (d) Additional FedRAMP Requirements and Guidance - - -

If password policies are compliant with NIST SP 800-63B Memorized Secret - (Section 5.1.1) Guidance, the control may be considered compliant.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-4 Additional FedRAMP Requirements and Guidance - - -

The service provider ensures that individuals conducting incident - handling meet personnel security requirements commensurate with the - criticality/sensitivity of the information being processed, stored, and - transmitted by the information system.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - IR-6 Additional FedRAMP Requirements and Guidance - - -

Report security incident information according to FedRAMP Incident - Communications Procedure.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - IR-8 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
- - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PE-14(a) Additional FedRAMP Requirements and Guidance - - -

The service provider measures temperature at server inlets and humidity - levels by dew point.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RA-3 Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F

-
- - -

Include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - RA-5(a) Additional FedRAMP Requirements and Guidance - -

An accredited independent assessor scans operating systems/infrastructure, - web applications, and databases once annually.

-
- - RA-5(e) Additional FedRAMP Requirements and Guidance - -

To include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
- - RA-5 Additional FedRAMP Requirements and Guidance - - -

- See the FedRAMP Documents page under Key Cloud Service Provider - (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-4 Additional FedRAMP Requirements and Guidance - - -

The service provider must comply with Federal Acquisition Regulation - (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense - Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, - which implements Section 889 (as well as any added updates related to FISMA to - address security concerns in the system acquisitions process).

-
- - -

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly - preferred. See https://www.niap-ccevs.org/Product/.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-9 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents> Continuous Monitoring Strategy Guide https://www.FedRAMP.gov/documents -

-
- - -

Independent Assessors should assess the risk associated with the use of - external services. See the FedRAMP page under Key Cloud Service Provider - (CSP) Documents>FedRAMP Authorization Boundary Guidance

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-12 Additional FedRAMP Requirements and Guidance - - -

Federally approved and validated cryptography.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - SC-15 Additional FedRAMP Requirements and Guidance - - -

The information system provides disablement (instead of physical - disconnect) of collaborative computing devices in a manner that supports - ease of use.

-
-
-
- - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SI-4 Additional FedRAMP Requirements and Guidance - - -

See US-CERT Incident Response Reporting Guidelines.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - FedRAMP Applicable Laws and Regulations - - - - FedRAMP Master Acronym and Glossary - - - - -

FedRAMP Logo

-
- - -
- - NIST Special Publication (SP) 800-53 - - - - - -
-
diff --git a/src/content/rev5/baselines/xml/FedRAMP_rev4_MODERATE-baseline_profile.xml b/src/content/rev5/baselines/xml/FedRAMP_rev4_MODERATE-baseline_profile.xml deleted file mode 100644 index c6103f29d..000000000 --- a/src/content/rev5/baselines/xml/FedRAMP_rev4_MODERATE-baseline_profile.xml +++ /dev/null @@ -1,10903 +0,0 @@ - - - - - - FedRAMP Rev 4 Moderate Baseline - 2021-02-05T00:00:00.000-04:00 - 2021-06-09T14:27:27.561-04:00 - fedramp1.1.0-oscal1.0.0 - 1.0.0 - - Document creator - - - The FedRAMP Program Management Office (PMO) - CSP - - - The FedRAMP Joint Authorization Board (JAB) - CSP - - - Federal Risk and Authorization Management Program: Program Management Office - FedRAMP PMO - - - - - info@fedramp.gov -
- 1800 F St. NW - Washington - DC - 20006 - US -
-
- - Federal Risk and Authorization Management Program: Joint Authorization Board - FedRAMP JAB - - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - 8cc0b8e5-9650-4d5f-9796-316f05fa9a2d - - - ca9ba80e-1342-4bfd-b32a-abac468c24b4 - -
- - - ac-1 - ac-2 - ac-2.1 - ac-2.2 - ac-2.3 - ac-2.4 - ac-2.5 - ac-2.7 - ac-2.9 - ac-2.10 - ac-2.12 - ac-3 - ac-4 - ac-4.21 - ac-5 - ac-6 - ac-6.1 - ac-6.2 - ac-6.5 - ac-6.9 - ac-6.10 - ac-7 - ac-8 - ac-10 - ac-11 - ac-11.1 - ac-12 - ac-14 - ac-17 - ac-17.1 - ac-17.2 - ac-17.3 - ac-17.4 - ac-17.9 - ac-18 - ac-18.1 - ac-19 - ac-19.5 - ac-20 - ac-20.1 - ac-20.2 - ac-21 - ac-22 - at-1 - at-2 - at-2.2 - at-3 - at-4 - au-1 - au-2 - au-2.3 - au-3 - au-3.1 - au-4 - au-5 - au-6 - au-6.1 - au-6.3 - au-7 - au-7.1 - au-8 - au-8.1 - au-9 - au-9.2 - au-9.4 - au-11 - au-12 - ca-1 - ca-2 - ca-2.1 - ca-2.2 - ca-2.3 - ca-3 - ca-3.3 - ca-3.5 - ca-5 - ca-6 - ca-7 - ca-7.1 - ca-8 - ca-8.1 - ca-9 - cm-1 - cm-2 - cm-2.1 - cm-2.2 - cm-2.3 - cm-2.7 - cm-3 - cm-4 - cm-5 - cm-5.1 - cm-5.3 - cm-5.5 - cm-6 - cm-6.1 - cm-7 - cm-7.1 - cm-7.2 - cm-7.5 - cm-8 - cm-8.1 - cm-8.3 - cm-8.5 - cm-9 - cm-10 - cm-10.1 - cm-11 - cp-1 - cp-2 - cp-2.1 - cp-2.2 - cp-2.3 - cp-2.8 - cp-3 - cp-4 - cp-4.1 - cp-6 - cp-6.1 - cp-6.3 - cp-7 - cp-7.1 - cp-7.2 - cp-7.3 - cp-8 - cp-8.1 - cp-8.2 - cp-9 - cp-9.1 - cp-9.3 - cp-10 - cp-10.2 - ia-1 - ia-2 - ia-2.1 - ia-2.2 - ia-2.3 - ia-2.5 - ia-2.8 - ia-2.11 - ia-2.12 - ia-3 - ia-4 - ia-4.4 - ia-5 - ia-5.1 - ia-5.2 - ia-5.3 - ia-5.4 - ia-5.6 - ia-5.7 - ia-5.11 - ia-6 - ia-7 - ia-8 - ia-8.1 - ia-8.2 - ia-8.3 - ia-8.4 - ir-1 - ir-2 - ir-3 - ir-3.2 - ir-4 - ir-4.1 - ir-5 - ir-6 - ir-6.1 - ir-7 - ir-7.1 - ir-7.2 - ir-8 - ir-9 - ir-9.1 - ir-9.2 - ir-9.3 - ir-9.4 - ma-1 - ma-2 - ma-3 - ma-3.1 - ma-3.2 - ma-3.3 - ma-4 - ma-4.2 - ma-5 - ma-5.1 - ma-6 - mp-1 - mp-2 - mp-3 - mp-4 - mp-5 - mp-5.4 - mp-6 - mp-6.2 - mp-7 - mp-7.1 - pe-1 - pe-2 - pe-3 - pe-4 - pe-5 - pe-6 - pe-6.1 - pe-8 - pe-9 - pe-10 - pe-11 - pe-12 - pe-13 - pe-13.2 - pe-13.3 - pe-14 - pe-14.2 - pe-15 - pe-16 - pe-17 - pl-1 - pl-2 - pl-2.3 - pl-4 - pl-4.1 - pl-8 - ps-1 - ps-2 - ps-3 - ps-3.3 - ps-4 - ps-5 - ps-6 - ps-7 - ps-8 - ra-1 - ra-2 - ra-3 - ra-5 - ra-5.1 - ra-5.2 - ra-5.3 - ra-5.5 - ra-5.6 - ra-5.8 - sa-1 - sa-2 - sa-3 - sa-4 - sa-4.1 - sa-4.2 - sa-4.8 - sa-4.9 - sa-4.10 - sa-5 - sa-8 - sa-9 - sa-9.1 - sa-9.2 - sa-9.4 - sa-9.5 - sa-10 - sa-10.1 - sa-11 - sa-11.1 - sa-11.2 - sa-11.8 - sc-1 - sc-2 - sc-4 - sc-5 - sc-6 - sc-7 - sc-7.3 - sc-7.4 - sc-7.5 - sc-7.7 - sc-7.8 - sc-7.12 - sc-7.13 - sc-7.18 - sc-8 - sc-8.1 - sc-10 - sc-12 - sc-12.2 - sc-12.3 - sc-13 - sc-15 - sc-17 - sc-18 - sc-19 - sc-20 - sc-21 - sc-22 - sc-23 - sc-28 - sc-28.1 - sc-39 - si-1 - si-2 - si-2.2 - si-2.3 - si-3 - si-3.1 - si-3.2 - si-3.7 - si-4 - si-4.1 - si-4.2 - si-4.4 - si-4.5 - si-4.14 - si-4.16 - si-4.23 - si-5 - si-6 - si-7 - si-7.1 - si-7.7 - si-8 - si-8.1 - si-8.2 - si-10 - si-11 - si-12 - si-16 - - - - - true - - - - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

no more than 30 days for temporary and emergency account types

-
-
-
- - - -

90 days for user accounts

-
-
-
- - - -

all security functions

-
-
-
- - - -

not more than three (3)

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

locks the account/node for thirty minutes

-
-
-
- - - -

see additional Requirements and Guidance

-
-
-
- - - -

see additional Requirements and Guidance]

-
-
-
- - - -

three (3) sessions for privileged access and two (2) sessions for non-privileged access

-
-
-
- - - -

fifteen (15) minutes

-
-
-
- - - -

fifteen 15 minutes

-
-
-
- - - -

at least quarterly

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

At least one year

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

successful and unsuccessful account logon events, account management events, object access, policy change, privilege functions, process tracking, and system events. For Web applications: all administrator activity, authentication checks, authorization checks, data deletions, data access, data changes, and permission changes

-
-
-
- - - -

organization-defined subset of the auditable events defined in AU-2 a to be audited continually for each identified event

-
-
-
- - - -

annually or whenever there is a change in the threat environment

-
-
-
- - - -

session, connection, transaction, or activity duration; for client-server transactions, the number of bytes received and bytes sent; additional informational messages to diagnose or identify the event; characteristics that describe or identify the object or resource being acted upon

-
-
-
- - - -

organization-defined actions to be taken (overwrite oldest record)

-
-
-
- - - -

at least weekly

-
-
-
- - - -

At least hourly

-
-
-
- - - -

http://tf.nist.gov/tf-cgi/servers.cgi

-
-
-
- - - -

at least weekly

-
-
-
- - - -

at least ninety days

-
-
-
- - - -

all information system and network components where audit capability is deployed/available

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

individuals or roles to include FedRAMP PMO

-
-
-
- - - -

at least annually

-
-
-
- - - -

any FedRAMP Accredited 3PAO

-
-
-
- - - -

any FedRAMP Accredited 3PAO

-
-
-
- - - -

the conditions of the JAB/AO in the FedRAMP Repository

-
-
-
- - - -

at least annually and on input from FedRAMP

-
-
-
- - - -

Boundary Protections which meet the Trusted Internet Connection (TIC) requirements

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

to meet Federal and FedRAMP requirements (See additional guidance)

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually or when a significant change occurs

-
-
-
- - - -

to include when directed by the JAB

-
-
-
- - - -

at least quarterly

-
-
-
- - -

See CM-6(a) Additional FedRAMP Requirements and Guidance

-
-
- - - -

United States Government Configuration Baseline (USGCB)

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least Annually or when there is a change

-
-
-
- - - -

at least monthly

-
-
-
- - - -

Continuously, using automated mechanisms with a maximum five-minute delay in detection

-
-
-
- - - -

Continuously (via CM-7 (5))

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

ten (10) days

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

functional exercises

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

daily incremental; weekly full

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

FIPS 140-2, NIAP Certification, or NSA approval

-
-
-
- - - -

IA-4 (d) [at least two years]

-
-
-
- - - -

ninety days for user identifiers (See additional requirements and guidance)

-
-
-
- - - -

contractors; foreign nationals

-
-
-
- - - -

at least one

-
-
-
- - - -

twenty four (24)

-
-
-
- - - -

All hardware/biometric (multifactor authenticators)

-
-
-
- - - -

in person

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

US-CERT incident reporting timelines as specified in NIST Special Publication 800-61 (as amended)

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least annually

-
-
-
- - - -

see additional FedRAMP Requirements and Guidance

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

the information owner explicitly authorizing removal of the equipment from the facility

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

no removable media types

-
-
-
- - - -

all types of digital and non-digital media with sensitive information

-
-
-
- - - -

see additional FedRAMP requirements and guidance

-
-
-
- - - -

all media with sensitive information

-
-
-
- - - -

prior to leaving secure/controlled environment: for digital media, encryption using a FIPS 140-2 validated encryption module; for non-digitital media, secured in locked container

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

CSP defined physical access control systems/devices AND guards

-
-
-
- - - -

CSP defined physical access control systems/devices

-
-
-
- - - -

in all circumstances within restricted access area where the information system resides

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least monthly

-
-
-
- - - -

for a minimum of one (1) year

-
-
-
- - - -

at least monthly

-
-
-
- - - -

consistent with American Society of Heating, Refrigerating and Air-conditioning Engineers (ASHRAE) document entitled Thermal Guidelines for Data Processing Environments

-
-
-
- - - -

continuously

-
-
-
- - - -

all information system components

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

At least every 3 years

-
-
-
- - - -

At least annually or when a significant change occurs

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least every three years

-
-
-
- - - -

for national security clearances; a reinvestigation is required during the fifth (5th) year for top secret security clearance, the tenth (10th) year for secret security clearance, and fifteenth (15th) year for confidential security clearance. For moderate risk law enforcement and high impact public trust level, a reinvestigation is required during the fifth (5th) year. There is no reinvestigation for other moderate risk positions or any low risk positions

-
-
-
- - - -

personnel screening criteria - as required by specific information

-
-
-
- - - -

same day

-
-
-
- - - -

five days of the time period following the formal transfer action (DoD 24 hours)

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

organization-defined time period - same day

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

security assessment report

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

at least every three (3) years or when a significant change occurs

-
-
-
- - - -

monthly operating system/infrastructure; monthly web applications and databases

-
-
-
- - - -

high-risk vulnerabilities mitigated within thirty (30) days from date of discovery; moderate-risk vulnerabilities mitigated within ninety (90) days from date of discovery; low risk vulnerabilities mitigated within one hundred and eighty (180) days from date of discovery

-
-
-
- - - -

prior to a new scan

-
-
-
- - - -

operating systems / web applications / databases

-
-
-
- - - -

all scans

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

to include security-relevant external system interfaces and high-level design

-
-
-
- - - -

at least the minimum requirement as defined in control CA-7

-
-
-
- - - -

FedRAMP Security Controls Baseline(s) if Federal information is processed or stored within the external system

-
-
-
- - - -

Federal/FedRAMP Continuous Monitoring requirements must be met for external systems where Federal information is processed or stored

-
-
-
- - - -

all external systems where Federal information is processed or stored

-
-
-
- - - -

all external systems where Federal information is processed or stored

-
-
-
- - - -

information processing, information data, AND information services

-
-
-
- - - -

development, implementation, AND operation

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

at least annually

-
-
-
- - - -

confidentiality AND integrity

-
-
-
- - - -

prevent unauthorized disclosure of information AND detect changes to information

-
-
-
- - - -

a hardened or alarmed carrier Protective Distribution System (PDS)

-
-
-
- - - -

no longer than 30 minutes for RAS-based sessions or no longer than 60 minutes for non-interactive user sessions

-
-
-
- - - -

NIST FIPS-compliant

-
-
-
- - - -

FIPS-validated or NSA-approved cryptography

-
-
-
- - - -

no exceptions

-
-
-
- - - -

confidentiality AND integrity

-
-
-
- - - -

at least every 3 years

-
-
-
- - - -

at least annually

-
-
-
- - - -

within 30 days of release of updates

-
-
-
- - - -

at least monthly

-
-
-
- - - -

at least weekly

-
-
-
- - - -

to include endpoints

-
-
-
- - - -

to include alerting administrator or defined security personnel

-
-
-
- - - -

continuously

-
-
-
- - - -

to include US-CERT

-
-
-
- - - -

to include system security personnel and administrators with configuration/patch-management responsibilities

-
-
-
- - - -

to include upon system startup and/or restart

-
-
-
- - - -

at least monthly

-
-
-
- - - -

to include system administrators and security personnel

-
-
-
- - - -

to include notification of system administrators and security personnel

-
-
-
- - - -

Selection to include security relevant events

-
-
-
- - - -

at least monthly

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (10) Additional FedRAMP Requirements and Guidance - - -

Required if shared/group accounts are deployed

-
-
-
- - - - - - - - - -
- - - - AC-2 (12) Additional FedRAMP Requirements and Guidance - - -

Required for privileged accounts.

-
- - -

Required for privileged accounts.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (5) Additional FedRAMP Requirements and Guidance - - -

Should use a shorter timeframe than AC-12.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-2 (9) Additional FedRAMP Requirements and Guidance - - -

Required if shared/group accounts are deployed

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-5 Additional FedRAMP Requirements and Guidance - - -

Guidance: CSPs have the option to provide a separation of duties matrix - as an attachment to the SSP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-6 (2) Additional FedRAMP Requirements and Guidance - - -

Examples of security functions include but are not limited to: - establishing system accounts, configuring access authorizations (i.e., - permissions, privileges), setting events to be audited, and setting - intrusion detection parameters, system programming, system and security - administration, other privileged functions.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AC-8 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine elements of the cloud environment - that require the System Use Notification control. The elements of the - cloud environment that require System Use Notification are approved and - accepted by the JAB/AO.

-
- - -

The service provider shall determine how System Use Notification is going - to be verified and provide appropriate periodicity of the check. The - System Use Notification verification and periodicity are approved and - accepted by the JAB/AO.

-
- - -

If performed as part of a Configuration Baseline - check, then the % of items requiring setting that are checked and that - pass (or fail) check can be provided.

-
- - -

If not performed as part of a Configuration Baseline check, then there - must be documented agreement on how to provide results of verification - and the necessary periodicity of the verification by the service - provider. The documented agreement on how to provide verification of the - results are approved and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-11 Additional FedRAMP Requirements and Guidance - - -

The service provider retains audit records on-line for at least ninety - days and further preserves audit records off-line for a period that is - in accordance with NARA requirements.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-2 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - AU-2 (3) Additional FedRAMP Requirements and Guidance - - -

Annually or whenever changes in the threat environment are communicated - to the service provider by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - AU-3 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider defines audit record types [FedRAMP Assignment: - session, connection, transaction, or activity duration; for - client-server transactions, the number of bytes received and bytes - sent; additional informational messages to diagnose or identify the - event; characteristics that describe or identify the object or - resource being acted upon; individual identities of group account - users; full-text of privileged commands]. The audit record - types are approved and accepted by the JAB/AO.

-
- - -

For client-server transactions, the number of bytes sent and received - gives bidirectional transfer information that can be helpful during an - investigation or inquiry.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-6 Additional FedRAMP Requirements and Guidance - - -

Coordination between service provider and consumer shall be documented - and accepted by the JAB/AO. In multi-tennant environments, capability - and means for providing review, analysis, and reporting to consumer for - data pertaining to consumer shall be documented.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - AU-8 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider selects primary and secondary time servers used by - the NIST Internet time service. The secondary server is selected from a - different geographic region than the primary server.

-
- - -

The service provider synchronizes the system clocks of network computers - that run operating systems other than Windows to the Windows Server - Domain Controller emulator or to the same time source for that - server.

-
- - -

Synchronization of system clocks improves the accuracy of log - analysis.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-2 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Annual Assessment Guidance https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-2 (1) Additional FedRAMP Requirements and Guidance - - -

For JAB Authorization, must use an accredited Third Party Assessment - Organization (3PAO).

-
-
-
- - - - - - - - - - - - -
- - - - CA-2 (2) Additional FedRAMP Requirements and Guidance - - -

To include 'announced', 'vulnerability scanning'

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CA-3 (3) Additional FedRAMP Requirements and Guidance - - -

Refer to Appendix H - Cloud Considerations of the TIC 2.0 Reference - Architecture document.

-
-
-
- - - - - - - - - - - - - - - - - -
- - - - CA-3 (5) Additional FedRAMP Requirements and Guidance - - -

For JAB Authorization, CSPs shall include details of this control in - their Architecture Briefing

-
-
-
- - - - - - - - - - - - - - - -
- - - - CA-5 Additional FedRAMP Requirements and Guidance - - -

Plan of Action & Milestones (POA&M) must be provided at least - monthly.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Plan of Action & Milestones (POA&M) Template - Completion Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-6(c) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F. The service provider describes the types of changes to - the information system or the environment of operations that would - impact the risk posture. The types of changes are approved and accepted - by the JAB/AO.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CA-7 Additional FedRAMP Requirements and Guidance - - -

Operating System Scans: at least monthly. Database and Web Application - Scans: at least monthly. All scans performed by Independent Assessor: at - least annually.

-
- - -

CSPs must provide evidence of closure and remediation of high - vulnerabilities within the timeframe for standard POA&M updates.

-
- - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Continuous Monitoring Strategy Guide https://www.fedramp.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - CA-8 Additional FedRAMP Requirements and Guidance - - -

See the FedRAMP Documents page under Key Cloud Service Provider (CSP) - Documents, Penetration Test Guidance https://www.FedRAMP.gov/documents/ -

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-3 Additional FedRAMP Requirements and Guidance - - -

The service provider establishes a central means of communicating major - changes to or developments in the information system or environment of - operations that may affect its services to the federal government and - associated service consumers (e.g., electronic bulletin board, web - status page). The means of communication are approved and accepted by - the JAB/AO.

-
- - -

In accordance with record retention policies and procedures.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-5 (3) Additional FedRAMP Requirements and Guidance - - -

If digital signatures/certificates are unavailable, alternative - cryptographic integrity checks (hashes, self-signed certs, etc.) can be - utilized.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-6(a) Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish configuration settings or establishes - its own configuration settings if USGCB is not available.

-
- - -

The service provider shall ensure that checklists for configuration - settings are Security Content Automation Protocol (SCAP) (http://scap.nist.gov/) validated or - SCAP compatible (if validated checklists are not available).

-
- - -

Information on the USGCB checklists can be found at: https://csrc.nist.gov/Projects/United-States-Government-Configuration-Baseline.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - CM-7 Additional FedRAMP Requirements and Guidance - - -

The service provider shall use the Center for Internet Security - guidelines (Level 1) to establish list of prohibited or restricted - functions, ports, protocols, and/or services or establishes its own list - of prohibited or restricted functions, ports, protocols, and/or services - if USGCB is not available.

-
- - -

Information on the USGCB checklists can be found at: http://usgcb.nist.gov/usgcb_faq.html#usgcbfaq_usgcbfdcc. - Partially derived from AC-17(8).

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-7 (2) Additional FedRAMP Requirements and Guidance - - -

This control shall be implemented in a technical manner on the - information system to only allow programs to run that adhere to the - policy (i.e. white listing). This control is not to be based off of - strictly written policy on what is allowed or not allowed to run.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CM-8 Additional FedRAMP Requirements and Guidance - - -

Must be provided at least monthly or when there is a change.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-2 Additional FedRAMP Requirements and Guidance - - -

For JAB authorizations the contingency lists include designated FedRAMP - personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-4(a) Additional FedRAMP Requirements and Guidance - - -

The service provider develops test plans in accordance with NIST Special - Publication 800-34 (as amended); plans are approved by the JAB/AO prior - to initiating testing.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-7 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a time period consistent with the recovery - time objectives and business impact analysis.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - CP-7 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider may determine what is considered a sufficient degree - of separation between the primary and alternate processing sites, based - on the types of threats that are of concern. For one particular type of - threat (i.e., hostile cyber attack), the degree of separation between - sites will be less relevant.

-
-
-
- - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-8 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a time period consistent with the recovery - time objectives and business impact analysis.

-
-
-
- - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - CP-9 Additional FedRAMP Requirements and Guidance - - -

The service provider shall determine what elements of the cloud - environment require the Information System Backup control. The service - provider shall determine how Information System Backup is going to be - verified and appropriate periodicity of the check.

-
- - -

The service provider maintains at least three backup copies of user-level - information (at least one of which is available online).

-
- - -

The service provider maintains at least three backup copies of - system-level information (at least one of which is available - online).

-
- - -

The service provider maintains at least three backup copies of - information system documentation including security information (at - least one of which is available online).

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-2 (11) Additional FedRAMP Requirements and Guidance - - -

PIV=separate device. Please refer to NIST SP 800-157 Guidelines for - Derived Personal Identity Verification (PIV) Credentials.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-2 (12) Additional FedRAMP Requirements and Guidance - - -

Include Common Access Card (CAC), i.e., the DoD technical implementation - of PIV/FIPS 201/HSPD-12.

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-4(e) Additional FedRAMP Requirements and Guidance - - -

The service provider defines the time period of inactivity for device - identifiers.

-
- - -

For DoD clouds, see DoD cloud website for specific DoD requirements that - go above and beyond FedRAMP http://iase.disa.mil/cloud_security/Pages/index.aspx.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - IA-5 Additional FedRAMP Requirements and Guidance - - -

Authenticators must be compliant with NIST SP 800-63-3 Digital Identity - Guidelines IAL, AAL, FAL level 2. Link https://pages.nist.gov/800-63-3.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - IA-5 (1), (a) and (d) Additional FedRAMP Requirements and - Guidance - - -

If password policies are compliant with NIST SP 800-63B Memorized Secret - (Section 5.1.1) Guidance, the control may be considered compliant.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IA-5 (4) Additional FedRAMP Requirements and Guidance - - -

If automated mechanisms which enforce password authenticator strength at - creation are not used, automated mechanisms must be used to audit - strength of created password authenticators.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-3 Additional FedRAMP Requirements and Guidance - - -

The service provider defines tests and/or exercises in accordance with - NIST Special Publication 800-61 (as amended). Functional Testing must occur prior to - testing for initial authorization. Annual functional testing may be concurrent with - required penetration tests (see CA-8). The service provider provides test plans to the - JAB/AO annually. Test plans are approved and accepted by the JAB/AO prior to test - commencing.

-
-
-
- - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - IR-4 Additional FedRAMP Requirements and Guidance - - -

The service provider ensures that individuals conducting incident - handling meet personnel security requirements commensurate with the - criticality/sensitivity of the information being processed, stored, and - transmitted by the information system.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-6 Additional FedRAMP Requirements and Guidance - - -

Report security incident information according to FedRAMP Incident - Communications Procedure.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - IR-8 Additional FedRAMP Requirements and Guidance - - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
- - -

The service provider defines a list of incident response personnel - (identified by name and/or by role) and organizational elements. The - incident response list includes designated FedRAMP personnel.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MA-5 (1) Additional FedRAMP Requirements and Guidance - - -

Only MA-5 (1)(a)(1) is required by FedRAMP Moderate Baseline

-
-
-
- - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MP-3 Additional FedRAMP Requirements and Guidance - - -

Second parameter not-applicable

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - -
- - - - MP-4 Additional FedRAMP Requirements and Guidance - - -

The service provider defines controlled areas within facilities where the - information and information system reside.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - MP-5 Additional FedRAMP Requirements and Guidance - - -

The service provider defines security measures to protect digital and - non-digital media in transport. The security measures are approved and - accepted by the JAB.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - MP-6 (2) Additional FedRAMP Requirements and Guidance - - -

Equipment and procedures may be tested or validated for effectiveness

-
-
-
- - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PE-14(a) Additional FedRAMP Requirements and Guidance - - -

The service provider measures temperature at server inlets and humidity - levels by dew point.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - PL-8(b) Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F, page F-7.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RA-3 Additional FedRAMP Requirements and Guidance - - -

Significant change is defined in NIST Special Publication 800-37 Revision - 1, Appendix F

-
- - -

Include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - RA-5(a) Additional FedRAMP Requirements and Guidance - -

An accredited independent assessor scans operating systems/infrastructure, - web applications, and databases once annually.

-
-
- - - RA-5(e) Additional FedRAMP Requirements and Guidance - -

To include all Authorizing Officials; for JAB authorizations to include - FedRAMP.

-
-
- - - RA-5 Additional FedRAMP Requirements and Guidance - - -

- See the FedRAMP Documents page under Key Cloud Service Provider - (CSP) Documents> Vulnerability Scanning Requirements (https://www.FedRAMP.gov/documents/)

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - RA-5 (6) Additional FedRAMP Requirements and Guidance - - -

Include in Continuous Monitoring ISSO digest/report to JAB/AO

-
-
-
- - - - - - - - - -
- - - - RA-5 (8) Additional FedRAMP Requirements and Guidance - - -

This enhancement is required for all high vulnerability scan - findings.

-
- - -

While scanning tools may label findings as high or critical, the intent - of the control is based around NIST's definition of high - vulnerability.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-10 Additional FedRAMP Requirements and Guidance - - -

For JAB authorizations, track security flaws and flaw resolution within - the system, component, or service and report findings to - organization-defined personnel, to include FedRAMP.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-11 (1) Additional FedRAMP Requirements and Guidance - - -

The service provider documents in the Continuous Monitoring Plan, how - newly developed code for the information system is reviewed.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - SA-11 (8) Additional FedRAMP Requirements and Guidance - - -

The service provider documents in the Continuous Monitoring Plan, how - newly developed code for the information system is reviewed.

-
-
-
- - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-4 Additional FedRAMP Requirements and Guidance - - -

The service provider must comply with Federal Acquisition Regulation - (FAR) Subpart 7.103, and Section 889 of the John S. McCain National Defense - Authorization Act (NDAA) for Fiscal Year 2019 (Pub. L. 115-232), and FAR Subpart 4.21, - which implements Section 889 (as well as any added updates related to FISMA to - address security concerns in the system acquisitions process).

-
- - -

The use of Common Criteria (ISO/IEC 15408) evaluated products is strongly - preferred. See https://www.niap-ccevs.org/Product/.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SA-4 (8) Additional FedRAMP Requirements and Guidance - - -

CSP must use the same security standards regardless of where the system - component or information system service is acquired.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-12 Additional FedRAMP Requirements and Guidance - - -

Federally approved and validated cryptography.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-15 Additional FedRAMP Requirements and Guidance - - -

The information system provides disablement (instead of physical - disconnect) of collaborative computing devices in a manner that supports - ease of use.

-
-
-
- - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-28 Additional FedRAMP Requirements and Guidance - - -

The organization supports the capability to use cryptographic mechanisms - to protect information at rest.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SC-7 (13) Additional FedRAMP Requirements and Guidance - - -

The service provider defines key information security tools, mechanisms, - and support components associated with system and security - administration and isolates those tools, mechanisms, and support - components from other internal information system components via - physically or logically separate subnets.

-
-
-
- - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SI-4 Additional FedRAMP Requirements and Guidance - - -

See US-CERT Incident Response Reporting Guidelines.

-
-
-
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - SI-4 (5) Additional FedRAMP Requirements and Guidance - - -

In accordance with the incident response plan.

-
-
-
- - - - - - - - - - - - - - - - -
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
- - - FedRAMP Applicable Laws and Regulations - - - - FedRAMP Master Acronym and Glossary - - - - -

FedRAMP Logo

-
- - -
- - NIST Special Publication (SP) 800-53 - - - - - -
-